Azure Service Principal was assigned a role

Set up the azure integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect an Azure service principal being assigned an Azure role.

Strategy

Monitor Azure Activity logs for the following operations:

  • @evt.name:"MICROSOFT.AUTHORIZATION/ROLEASSIGNMENTS/WRITE"
  • @properties.requestbody:*ServicePrincipal*

Triage and response

  1. Determine if this activity is legitimate by investigating the:
  • Source IP of this activity: {{@network.client.ip}}
  • The user who made this request: @identity.claims.name
  • The role that was assigned to the application or service principal.
  1. If this user should not be assigning this Azure role and if the service principal should not be assigned this role:
  • Revoke access of compromised credentials.
  • Remove unauthorized app registration and/or service principal.
  • Investigate other activities performed by the source IP {{@network.client.ip}} in the IP Investigation Dashboard.
  • Investigate other activities performed by the user {{@usr.id}} in the User Investigation Dashboard.
PREVIEWING: rtrieu/product-analytics-ui-changes