You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/integrations/azure/credential_access_azure_key_vault_excessive_retrieval.toml
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
creation_date = "2025/07/10"
3
3
integration = ["azure"]
4
4
maturity = "production"
5
-
updated_date = "2025/09/26"
5
+
updated_date = "2025/10/14"
6
6
7
7
[rule]
8
8
author = ["Elastic"]
@@ -42,7 +42,7 @@ Azure Key Vault is a cloud service that safeguards encryption keys and secrets l
42
42
- Check the `azure.platformlogs.identity.claim.appid` or `azure.platformlogs.identity.claim.appid_display_name` to identify the application or service making the requests. If the application is not recognized or authorized, it may indicate a potential security incident. It is plausible that the application is a FOCI compliant application, which are commonly abused by adversaries to evade security controls or conditional access policies.
43
43
- Analyze the `azure.platformlogs.resource.name` field to determine which Key Vault is being accessed. This can help assess the impact of the retrieval operations and whether they target sensitive resources.
44
44
- Review the `event.action` field to confirm the specific actions being performed, such as `KeyGet`, `SecretGet`, or `CertificateGet`. These actions indicate retrieval of keys, secrets, or certificates from the Key Vault.
45
-
- Check the `source.ip` or `geo.*` fields to identify the source of the retrieval requests. Look for unusual or unexpected IP addresses, especially those associated with known malicious activity or geographic locations that do not align with the user's typical behavior.
45
+
- Check the `source.ip` or `source.geo.*` fields to identify the source of the retrieval requests. Look for unusual or unexpected IP addresses, especially those associated with known malicious activity or geographic locations that do not align with the user's typical behavior.
46
46
- Use the `time_window` field to analyze the frequency of retrieval operations. If multiple retrievals occur within a short time frame (e.g., within a few minutes), it may indicate excessive or suspicious activity.
47
47
- Correlate the retrieval operations with other security events or alerts in the environment to identify any patterns or related incidents.
48
48
- Triage the user with Entra ID sign-in logs to gather more context about their authentication behavior and any potential anomalies.
@@ -123,9 +123,9 @@ from logs-azure.platformlogs-* metadata _id, _index
0 commit comments