Authomize_v2_CL
| where ingestion_time() >= ago(30m)
| extend EventID = id_s, Policy = policy_name_s, Severity = severity_s,Description = description_s,Recommendation = recommendation_s,URL = url_s,Tactics = tactics_s
| where Policy has "New service account gained access to IaaS resource"
| project EventID, Policy, Severity, Description, Recommendation, URL, Category, Tactics
severity: Informational
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Authomize/Analytic Rules/New_service_account_gained_access_to_IaaS_resource.yaml
id: 6c17f270-cd56-48cc-9196-1728ffea6538
customDetails:
EventRecommendation: Recommendation
ReferencedURL: URL
EventDescription: Description
AuthomizeEventID: EventID
EventName: Policy
entityMappings:
- fieldMappings:
- identifier: Url
columnName: URL
entityType: URL
kind: Scheduled
status: Available
tactics:
- InitialAccess
queryFrequency: 30m
eventGroupingSettings:
aggregationKind: SingleAlert
requiredDataConnectors:
- connectorId: Authomize
dataTypes:
- Authomize_v2_CL
relevantTechniques:
- T1078
version: 1.0.3
incidentConfiguration:
groupingConfiguration:
groupByEntities: []
matchingMethod: AnyAlert
groupByCustomDetails: []
groupByAlertDetails: []
enabled: true
reopenClosedIncident: false
lookbackDuration: 5h
createIncident: true
description: This policy detects when an application or service account gained new access to your assets. This policy is defined by Authomize and can be edited to change the configuration.
alertDetailsOverride:
alertDynamicProperties:
- value: URL
alertProperty: AlertLink
alertDescriptionFormat: New service account gained access to IaaS resource. This policy detects when an application or service account gained new access to your assets. This policy is defined by Authomize and can be edited to change the configuration.
alertSeverity: Severity
alertnameFormat: Alert from Authomize - New service account gained access to IaaS resource
alertTactics: Tactics
triggerThreshold: 0
query: |-
Authomize_v2_CL
| where ingestion_time() >= ago(30m)
| extend EventID = id_s, Policy = policy_name_s, Severity = severity_s,Description = description_s,Recommendation = recommendation_s,URL = url_s,Tactics = tactics_s
| where Policy has "New service account gained access to IaaS resource"
| project EventID, Policy, Severity, Description, Recommendation, URL, Category, Tactics
suppressionEnabled: false
queryPeriod: 30m
suppressionDuration: 5h
name: New service account gained access to IaaS resource