Azure Service Principal was assigned a role
Set up the azure integration.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detect an Azure service principal being assigned an Azure role.
Strategy
Monitor Azure Activity logs for the following operations:
@evt.name:"MICROSOFT.AUTHORIZATION/ROLEASSIGNMENTS/WRITE"
@properties.requestbody:*ServicePrincipal*
Triage and response
- Determine if this activity is legitimate by investigating the:
- Source IP of this activity:
{{@network.client.ip}}
- The user who made this request:
@identity.claims.name
- The role that was assigned to the application or service principal.
- If this user should not be assigning this Azure role and if the service principal should not be assigned this role:
- Revoke access of compromised credentials.
- Remove unauthorized app registration and/or service principal.
- Investigate other activities performed by the source IP
{{@network.client.ip}}
in the IP Investigation Dashboard. - Investigate other activities performed by the user
{{@usr.id}}
in the User Investigation Dashboard.