Skip to content

Commit 2143110

Browse files
[New Rule] Azure External Guest User Invitation (#231)
* Create initial_access_external_guest_user_invite.toml * Update rules/azure/initial_access_external_guest_user_invite.toml Co-authored-by: David French <[email protected]> * update mitre metadata * lint Co-authored-by: David French <[email protected]>
1 parent 0fc78b3 commit 2143110

File tree

1 file changed

+66
-0
lines changed

1 file changed

+66
-0
lines changed
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
[metadata]
2+
creation_date = "2020/08/31"
3+
ecs_version = ["1.6.0"]
4+
maturity = "production"
5+
updated_date = "2020/08/31"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
Identifies an invitation to an external user in Azure Active Directory (AD). Azure AD is extended to include
11+
collaboration, allowing you to invite people from outside your organization to be guest users in your cloud account.
12+
Unless there is a business need to provision guest access, it is best practice avoid creating guest users. Guest users
13+
could potentially be overlooked indefinitely leading to a potential vulnerability.
14+
"""
15+
false_positives = [
16+
"""
17+
Guest user invitations may be sent out by a system or network administrator. Verify whether the username, hostname,
18+
and/or resource name should be making changes in your environment. Guest user invitations from unfamiliar users or
19+
hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
20+
""",
21+
]
22+
from = "now-25m"
23+
index = ["filebeat-*"]
24+
language = "kuery"
25+
license = "Elastic License"
26+
name = "Azure External Guest User Invitation"
27+
note = "The Azure Filebeat module must be enabled to use this rule."
28+
references = ["https://docs.microsoft.com/en-us/azure/governance/policy/samples/cis-azure-1-1-0"]
29+
risk_score = 21
30+
rule_id = "141e9b3a-ff37-4756-989d-05d7cbf35b0e"
31+
severity = "low"
32+
tags = ["Elastic", "Azure", "SecOps", "Continuous Monitoring", "Identity and Access"]
33+
type = "query"
34+
35+
query = '''
36+
event.module:azure and event.dataset:azure.auditlogs and event.category:AuditLogs and azure.auditlogs.operation_name:"Invite external user" and azure.auditlogs.properties.target_resources.*.display_name:guest and event.outcome:Success
37+
'''
38+
39+
40+
[[rule.threat]]
41+
framework = "MITRE ATT&CK"
42+
[[rule.threat.technique]]
43+
id = "T1078"
44+
name = "Valid Accounts"
45+
reference = "https://attack.mitre.org/techniques/T1078/"
46+
47+
48+
[rule.threat.tactic]
49+
id = "TA0001"
50+
name = "Initial Access"
51+
reference = "https://attack.mitre.org/tactics/TA0001/"
52+
53+
54+
[[rule.threat]]
55+
framework = "MITRE ATT&CK"
56+
[[rule.threat.technique]]
57+
id = "T1078"
58+
name = "Valid Accounts"
59+
reference = "https://attack.mitre.org/techniques/T1078/"
60+
61+
62+
[rule.threat.tactic]
63+
id = "TA0003"
64+
name = "Persistence"
65+
reference = "https://attack.mitre.org/tactics/TA0003/"
66+

0 commit comments

Comments
 (0)