Detectionhightest
User Added To Privilege Role
Detects when a user is added to a privileged role.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Azureauditlogs
ProductAzure← raw: azure
Serviceauditlogs← raw: auditlogs
Detection Logic
Detection Logic1 selector
detection:
selection:
properties.message:
- Add eligible member (permanent)
- Add eligible member (eligible)
condition: selectionFalse Positives
Legtimate administrator actions of adding members from a role
References
MITRE ATT&CK
Rule Metadata
Rule ID
49a268a4-72f4-4e38-8a7b-885be690c5b5
Status
test
Level
high
Type
Detection
Created
Sat Aug 06
Path
rules/cloud/azure/audit_logs/azure_priviledged_role_assignment_add.yml
Raw Tags
attack.persistenceattack.initial-accessattack.privilege-escalationattack.defense-evasionattack.t1078.004