Azure Service Principal was assigned a role

Set up the azure integration.

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect an Azure service principal being assigned an Azure role.

Strategy

Monitor Azure Activity logs for the following operations:

  • @evt.name:"MICROSOFT.AUTHORIZATION/ROLEASSIGNMENTS/WRITE"
  • @properties.requestbody:*ServicePrincipal*

Triage and response

  1. Determine if this activity is legitimate by investigating the:
  • Source IP of this activity: {{@network.client.ip}}
  • The user who made this request: @identity.claims.name
  • The role that was assigned to the application or service principal.
  1. If this user should not be assigning this Azure role and if the service principal should not be assigned this role:
  • Revoke access of compromised credentials.
  • Remove unauthorized app registration and/or service principal.
  • Investigate other activities performed by the source IP {{@network.client.ip}} in the IP Investigation Dashboard.
  • Investigate other activities performed by the user {{@usr.id}} in the User Investigation Dashboard.
PREVIEWING: brett.blue/embedded-collector-release