-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is there a way to tell PIM activation from user added permanently to role? #9218
Comments
Thank you for submitting an Issue to the Azure Sentinel GitHub repo! You should expect an initial response to your Issue from the team within 5 business days. Note that this response may be delayed during holiday periods. For urgent, production-affecting issues please raise a support ticket via the Azure Portal. |
There are problems with each of these for my use case (I do have them all enabled):
|
Hey @scorgatelli, There is this rule to detect User addition to Privileged group, You can tweak rule "User Assigned Privileged Role" to filter PIM assignments, You can refer this doc for additional activities https://learn.microsoft.com/en-us/azure/active-directory/reports-monitoring/reference-audit-activities for your use case. |
Thanks for the feedback! I dug into the User Added to Privileged Groups rule and noticed a couple things. It looks for both "Add member to role" and "Add member to role in PIM requested (permanent)", however:
As it currently stands, if I filter out the PIM assignments, pretty much all role assignments will be excluded. |
I have updated the "User Assigned Privileged Role" rule to the following logic so it can handle role assignments via PIM and differentiate them from PIM activations (by commenting out the MS-PIM where clause). I prefer the "User Assigned Privileged Role" rule over the other two rules since it handles all admin roles and ServicePrincipals. I disabled the other two rules, but I think they have similar issues and could stand updating as well. The main differences are that I added additional Currently, I'm looking for role assignment requests to ensure I don't miss anything, but if that becomes noisy it could be updated to match on completions instead.
|
@scorgatelli, These are great suggestions and appreciate deep dive on alerts. |
Hi @scorgatelli, can you please look into the above comment? |
Thank you. I am working on creating a pull request for the new rule. |
…-rule Detect privileged role assignments ignoring PIM activations (#9218)
I cannot find a way to distinguish between PIM activations of a previously assigned eligible role and a user being assigned a permanently active role for the following events:
In either case (either PIM activation or user permanently added as active) the initiator is always reported as MS-PIM.
My goal is to have incidents created for any new role assignments (either active or eligible), but not for PIM activations (or at least have a different event type to easily distinguish them). Is there any way to accomplish this?
Thank you!
The text was updated successfully, but these errors were encountered: