[Rule Tuning] Entra ID Federated Identity Credential Persistence Detection#5702
[Rule Tuning] Entra ID Federated Identity Credential Persistence Detection#5702terrancedejesus wants to merge 9 commits intomainfrom
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
1 similar comment
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
| | dissect Esql.target_resources_new_value_clean "%{}\"Issuer\":\"%{Esql.external_idp_new_issuer}\"%{}" | ||
| | where Esql.external_idp_old_issuer is not null and Esql.external_idp_new_issuer is not null | ||
| | where Esql.external_idp_old_issuer != Esql.external_idp_new_issuer | ||
| | keep @timestamp, Esql.*, azure.*, event.*, cloud.*, related.*, tags, source.*, agent.*, client.*, _id, _version, _index |
There was a problem hiding this comment.
data_stream.namespace since we were explicitly asked to keep this field in ESQL rules, I'm sure there's a better way to keep track of this kind of request
| application's service principal and gain persistent access to Azure resources. This technique allows bypassing | ||
| traditional authentication controls by federating trust with a malicious external identity provider. | ||
| """ | ||
| from = "now-1h" |
There was a problem hiding this comment.
Why such a long lookback window if we're only interested in a single event?
| value = ["azure.signinlogs.properties.app_id"] | ||
| [[rule.new_terms.history_window_start]] | ||
| field = "history_window_start" | ||
| value = "now-5d" |
There was a problem hiding this comment.
seems like a short window for this but I'm not sure how often we would expect a service principal to use these type of credentials, if once a week were normal it wouldn't be tuned out with this short a window.
| ] | ||
| risk_score = 73 | ||
| rule_id = "498e4094-60e7-11f0-8847-f661ea17fbcd" | ||
| severity = "high" |
There was a problem hiding this comment.
we're sure about the severity? Don't want to wait on some telemetry for this one?
Fixes #5701
Pull Request
Issue link(s):
Summary - What I changed
Tunes the
Entra ID OIDC Discovery URL Modifiedto focus on federated credential policy updates to applications where a new issuer is enabled.Entra ID OIDC Discovery URL Modifiedwas a dormant rule with no hits in the last 180 days. During research, discovered a gap in detecting anomalous logins that would follow from the adversary in BYOIDP scenarios. Please see linked issue for more details.How To Test
Queries can be used in TRADE stack.
Checklist
bug,enhancement,schema,maintenance,Rule: New,Rule: Deprecation,Rule: Tuning,Hunt: New, orHunt: Tuningso guidelines can be generatedmeta:rapid-mergelabel if planning to merge within 24 hoursContributor checklist