Authomize_v2_CL
| where ingestion_time() >= ago(30m)
| extend EventID = id_s, Policy = policy_name_s, Severity = severity_s,Description = description_s,Recommendation = recommendation_s,URL = url_s,Tactics = tactics_s
| where Policy has "New service account gained access to IaaS resource"
| project EventID, Policy, Severity, Description, Recommendation, URL, Category, Tactics
incidentConfiguration:
createIncident: true
groupingConfiguration:
groupByEntities: []
matchingMethod: AnyAlert
lookbackDuration: 5h
groupByAlertDetails: []
reopenClosedIncident: false
enabled: true
groupByCustomDetails: []
relevantTechniques:
- T1078
queryFrequency: 30m
description: This policy detects when an application or service account gained new access to your assets. This policy is defined by Authomize and can be edited to change the configuration.
version: 1.0.3
triggerThreshold: 0
id: 6c17f270-cd56-48cc-9196-1728ffea6538
name: New service account gained access to IaaS resource
queryPeriod: 30m
customDetails:
EventDescription: Description
EventRecommendation: Recommendation
ReferencedURL: URL
EventName: Policy
AuthomizeEventID: EventID
query: |-
Authomize_v2_CL
| where ingestion_time() >= ago(30m)
| extend EventID = id_s, Policy = policy_name_s, Severity = severity_s,Description = description_s,Recommendation = recommendation_s,URL = url_s,Tactics = tactics_s
| where Policy has "New service account gained access to IaaS resource"
| project EventID, Policy, Severity, Description, Recommendation, URL, Category, Tactics
severity: Informational
eventGroupingSettings:
aggregationKind: SingleAlert
triggerOperator: gt
entityMappings:
- fieldMappings:
- columnName: URL
identifier: Url
entityType: URL
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Authomize/Analytic Rules/New_service_account_gained_access_to_IaaS_resource.yaml
requiredDataConnectors:
- connectorId: Authomize
dataTypes:
- Authomize_v2_CL
alertDetailsOverride:
alertDescriptionFormat: New service account gained access to IaaS resource. This policy detects when an application or service account gained new access to your assets. This policy is defined by Authomize and can be edited to change the configuration.
alertTactics: Tactics
alertDynamicProperties:
- value: URL
alertProperty: AlertLink
alertnameFormat: Alert from Authomize - New service account gained access to IaaS resource
alertSeverity: Severity
status: Available
suppressionDuration: 5h
tactics:
- InitialAccess
suppressionEnabled: false
kind: Scheduled