@@ -59,16 +59,18 @@ Azure Diagnostic Settings are crucial for monitoring and logging platform activi
5959"""
6060references = [
6161 " https://docs.microsoft.com/en-us/azure/azure-monitor/platform/diagnostic-settings" ,
62- " https://www.microsoft.com/en-us/security/blog/2025/10/20/inside-the-attack-chain-threat-activity-targeting-azure-blob-storage/" ]
62+ " https://www.microsoft.com/en-us/security/blog/2025/10/20/inside-the-attack-chain-threat-activity-targeting-azure-blob-storage/" ,
63+ ]
6364risk_score = 47
6465rule_id = " 5370d4cd-2bb3-4d71-abf5-1e1d0ff5a2de"
6566severity = " medium"
6667tags = [
6768 " Domain: Cloud" ,
6869 " Data Source: Azure" ,
6970 " Data Source: Azure Activity Logs" ,
71+ " Use Case: Threat Detection" ,
7072 " Tactic: Defense Evasion" ,
71- " Resources: Investigation Guide"
73+ " Resources: Investigation Guide" ,
7274]
7375timestamp_override = " event.ingested"
7476type = " new_terms"
@@ -79,18 +81,6 @@ event.dataset:azure.activitylogs
7981 and event.outcome:(Success or success)
8082'''
8183
82- [rule .investigation_fields ]
83- field_names = [
84- " @timestamp" ,
85- " event.action" ,
86- " source.ip" ,
87- " azure.activitylogs.identity.authorization.evidence.principal_type" ,
88- " azure.activitylogs.identity.authorization.evidence.role_assignment_scope" ,
89- " azure.activitylogs.properties.entity" ,
90- " azure.activitylogs.identity.claims.appid" ,
91- " azure.resource.name" ,
92- " azure.resource.provider"
93- ]
9484
9585[[rule .threat ]]
9686framework = " MITRE ATT&CK"
@@ -109,11 +99,25 @@ name = "Disable or Modify Cloud Logs"
10999reference = " https://attack.mitre.org/techniques/T1562/008/"
110100
111101
102+
112103[rule .threat .tactic ]
113104id = " TA0005"
114105name = " Defense Evasion"
115106reference = " https://attack.mitre.org/tactics/TA0005/"
116107
108+ [rule .investigation_fields ]
109+ field_names = [
110+ " @timestamp" ,
111+ " event.action" ,
112+ " source.ip" ,
113+ " azure.activitylogs.identity.authorization.evidence.principal_type" ,
114+ " azure.activitylogs.identity.authorization.evidence.role_assignment_scope" ,
115+ " azure.activitylogs.properties.entity" ,
116+ " azure.activitylogs.identity.claims.appid" ,
117+ " azure.resource.name" ,
118+ " azure.resource.provider" ,
119+ ]
120+
117121[rule .new_terms ]
118122field = " new_terms_fields"
119123value = [" azure.resource.group" ]
0 commit comments