Detectionmediumtest

App Assigned To Azure RBAC/Microsoft Entra Role

Detects when an app is assigned Azure AD roles, such as global administrator, or Azure RBAC roles, such as subscription owner.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Bailey Bercik, Mark MorowczynskiCreated Tue Jul 19Updated Mon Nov 04b04934b2-0a68-4845-8a19-bdfed3a68a7acloud
Log Source
Azureauditlogs
ProductAzure← raw: azure
Serviceauditlogs← raw: auditlogs
Detection Logic
Detection Logic1 selector
detection:
    selection:
        targetResources.type: 'Service Principal'
        properties.message:
            - Add member to role
            - Add eligible member to role
            - Add scoped member to role
    condition: selection
False Positives

When the permission is legitimately needed for the app

Rule Metadata
Rule ID
b04934b2-0a68-4845-8a19-bdfed3a68a7a
Status
test
Level
medium
Type
Detection
Created
Tue Jul 19
Modified
Mon Nov 04
Path
rules/cloud/azure/audit_logs/azure_app_role_added.yml
Raw Tags
attack.persistenceattack.privilege-escalationattack.t1098.003
View on GitHub