Skip to content

Commit 871cfb6

Browse files
authored
[Rule Tuning] Excessive Secret or Key Retrieval from Azure Key Vault (#5220)
1 parent 574c8d6 commit 871cfb6

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

rules/integrations/azure/credential_access_azure_key_vault_excessive_retrieval.toml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/07/10"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/09/26"
5+
updated_date = "2025/10/14"
66

77
[rule]
88
author = ["Elastic"]
@@ -42,7 +42,7 @@ Azure Key Vault is a cloud service that safeguards encryption keys and secrets l
4242
- Check the `azure.platformlogs.identity.claim.appid` or `azure.platformlogs.identity.claim.appid_display_name` to identify the application or service making the requests. If the application is not recognized or authorized, it may indicate a potential security incident. It is plausible that the application is a FOCI compliant application, which are commonly abused by adversaries to evade security controls or conditional access policies.
4343
- Analyze the `azure.platformlogs.resource.name` field to determine which Key Vault is being accessed. This can help assess the impact of the retrieval operations and whether they target sensitive resources.
4444
- Review the `event.action` field to confirm the specific actions being performed, such as `KeyGet`, `SecretGet`, or `CertificateGet`. These actions indicate retrieval of keys, secrets, or certificates from the Key Vault.
45-
- Check the `source.ip` or `geo.*` fields to identify the source of the retrieval requests. Look for unusual or unexpected IP addresses, especially those associated with known malicious activity or geographic locations that do not align with the user's typical behavior.
45+
- Check the `source.ip` or `source.geo.*` fields to identify the source of the retrieval requests. Look for unusual or unexpected IP addresses, especially those associated with known malicious activity or geographic locations that do not align with the user's typical behavior.
4646
- Use the `time_window` field to analyze the frequency of retrieval operations. If multiple retrievals occur within a short time frame (e.g., within a few minutes), it may indicate excessive or suspicious activity.
4747
- Correlate the retrieval operations with other security events or alerts in the environment to identify any patterns or related incidents.
4848
- Triage the user with Entra ID sign-in logs to gather more context about their authentication behavior and any potential anomalies.
@@ -123,9 +123,9 @@ from logs-azure.platformlogs-* metadata _id, _index
123123
Esql.azure_platformlogs_identity_claim_appid_values = values(azure.platformlogs.identity.claim.appid),
124124
125125
Esql.source_ip_values = values(source.ip),
126-
Esql.geo_city_values = values(geo.city_name),
127-
Esql.geo_region_values = values(geo.region_name),
128-
Esql.geo_country_values = values(geo.country_name),
126+
Esql.source_geo_city_values = values(source.geo.city_name),
127+
Esql.source_geo_region_values = values(source.geo.region_name),
128+
Esql.source_geo_country_values = values(source.geo.country_name),
129129
Esql.source_as_organization_name_values = values(source.as.organization.name),
130130
131131
Esql.event_action_values = values(event.action),
@@ -150,9 +150,9 @@ by Esql.time_window_date_trunc, azure.platformlogs.identity.claim.upn
150150
Esql.azure_platformlogs_identity_claim_upn_count_distinct,
151151
Esql.azure_platformlogs_identity_claim_appid_values,
152152
Esql.source_ip_values,
153-
Esql.geo_city_values,
154-
Esql.geo_region_values,
155-
Esql.geo_country_values,
153+
Esql.source_geo_city_values,
154+
Esql.source_geo_region_values,
155+
Esql.source_geo_country_values,
156156
Esql.source_as_organization_name_values,
157157
Esql.event_action_values,
158158
Esql.event_count,

0 commit comments

Comments
 (0)