Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Azure Keyvault Key Modified or Deleted

Identifies when a Keyvault Key is modified or deleted in Azure.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1552 · Unsecured CredentialsT1552.001 · Credentials In Files
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Key Vault Modified or Deleted

Identifies when a key vault is modified or deleted.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1552 · Unsecured CredentialsT1552.001 · Credentials In Files
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Keyvault Secrets Modified or Deleted

Identifies when secrets are modified or deleted in Azure.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1552 · Unsecured CredentialsT1552.001 · Credentials In Files
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Kubernetes Admission Controller

Identifies when an admission controller is executed in Azure Kubernetes. A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server. The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster. An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster. For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod. An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials. An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.

Azureactivitylogs
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
Austin SongerThu Nov 25cloud
Detectionlowtest

Azure Kubernetes Cluster Created or Deleted

Detects when a Azure Kubernetes Cluster is created or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes CronJob

Identifies when a Azure Kubernetes CronJob runs in Azure Cloud. Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. An Adversary may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.

Azureactivitylogs
TA0003 · PersistenceT1053.003 · CronTA0004 · Privilege EscalationTA0002 · Execution
Austin SongerMon Nov 22cloud
Detectionmediumtest

Azure Kubernetes Events Deleted

Detects when Events are deleted in Azure Kubernetes. An adversary may delete events in Azure Kubernetes in an attempt to evade detection.

Azureactivitylogs
TA0005 · Defense EvasionT1562 · Impair DefensesT1562.001 · Disable or Modify Tools
Austin SongerSat Jul 24cloud
Detectionmediumtest

Azure Kubernetes Network Policy Change

Identifies when a Azure Kubernetes network policy is modified or deleted.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1485 · Data DestructionT1496 · Resource Hijacking+1
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Pods Deleted

Identifies the deletion of Azure Kubernetes Pods.

Azureactivitylogs
TA0040 · Impact
Austin SongerSat Jul 24cloud
Detectionmediumtest

Azure Kubernetes RoleBinding/ClusterRoleBinding Modified and Deleted

Detects the creation or patching of potential malicious RoleBinding/ClusterRoleBinding.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1485 · Data DestructionT1496 · Resource Hijacking+1
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Sensitive Role Access

Identifies when ClusterRoles/Roles are being modified or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Secret or Config Object Access

Identifies when a Kubernetes account access a sensitive objects such as configmaps or secrets.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Service Account Modified or Deleted

Identifies when a service account is modified or deleted.

Azureactivitylogs
TA0040 · ImpactT1531 · Account Access RemovalT1485 · Data DestructionT1496 · Resource Hijacking+1
Austin SongerSat Aug 07cloud
Detectionmediumtest

Disabled MFA to Bypass Authentication Mechanisms

Detection for when multi factor authentication has been disabled, which might indicate a malicious activity to bypass authentication mechanisms.

Azureactivitylogs
TA0005 · Defense EvasionTA0006 · Credential AccessTA0003 · PersistenceT1556 · Modify Authentication Process
@ionsorTue Feb 08cloud
Detectionmediumtest

Azure Network Firewall Policy Modified or Deleted

Identifies when a Firewall Policy is Modified or Deleted.

Azureactivitylogs
TA0040 · ImpactTA0005 · Defense EvasionT1562.007 · Disable or Modify Cloud Firewall
Austin SongerThu Sep 02cloud
Detectionmediumtest

Azure Firewall Rule Configuration Modified or Deleted

Identifies when a Firewall Rule Configuration is Modified or Deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Point-to-site VPN Modified or Deleted

Identifies when a Point-to-site VPN is Modified or Deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Network Security Configuration Modified or Deleted

Identifies when a network security configuration is modified or deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Virtual Network Device Modified or Deleted

Identifies when a virtual network device is being modified or deleted. This can be a network interface, network virtual appliance, virtual hub, or virtual router.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure New CloudShell Created

Identifies when a new cloudshell is created inside of Azure portal.

Azureactivitylogs
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Austin SongerTue Sep 21cloud
Detectionmediumtest

Azure Owner Removed From Application or Service Principal

Identifies when a owner is was removed from a application or service principal in Azure.

Azureactivitylogs
TA0005 · Defense Evasion
Austin SongerFri Sep 03cloud
Detectionmediumtest

Rare Subscription-level Operations In Azure

Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.

Azureactivitylogs
T1003 · OS Credential DumpingTA0006 · Credential Access
sawwinnnaungThu May 07cloud
Detectionmediumtest

Azure Service Principal Created

Identifies when a service principal is created in Azure.

Azureactivitylogs
TA0005 · Defense Evasion
Austin SongerThu Sep 02cloud
Detectionmediumtest

Azure Service Principal Removed

Identifies when a service principal was removed in Azure.

Azureactivitylogs
TA0005 · Defense Evasion
Austin SongerFri Sep 03cloud
Detectionhightest

Azure Subscription Permission Elevation Via ActivityLogs

Detects when a user has been elevated to manage all Azure Subscriptions. This change should be investigated immediately if it isn't planned. This setting could allow an attacker access to Azure subscriptions in your environment.

Azureactivitylogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerFri Nov 26cloud
Detectionmediumtest

Azure Suppression Rule Created

Identifies when a suppression rule is created in Azure. Adversary's could attempt this to evade detection.

