Azure secure score role overlap
| Id | 8E6D9A66-F1B0-463D-BA90-11A5AEC0E15A |
| Rulename | Azure secure score role overlap |
| Description | This query searches for accounts that have been assigned Global Administrator do not need other roles assigned. Global Administrators have access to all aspects of Azure |
| Severity | Medium |
| Tactics | Impact |
| Techniques | T1529 |
| Required data connectors | SenservaPro |
| Kind | Scheduled |
| Query frequency | 6h |
| Query period | 6h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/GlobaAdminRoleOverlap.yaml |
| Version | 1.0.0 |
| Arm template | 8E6D9A66-F1B0-463D-BA90-11A5AEC0E15A.json |
SenservaPro_CL
| where ControlName_s == 'AzureSecureScoreRoleOverlap'
relevantTechniques:
- T1529
queryPeriod: 6h
requiredDataConnectors:
- dataTypes:
- SenservaPro_CL
connectorId: SenservaPro
kind: Scheduled
triggerThreshold: 0
version: 1.0.0
id: 8E6D9A66-F1B0-463D-BA90-11A5AEC0E15A
severity: Medium
name: Azure secure score role overlap
status: Available
triggerOperator: gt
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: ControlName_s
- identifier: AadTenantId
columnName: TenantId
- identifier: DisplayName
columnName: TenantDisplayName_s
- entityType: SecurityGroup
fieldMappings:
- identifier: DistinguishedName
columnName: Group_s
- entityType: AzureResource
fieldMappings:
- identifier: ResourceId
columnName: SourceSystem
queryFrequency: 6h
query: |
SenservaPro_CL
| where ControlName_s == 'AzureSecureScoreRoleOverlap'
description: |
'This query searches for accounts that have been assigned Global Administrator do not need other roles assigned.
Global Administrators have access to all aspects of Azure'
tactics:
- Impact
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/GlobaAdminRoleOverlap.yaml