Authomize_v2_CL
| where ingestion_time() >= ago(30m)
| extend EventID = id_s, Policy = policy_name_s, Severity = severity_s,Description = description_s,Recommendation = recommendation_s,URL = url_s,Tactics = tactics_s
| where Policy has "New service account gained access to IaaS resource"
| project EventID, Policy, Severity, Description, Recommendation, URL, Category, Tactics
eventGroupingSettings:
aggregationKind: SingleAlert
requiredDataConnectors:
- connectorId: Authomize
dataTypes:
- Authomize_v2_CL
suppressionEnabled: false
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Authomize/Analytic Rules/New_service_account_gained_access_to_IaaS_resource.yaml
triggerThreshold: 0
status: Available
relevantTechniques:
- T1078
queryPeriod: 30m
name: New service account gained access to IaaS resource
entityMappings:
- entityType: URL
fieldMappings:
- columnName: URL
identifier: Url
alertDetailsOverride:
alertSeverity: Severity
alertDescriptionFormat: New service account gained access to IaaS resource. This policy detects when an application or service account gained new access to your assets. This policy is defined by Authomize and can be edited to change the configuration.
alertnameFormat: Alert from Authomize - New service account gained access to IaaS resource
alertTactics: Tactics
alertDynamicProperties:
- value: URL
alertProperty: AlertLink
customDetails:
AuthomizeEventID: EventID
EventDescription: Description
EventName: Policy
EventRecommendation: Recommendation
ReferencedURL: URL
suppressionDuration: 5h
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: true
lookbackDuration: 5h
groupByEntities: []
groupByCustomDetails: []
reopenClosedIncident: false
matchingMethod: AnyAlert
groupByAlertDetails: []
queryFrequency: 30m
triggerOperator: gt
kind: Scheduled
description: This policy detects when an application or service account gained new access to your assets. This policy is defined by Authomize and can be edited to change the configuration.
tactics:
- InitialAccess
severity: Informational
version: 1.0.3
query: |-
Authomize_v2_CL
| where ingestion_time() >= ago(30m)
| extend EventID = id_s, Policy = policy_name_s, Severity = severity_s,Description = description_s,Recommendation = recommendation_s,URL = url_s,Tactics = tactics_s
| where Policy has "New service account gained access to IaaS resource"
| project EventID, Policy, Severity, Description, Recommendation, URL, Category, Tactics
id: 6c17f270-cd56-48cc-9196-1728ffea6538