Azureactivitylogs
TA0040 · Impact
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Virtual Network Modified or Deleted

Identifies when a Virtual Network is modified or deleted in Azure.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure VPN Connection Modified or Deleted

Identifies when a VPN connection is modified or deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

CA Policy Removed by Non Approved Actor

Monitor and alert on conditional access changes where non approved actor removed CA Policy.

Azureauditlogs
TA0004 · Privilege EscalationTA0006 · Credential AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Corissa KoopmansTue Jul 19cloud
Detectionmediumtest

CA Policy Updated by Non Approved Actor

Monitor and alert on conditional access changes. Is Initiated by (actor) approved to make changes? Review Modified Properties and compare "old" vs "new" value.

Azureauditlogs
TA0004 · Privilege EscalationTA0006 · Credential AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Corissa KoopmansTue Jul 19cloud
Detectionmediumtest

New CA Policy by Non-approved Actor

Monitor and alert on conditional access changes.

Azureauditlogs
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism
Corissa KoopmansMon Jul 18cloud
Detectionhightest

Account Created And Deleted Within A Close Time Frame

Detects when an account was created and deleted in a short period of time.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Mark Morowczynski+2Thu Aug 11cloud
Detectionmediumtest

Bitlocker Key Retrieval

Monitor and alert for Bitlocker key retrieval.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Michael EppingTue Jun 28cloud
Detectionmediumtest

Certificate-Based Authentication Enabled

Detects when certificate based authentication has been enabled in an Azure Active Directory tenant.

Azureauditlogs
TA0005 · Defense EvasionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+1
Harjot Shah SinghTue Mar 26cloud
Detectionhightest

Changes to Device Registration Policy

Monitor and alert for changes to the device registration policy.

Azureauditlogs
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1484 · Domain or Tenant Policy Modification
Michael EppingTue Jun 28cloud
Detectionmediumtest

Guest Users Invited To Tenant By Non Approved Inviters

Detects guest users being invited to tenant by non-approved inviters

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Mike DuddingtonThu Jul 28cloud
Detectionmediumtest

New Root Certificate Authority Added

Detects newly added root certificate authority to an AzureAD tenant to support certificate based authentication.

Azureauditlogs
TA0005 · Defense EvasionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+1
Harjot Shah SinghTue Mar 26cloud
Detectionhightest

Users Added to Global or Device Admin Roles

Monitor and alert for users added to device admin roles.

Azureauditlogs
TA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Michael EppingTue Jun 28cloud
Detectionhightest

Application AppID Uri Configuration Changes

Detects when a configuration change is made to an applications AppID URI.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0006 · Credential Access+3
Mark Morowczynski+1Thu Jun 02cloud
Detectionhightest

Added Credentials to Existing Application

Detects when a new credential is added to an existing application. Any additional credentials added outside of expected processes could be a malicious actor using those credentials.

Azureauditlogs
TA0004 · Privilege EscalationT1098.001 · Additional Cloud CredentialsTA0003 · Persistence
Mark Morowczynski+1Thu May 26cloud
Detectionhightest

Delegated Permissions Granted For All Users

Detects when highly privileged delegated permissions are granted on behalf of all users

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Thu Jul 28cloud
Detectionlowtest

End User Consent

Detects when an end user consents to an application

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Thu Jul 28cloud
Detectionmediumtest

End User Consent Blocked

Detects when end user consent is blocked due to risk-based consent.

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Sun Jul 10cloud
Detectionmediumtest

Added Owner To Application

Detects when a new owner is added to an application. This gives that account privileges to make modifications and configuration changes to the application.

Azureauditlogs
T1552 · Unsecured CredentialsTA0006 · Credential Access
Mark Morowczynski+1Thu Jun 02cloud
Detectionhightest

App Granted Microsoft Permissions

Detects when an application is granted delegated or app role permissions for Microsoft Graph, Exchange, Sharepoint, or Azure AD

Azureauditlogs
TA0006 · Credential AccessT1528 · Steal Application Access Token
Bailey Bercik+1Sun Jul 10cloud
Detectionhightest

App Granted Privileged Delegated Or App Permissions

Detects when administrator grants either application permissions (app roles) or highly privileged delegated permissions

Azureauditlogs
TA0003 · PersistenceTA0004 · Privilege EscalationT1098.003 · Additional Cloud Roles
Bailey Bercik+1Thu Jul 28cloud
Detectionmediumtest

App Assigned To Azure RBAC/Microsoft Entra Role

Detects when an app is assigned Azure AD roles, such as global administrator, or Azure RBAC roles, such as subscription owner.

Azureauditlogs
TA0003 · PersistenceTA0004 · Privilege EscalationT1098.003 · Additional Cloud Roles
Bailey Bercik+1Tue Jul 19cloud
Detectionhightest

Application URI Configuration Changes

Detects when a configuration change is made to an applications URI. URIs for domain names that no longer exist (dangling URIs), not using HTTPS, wildcards at the end of the domain, URIs that are no unique to that app, or URIs that point to domains you do not control should be investigated.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionT1528 · Steal Application Access TokenT1078.004 · Cloud Accounts+3
Mark Morowczynski+1Thu Jun 02cloud