[New Rule] Global Administrator Role Assigned (#1686)
* Initial Global Administrator Role Assigned Rules * Apply suggestions from code review Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com> Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>
This commit is contained in:
@@ -0,0 +1,57 @@
|
||||
[metadata]
|
||||
creation_date = "2022/01/06"
|
||||
integration = "azure"
|
||||
maturity = "production"
|
||||
updated_date = "2022/01/06"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
In Azure Active Directory (Azure AD), permissions to manage resources are assigned using Roles. The Global Administrator
|
||||
is a role that enables users to have access to all administrative features in Azure AD and services that use Azure
|
||||
Active Directory identities like the Microsoft 365 Defender portal, the Microsoft 365 compliance center, Exchange,
|
||||
SharePoint Online, and Skype for Business Online. Attackers can add users as Global Administrators to maintain access
|
||||
and manage all subscriptions and their settings and resources.
|
||||
"""
|
||||
from = "now-25m"
|
||||
index = ["filebeat-*", "logs-azure*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License v2"
|
||||
name = "Azure AD Global Administrator Role Assigned"
|
||||
note = """## Config
|
||||
|
||||
The Azure Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
|
||||
references = [
|
||||
"https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#global-administrator"
|
||||
]
|
||||
risk_score = 47
|
||||
rule_id = "04c5a96f-19c5-44fd-9571-a0b033f9086f"
|
||||
severity = "medium"
|
||||
tags = ["Elastic", "Cloud", "Azure", "Continuous Monitoring", "SecOps", "Identity and Access"]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "query"
|
||||
|
||||
query = '''
|
||||
event.dataset:azure.auditlogs and azure.auditlogs.properties.category:RoleManagement and
|
||||
azure.auditlogs.operation_name:"Add member to role" and
|
||||
azure.auditlogs.properties.target_resources.0.modified_properties.1.new_value:"\"Global Administrator\""
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
|
||||
[[rule.threat.technique]]
|
||||
reference = "https://attack.mitre.org/techniques/T1098/"
|
||||
name = "Account Manipulation"
|
||||
id = "T1098"
|
||||
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
reference = "https://attack.mitre.org/techniques/T1098/003/"
|
||||
name = "Add Office 365 Global Administrator Role"
|
||||
id = "T1098.003"
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0003"
|
||||
name = "Persistence"
|
||||
reference = "https://attack.mitre.org/tactics/TA0003/"
|
||||
+56
@@ -0,0 +1,56 @@
|
||||
[metadata]
|
||||
creation_date = "2022/01/06"
|
||||
integration = "o365"
|
||||
maturity = "production"
|
||||
updated_date = "2022/01/06"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
description = """
|
||||
In Azure Active Directory (Azure AD), permissions to manage resources are assigned using Roles. The Global Administrator
|
||||
is a role that enables users to have access to all administrative features in Azure AD and services that use Azure
|
||||
Active Directory identities like the Microsoft 365 Defender portal, the Microsoft 365 compliance center, Exchange,
|
||||
SharePoint Online, and Skype for Business Online. Attackers can add users as Global Administrators to maintain access
|
||||
and manage all subscriptions and their settings and resources.
|
||||
"""
|
||||
from = "now-25m"
|
||||
index = ["filebeat-*", "logs-o365*"]
|
||||
language = "kuery"
|
||||
license = "Elastic License v2"
|
||||
name = "Microsoft 365 Global Administrator Role Assigned"
|
||||
note = """## Config
|
||||
|
||||
The Microsoft 365 Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
|
||||
references = [
|
||||
"https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#global-administrator"
|
||||
]
|
||||
risk_score = 47
|
||||
rule_id = "88671231-6626-4e1b-abb7-6e361a171fbb"
|
||||
severity = "medium"
|
||||
tags = ["Elastic", "Cloud", "Microsoft 365", "Continuous Monitoring", "SecOps", "Identity and Access"]
|
||||
timestamp_override = "event.ingested"
|
||||
type = "query"
|
||||
|
||||
query = '''
|
||||
event.dataset:o365.audit and event.code:"AzureActiveDirectory" and event.action:"Add member to role." and
|
||||
o365.audit.ModifiedProperties.Role_DisplayName.NewValue:"Global Administrator"
|
||||
'''
|
||||
|
||||
|
||||
[[rule.threat]]
|
||||
framework = "MITRE ATT&CK"
|
||||
|
||||
[[rule.threat.technique]]
|
||||
reference = "https://attack.mitre.org/techniques/T1098/"
|
||||
name = "Account Manipulation"
|
||||
id = "T1098"
|
||||
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
reference = "https://attack.mitre.org/techniques/T1098/003/"
|
||||
name = "Add Office 365 Global Administrator Role"
|
||||
id = "T1098.003"
|
||||
|
||||
[rule.threat.tactic]
|
||||
id = "TA0003"
|
||||
name = "Persistence"
|
||||
reference = "https://attack.mitre.org/tactics/TA0003/"
|
||||
Reference in New Issue
Block a user