Files
blue-team-tools/rules/cloud/azure/azure_app_uri_modifications.yml
T
Mark Morowczynski 29ca26b32c Updating MITRE Tactics & Techniques
Updating MITRE Tactics & Techniques to align with existing classifications
2023-01-28 13:26:15 -08:00

27 lines
1.1 KiB
YAML

title: Application URI Configuration Changes
id: 0055ad1f-be85-4798-83cf-a6da17c993b3
status: experimental
description: |
Detects when a configuration change is made to an applications URI.
URIs for domain names that no longer exist (dangling URIs), not using HTTPS, wildcards at the end of the domain, URIs that are no unique to that app, or URIs that point to domains you do not control should be investigated.
references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-applications#application-configuration-changes
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
date: 2022/06/02
tags:
- attack.t1528
- attack.t1078.004
- attack.persistence
- attack.credential_access
- attack.privilege_escalation
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Update Application Sucess- Property Name AppAddress
condition: selection
falsepositives:
- When and administrator is making legitimate URI configuration changes to an application. This should be a planned event.
level: high