29ca26b32c
Updating MITRE Tactics & Techniques to align with existing classifications
24 lines
788 B
YAML
24 lines
788 B
YAML
title: User Added To Group With CA Policy Modification Access
|
|
id: 91c95675-1f27-46d0-bead-d1ae96b97cd3
|
|
status: experimental
|
|
description: Monitor and alert on group membership additions of groups that have CA policy modification access
|
|
references:
|
|
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-infrastructure#conditional-access
|
|
author: Mark Morowczynski '@markmorow', Thomas Detzner '@tdetzner'
|
|
date: 2022/08/04
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.persistence
|
|
- attack.t1548
|
|
- attack.t1556
|
|
logsource:
|
|
product: azure
|
|
service: auditlogs
|
|
detection:
|
|
selection:
|
|
properties.message: Add member from group
|
|
condition: selection
|
|
falsepositives:
|
|
- User removed from the group is approved
|
|
level: medium
|