Skip to content

Commit d808709

Browse files
updated tags and linted
1 parent 2d06763 commit d808709

File tree

1 file changed

+18
-14
lines changed

1 file changed

+18
-14
lines changed

rules/integrations/azure/defense_evasion_azure_diagnostic_settings_deletion.toml

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -59,16 +59,18 @@ Azure Diagnostic Settings are crucial for monitoring and logging platform activi
5959
"""
6060
references = [
6161
"https://docs.microsoft.com/en-us/azure/azure-monitor/platform/diagnostic-settings",
62-
"https://www.microsoft.com/en-us/security/blog/2025/10/20/inside-the-attack-chain-threat-activity-targeting-azure-blob-storage/"]
62+
"https://www.microsoft.com/en-us/security/blog/2025/10/20/inside-the-attack-chain-threat-activity-targeting-azure-blob-storage/",
63+
]
6364
risk_score = 47
6465
rule_id = "5370d4cd-2bb3-4d71-abf5-1e1d0ff5a2de"
6566
severity = "medium"
6667
tags = [
6768
"Domain: Cloud",
6869
"Data Source: Azure",
6970
"Data Source: Azure Activity Logs",
71+
"Use Case: Threat Detection",
7072
"Tactic: Defense Evasion",
71-
"Resources: Investigation Guide"
73+
"Resources: Investigation Guide",
7274
]
7375
timestamp_override = "event.ingested"
7476
type = "new_terms"
@@ -79,18 +81,6 @@ event.dataset:azure.activitylogs
7981
and event.outcome:(Success or success)
8082
'''
8183

82-
[rule.investigation_fields]
83-
field_names = [
84-
"@timestamp",
85-
"event.action",
86-
"source.ip",
87-
"azure.activitylogs.identity.authorization.evidence.principal_type",
88-
"azure.activitylogs.identity.authorization.evidence.role_assignment_scope",
89-
"azure.activitylogs.properties.entity",
90-
"azure.activitylogs.identity.claims.appid",
91-
"azure.resource.name",
92-
"azure.resource.provider"
93-
]
9484

9585
[[rule.threat]]
9686
framework = "MITRE ATT&CK"
@@ -109,11 +99,25 @@ name = "Disable or Modify Cloud Logs"
10999
reference = "https://attack.mitre.org/techniques/T1562/008/"
110100

111101

102+
112103
[rule.threat.tactic]
113104
id = "TA0005"
114105
name = "Defense Evasion"
115106
reference = "https://attack.mitre.org/tactics/TA0005/"
116107

108+
[rule.investigation_fields]
109+
field_names = [
110+
"@timestamp",
111+
"event.action",
112+
"source.ip",
113+
"azure.activitylogs.identity.authorization.evidence.principal_type",
114+
"azure.activitylogs.identity.authorization.evidence.role_assignment_scope",
115+
"azure.activitylogs.properties.entity",
116+
"azure.activitylogs.identity.claims.appid",
117+
"azure.resource.name",
118+
"azure.resource.provider",
119+
]
120+
117121
[rule.new_terms]
118122
field = "new_terms_fields"
119123
value = ["azure.resource.group"]

0 commit comments

Comments
 (0)