Azure AI API keys listed outside of known AI web portals

This rule is part of a beta feature. To learn more, contact Support.

Set up the azure integration.

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when an account lists keys outside of the standard web applications for Azure AI and ML services.

Strategy

Monitor Azure activity logs for when an account lists keys do not come from known web applications for the Azure Portal or ML, AI, or OpenAI Studio. This may indicate an attacker listing keys with compromised Azure tokens through the Azure CLI, direct web requests, or other tooling. Compromised keys may be used in attacks such as LLM hijacking (LLMjacking). The following application identifiers has been excluded:

  • d7304df8-741f-47d3-9bc2-df0e24e2071f (ML Studio)
  • cb2ff863-7f30-4ced-ab89-a00194bcf6d9 (AI Studio)
  • dc807dec-d211-4b3f-bc8a-43b3443c4874 (Open AI Studio)
  • c44b4083-3bb0-49c1-b47d-974e53cbdf3c (Azure Portal)
  • 4e09c6ac-4372-45b7-a977-e9f89e673e32 (Speech Studio)

Triage and response

  1. Verify if the user or service principal is expected to be working with Azure AI and ML services, and if they are using these services outside of available web portals.
    • Use the value {{@identity.claims.appid}} in the Enterprise Application section of Microsoft Entra to gather further context about the application used.
  2. If the activity is not expected, investigate activity around the user and IP generating this event.
PREVIEWING: brett.blue/embedded-collector-release