Authomize_v2_CL
| where ingestion_time() >= ago(30m)
| extend EventID = id_s, Policy = policy_name_s, Severity = severity_s,Description = description_s,Recommendation = recommendation_s,URL = url_s,Tactics = tactics_s
| where Policy has "New service account gained access to IaaS resource"
| project EventID, Policy, Severity, Description, Recommendation, URL, Category, Tactics
customDetails:
ReferencedURL: URL
EventRecommendation: Recommendation
EventName: Policy
EventDescription: Description
AuthomizeEventID: EventID
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Authomize/Analytic Rules/New_service_account_gained_access_to_IaaS_resource.yaml
alertDetailsOverride:
alertTactics: Tactics
alertDynamicProperties:
- value: URL
alertProperty: AlertLink
alertnameFormat: Alert from Authomize - New service account gained access to IaaS resource
alertSeverity: Severity
alertDescriptionFormat: New service account gained access to IaaS resource. This policy detects when an application or service account gained new access to your assets. This policy is defined by Authomize and can be edited to change the configuration.
query: |-
Authomize_v2_CL
| where ingestion_time() >= ago(30m)
| extend EventID = id_s, Policy = policy_name_s, Severity = severity_s,Description = description_s,Recommendation = recommendation_s,URL = url_s,Tactics = tactics_s
| where Policy has "New service account gained access to IaaS resource"
| project EventID, Policy, Severity, Description, Recommendation, URL, Category, Tactics
requiredDataConnectors:
- dataTypes:
- Authomize_v2_CL
connectorId: Authomize
tactics:
- InitialAccess
incidentConfiguration:
groupingConfiguration:
groupByCustomDetails: []
enabled: true
matchingMethod: AnyAlert
groupByEntities: []
lookbackDuration: 5h
groupByAlertDetails: []
reopenClosedIncident: false
createIncident: true
kind: Scheduled
name: New service account gained access to IaaS resource
relevantTechniques:
- T1078
severity: Informational
entityMappings:
- fieldMappings:
- identifier: Url
columnName: URL
entityType: URL
triggerOperator: gt
description: This policy detects when an application or service account gained new access to your assets. This policy is defined by Authomize and can be edited to change the configuration.
queryFrequency: 30m
triggerThreshold: 0
queryPeriod: 30m
version: 1.0.3
suppressionEnabled: false
suppressionDuration: 5h
eventGroupingSettings:
aggregationKind: SingleAlert
id: 6c17f270-cd56-48cc-9196-1728ffea6538