Skip to content

Commit 140091e

Browse files
[New Rule] Azure Storage Account Key Regenerated (#188)
* Create credential_access_storage_account_key_regenerated.toml * Update rules/azure/credential_access_storage_account_key_regenerated.toml Co-authored-by: David French <[email protected]> * Update credential_access_storage_account_key_regenerated.toml Co-authored-by: David French <[email protected]>
1 parent 040f56f commit 140091e

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
[metadata]
2+
creation_date = "2020/08/19"
3+
ecs_version = ["1.6.0"]
4+
maturity = "production"
5+
updated_date = "2020/08/19"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
Identifies a rotation to storage account access keys in Azure. Regenerating access keys can affect any applications or
11+
Azure services that are dependent on the storage account key. Adversaries may regenerate a key as a means of acquiring
12+
credentials to access systems and resources.
13+
"""
14+
false_positives = [
15+
"""
16+
It's recommended that you rotate your access keys periodically to help keep your storage account secure. Normal key
17+
rotation can be exempted from the rule. An abnormal time frame and/or a key rotation from unfamiliar users, hosts,
18+
or locations should be investigated.
19+
""",
20+
]
21+
from = "now-25m"
22+
index = ["filebeat-*"]
23+
language = "kuery"
24+
license = "Elastic License"
25+
name = "Azure Storage Account Key Regenerated"
26+
note = "The Azure Filebeat module must be enabled to use this rule."
27+
references = [
28+
"https://docs.microsoft.com/en-us/azure/storage/common/storage-account-keys-manage?tabs=azure-portal",
29+
]
30+
risk_score = 21
31+
rule_id = "1e0b832e-957e-43ae-b319-db82d228c908"
32+
severity = "low"
33+
tags = ["Azure", "Elastic", "SecOps", "Continuous Monitoring", "Identity and Access"]
34+
type = "query"
35+
36+
query = '''
37+
event.module:azure and event.dataset:azure.activitylogs and event.category:Administrative and azure.activitylogs.operation_name:MICROSOFT.STORAGE/STORAGEACCOUNTS/REGENERATEKEY/ACTION and event.outcome:Success
38+
'''
39+
40+
41+
[[rule.threat]]
42+
framework = "MITRE ATT&CK"
43+
[[rule.threat.technique]]
44+
id = "T1528"
45+
name = "Steal Application Access Token"
46+
reference = "https://attack.mitre.org/techniques/T1528/"
47+
48+
49+
[rule.threat.tactic]
50+
id = "TA0006"
51+
name = "Credential Access"
52+
reference = "https://attack.mitre.org/tactics/TA0006/"
53+

0 commit comments

Comments
 (0)