An Azure Cloud Shell was Created

Cortex XDR Analytics Alert Reference by data source

Last date published
2024-04-15
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

5 Days

Required Data

  • Requires:
    • Azure Audit Log

Detection Modules

Cloud

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Command and Scripting Interpreter (T1059)

Severity

Informational

Description

A new Cloud Shell was created in Azure. This indicates that a new virtual environment is available for use.

Attacker's Goals

  • Execute malicious commands, scripts, or binaries using newly created cloud shell environment.

Investigative actions

  • Check for any suspicious activity initiated by the identity.
  • Check if the cloud shell was created by a legitimate user.
  • Check if any malicious code was added to the cloud shell.