Azure Key Vault modification

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-01-19
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

3 Hours

Required Data

  • Requires:
    • Azure Audit Log

Detection Modules

Cloud

Detector Tags

ATT&CK Tactic

Credential Access (TA0006)

ATT&CK Technique

Unsecured Credentials (T1552)

Severity

Informational

Description

Azure Key Vault modifications can be crucial as it stores secrets e.g. encryption keys, certifications, etc.

Attacker's Goals

Exfiltrate information, persistence on existing users or damage critical accounts.

Investigative actions

  • Check the identity actions prior/after the Key Vault modification.
  • Find which credentials were modified and their usage.