Azure AD member assigned built-in Administrator role

Set up the azure integration.

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect an Azure Active Directory (Azure AD) member being added to a built-in Administrative role.

Strategy

Monitor Azure AD Audit logs for the following operations:

  • @evt.name:"Add member to role"
  • @properties.targetResources.modifiedProperties.newValue:*Administrator*

Azure AD uses roles to assign privileges to identities. There are over 80 roles available, the list below details some of the highest privileged roles that adversaries could target:

This whitepaper from Mandiant describes the abuse of Azure AD privileged roles.

The field @usr.id is the identity that actioned the change, and the fields @properties.targetResources.userPrincipalName or @properties.targetResources.displaylName is the identity being assigned the administrative privileges.

Triage and response

  1. Determine if {{@usr.id}} should have made a {{@evt.name}} API call.
  2. If the API call was not made by the user:
  • Rotate user credentials.
  • Determine what other API calls were made by the user.
  • Begin your organization’s incident response (IR) process and investigate.
  1. If the API call was made legitimately by the user:
  • Determine if {{@usr.id}} was authorized to make the change.
  • Follow Microsoft’s best practices where possible to ensure the user was assigned the correct level of privileges for their function.

Changelog

  • 19 December 2023 - Updated group by values to include @properties.targetResources.userPrincipalName
  • 19 September 2024 - Updated with additional query to capture service principals being assigned administrative roles.
PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data