Files
blue-team-tools/rules-placeholder/cloud/azure/azure_privileged_account_no_saw_paw.yml
T
Nasreddine Bencherchali 95793d73bd Merge PR #4482 From @nasbench - Add New Automation Workflows
chore: update workflows and add quality of life updates and automation to the repository

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-18 11:53:44 +02:00

33 lines
1.1 KiB
YAML

title: Privilege Role Elevation Not Occuring on SAW or PAW
id: 38a5e67b-436a-4e77-9f73-f48a82626890
status: test
description: Detects failed sign-in from a PAW or SAW device
references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-privileged-accounts#things-to-monitor
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
date: 2022/08/11
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1078
logsource:
product: azure
service: signinlogs
detection:
# You have to tune the rule for your environment before use it
selection:
properties.message|contains: Add memmber to role completed (PIM aciviation)
# Countries you DO operate out of e,g GB, use list for mulitple
Location: '%LegitCountries%'
IPaddress: '%UnApprovedIp%'
# unapproved browser, operating system
DeviceInfo: '%UnApprovedDevice%'
DeviceDetail.isCompliant: 'false'
Status:
- Sucess
- failure
condition: selection
falsepositives:
- Not using a PAW/SAW in the environment
level: high