PIM privilege member removal

Cortex XDR Analytics Alert Reference by data source

Last date published
2024-04-15
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • Azure Audit Log

Detection Modules

Cloud

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Account Manipulation (T1098)

Severity

Informational

Description

An identity with an assigned role from PIM was removed from the membership.

Attacker's Goals

  • Revoke access from other temporary privileged accounts.
  • Gain sole access to more systems.

Investigative actions

  • Investigate the user who initiated the removal.
  • Identify the privileged accounts that were affected.
  • Review the current access rights of the privileged accounts.