Highly Sensitive Password Accessed
| Id | b39e6482-ab7e-4817-813d-ec910b64b26e |
| Rulename | Highly Sensitive Password Accessed |
| Description | This rule will monitor access to highly sensitive passwords. Within the Watchlist called ‘LastPass’ define passwords which are deemed highly sensitive (such as password to a high privileged application). When an activity is observed against such password, an incident is created. |
| Severity | Medium |
| Tactics | CredentialAccess Discovery |
| Techniques | T1555 T1087 |
| Required data connectors | LastPass |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/LastPass/Analytic Rules/HighlySensitivePasswordAccessed.yaml |
| Version | 1.0.0 |
| Arm template | b39e6482-ab7e-4817-813d-ec910b64b26e.json |
let watchlist = (_GetWatchlist("LastPass") | project name);
LastPassNativePoller_CL
| where Data_s in (watchlist)
| extend AccountCustomEntity = Username_s, IPCustomEntity = IP_Address_s, URLCustomEntity = Data_s
queryPeriod: 1h
query: |
let watchlist = (_GetWatchlist("LastPass") | project name);
LastPassNativePoller_CL
| where Data_s in (watchlist)
| extend AccountCustomEntity = Username_s, IPCustomEntity = IP_Address_s, URLCustomEntity = Data_s
name: Highly Sensitive Password Accessed
entityMappings:
- fieldMappings:
- columnName: AccountCustomEntity
identifier: Name
entityType: Account
- fieldMappings:
- columnName: IPCustomEntity
identifier: Address
entityType: IP
- fieldMappings:
- columnName: URLCustomEntity
identifier: Url
entityType: URL
eventGroupingSettings:
aggregationKind: AlertPerResult
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/LastPass/Analytic Rules/HighlySensitivePasswordAccessed.yaml
description: |
'This rule will monitor access to highly sensitive passwords.
Within the Watchlist called 'LastPass' define passwords which are deemed highly sensitive (such as password to a high privileged application).
When an activity is observed against such password, an incident is created.'
kind: Scheduled
version: 1.0.0
status: Available
severity: Medium
requiredDataConnectors:
- connectorId: LastPass
dataTypes:
- LastPassNativePoller_CL
triggerOperator: gt
triggerThreshold: 0
tactics:
- CredentialAccess
- Discovery
id: b39e6482-ab7e-4817-813d-ec910b64b26e
relevantTechniques:
- T1555
- T1087