Credential added to Azure AD application
Set up the azure integration.
Detects when a user adds a secret or certificate to an Azure Active Directory Application.
Monitor Azure AD Audit logs for the following @evt.name
:
Update application – Certificates and secrets management
Add service principal credentials
Monitor Microsoft 365 Audit logs for the following @evt.name
:
Update application – Certificates and secrets management
Add service principal credentials.
An attacker can add a secret or certificate to an application in order to connect to Azure AD as the application and perform API operation leveraging the application permissions that are assigned to it.
- Determine if
{{@usr.id}}
should have made a {{@evt.name}}
API call. - If the API call was not made by the user:
- Remove the suspicious key.
- Invalidate all existing refresh tokens. This ensures the attacker is unable to connect to your tenant.
- Begin your organization’s Incident Response (IR) process.
- If the API call was made by the user:
- Ensure the change was authorized.