Azure Temporary Access Pass (TAP) registered to an account

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2026-02-09
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • AzureAD Audit Log

Detection Modules

Identity Threat Module

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Valid Accounts (T1078)

Severity

Informational

Response playbooks

Variations of this detector that create incidents have an OOTB response playbook included in the Cortex Response and Remediation Pack

Description

An identity registered an Azure Temporary Access Pass (TAP) to an account.

Attacker's Goals

  • A TAP can allow setting of other authentication methods and can be used as an initial replacement of a multifactor authentication.

Investigative actions

  • Check if the account that got the TAP should get it.
  • Check whether the account that registered the TAP is supposed to perform such actions.
  • Check if the TAP was registered to a privileged account.
  • Follow further actions done by the initiator and the account with the TAP.

Variations

Azure Temporary Access Pass (TAP) registered to a privileged account

Synopsis

ATT&CK Tactic

ATT&CK Technique

Valid Accounts (T1078)

Severity

Medium

Description

An identity registered an Azure Temporary Access Pass (TAP) to an account.

Attacker's Goals

  • A TAP can allow setting of other authentication methods and can be used as an initial replacement of a multifactor authentication.

Investigative actions

  • Check if the account that got the TAP should get it.
  • Check whether the account that registered the TAP is supposed to perform such actions.
  • Check if the TAP was registered to a privileged account.
  • Follow further actions done by the initiator and the account with the TAP.


Abnormal Azure Temporary Access Pass (TAP) account registration

Synopsis

ATT&CK Tactic

ATT&CK Technique

Valid Accounts (T1078)

Severity

Low

Response playbooks

Azure Temporary Access Pass (TAP) registered to an account

Description

An identity registered an Azure Temporary Access Pass (TAP) to an account.

Attacker's Goals

  • A TAP can allow setting of other authentication methods and can be used as an initial replacement of a multifactor authentication.

Investigative actions

  • Check if the account that got the TAP should get it.
  • Check whether the account that registered the TAP is supposed to perform such actions.
  • Check if the TAP was registered to a privileged account.
  • Follow further actions done by the initiator and the account with the TAP.