diff --git a/rules/cloud/azure/azure_vault_key_modified_or_deleted.yml b/rules/cloud/azure/azure_vault_key_modified_or_deleted.yml new file mode 100644 index 000000000..cfc56d8f7 --- /dev/null +++ b/rules/cloud/azure/azure_vault_key_modified_or_deleted.yml @@ -0,0 +1,30 @@ +title: Azure Key Modified or Deleted +id: 80eeab92-0979-4152-942d-96749e11df40 +description: Identifies when a key is modified or deleted in Azure. +author: Austin Songer +status: experimental +date: 2021/08/16 +references: + - https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations +logsource: + service: azure.activitylogs +detection: + selection: + properties.message: + - MICROSOFT.KEYVAULT/VAULTS/KEYS/UPDATE/ACTION + - MICROSOFT.KEYVAULT/VAULTS/KEYS/CREATE + - MICROSOFT.KEYVAULT/VAULTS/KEYS/CREATE/ACTION + - MICROSOFT.KEYVAULT/VAULTS/KEYS/IMPORT/ACTION + - MICROSOFT.KEYVAULT/VAULTS/KEYS/RECOVER/ACTION + - MICROSOFT.KEYVAULT/VAULTS/KEYS/RESTORE/ACTION + - MICROSOFT.KEYVAULT/VAULTS/KEYS/DELETE + - MICROSOFT.KEYVAULT/VAULTS/KEYS/BACKUP/ACTION + - MICROSOFT.KEYVAULT/VAULTS/KEYS/PURGE/ACTION + condition: selection +level: medium +tags: + - attack.impact +falsepositives: + - Key being modified or deleted may be performed by a system administrator. + - Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. + - Key modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.