Skip to content

Commit df06e14

Browse files
terrancedejesustradebot-elastic
authored andcommitted
[Rule Tuning] Microsoft Entra ID Elevated Access to User Access Administrator (#5107)
* updating Azure AD Global Administrator Role Assigned * removed logic changes as it only effects outside of PIM. Adding a different rule for these * slight change to query * tuning rule Microsoft Entra ID Elevated Access to User Access Administrator * revert changes * Added operation name to query logic (cherry picked from commit bb08af5)
1 parent 0801223 commit df06e14

File tree

1 file changed

+11
-7
lines changed

1 file changed

+11
-7
lines changed

rules/integrations/azure/privilege_escalation_entra_id_elevate_to_user_administrator_access.toml

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2025/05/22"
33
integration = ["azure"]
44
maturity = "production"
5-
updated_date = "2025/05/22"
5+
updated_date = "2025/09/15"
66

77
[rule]
88
author = ["Elastic", "Austin Songer"]
@@ -23,7 +23,7 @@ note = """## Triage and Analysis
2323
2424
### Investigating Microsoft Entra ID Elevated Access to User Access Administrator
2525
26-
This rule identifies when a user elevates their permissions to the "User Access Administrator" role in Microsoft Entra ID (Azure AD). This role allows full control over access management for Azure resources and can be abused by attackers for lateral movement, persistence, or privilege escalation. Since this is a **New Terms** rule, the alert will only trigger if the user has not performed this elevation in the past 14 days, helping reduce alert fatigue.
26+
This rule identifies when a user elevates their permissions to the "User Access Administrator" role in Azure RBAC. This role allows full control over access management for Azure resources and can be abused by attackers for lateral movement, persistence, or privilege escalation. Since this is a New Terms rule, the alert will only trigger if the user has not performed this elevation in the past 14 days, helping reduce alert fatigue.
2727
2828
### Possible investigation steps
2929
@@ -61,12 +61,14 @@ This rule identifies when a user elevates their permissions to the "User Access
6161
references = [
6262
"https://learn.microsoft.com/en-us/azure/role-based-access-control/elevate-access-global-admin?tabs=azure-portal%2Centra-audit-logs/",
6363
"https://permiso.io/blog/azures-apex-permissions-elevate-access-the-logs-security-teams-overlook",
64+
"https://www.microsoft.com/en-us/security/blog/2025/08/27/storm-0501s-evolving-techniques-lead-to-cloud-based-ransomware/"
6465
]
65-
risk_score = 47
66+
risk_score = 73
6667
rule_id = "8d9c4128-372a-11f0-9d8f-f661ea17fbcd"
67-
severity = "medium"
68+
severity = "high"
6869
tags = [
6970
"Domain: Cloud",
71+
"Domain: Identity",
7072
"Data Source: Azure",
7173
"Data Source: Microsoft Entra ID",
7274
"Data Source: Microsoft Entra ID Audit Logs",
@@ -79,8 +81,10 @@ type = "new_terms"
7981

8082
query = '''
8183
event.dataset: azure.auditlogs
82-
and azure.auditlogs.operation_name: "User has elevated their access to User Access Administrator for their Azure Resources"
83-
and event.outcome: "success"
84+
and (
85+
azure.auditlogs.operation_name: "User has elevated their access to User Access Administrator for their Azure Resources" or
86+
azure.auditlogs.properties.additional_details.value: "Microsoft.Authorization/elevateAccess/action"
87+
) and event.outcome: "success"
8488
'''
8589

8690

@@ -107,6 +111,6 @@ field = "new_terms_fields"
107111
value = ["azure.auditlogs.properties.initiated_by.user.userPrincipalName"]
108112
[[rule.new_terms.history_window_start]]
109113
field = "history_window_start"
110-
value = "now-14d"
114+
value = "now-7d"
111115

112116

0 commit comments

Comments
 (0)