Assignment of a highly permissive role to an entity at a Resource Group level.
Possible Root Causes
Unauthorized Privilege Escalation: An attacker is modifying permissions to gain additional or persistent access to the environment.
Administrative Change: An administrator has been granted a highly permissive role to enable full access to the environment.
Business Impact
Lateral movement may indicate that an adversary has established a foothold in the environment and is progressing towards their objective, increasing the risk of material impact.
Steps to Verify
Investigate the Principal: Review the identity that performed the role assignment for other signs of malicious activity.
Validate Privilege Justification: Assess whether the entity should have the assigned level of privilege based on their normal duties.
If Malicious Actions or High-Risk Configurations Are Suspected:
Revert any unauthorized configuration changes.
Disable credentials associated with this alert to prevent further misuse.
Conduct a comprehensive investigation to determine the initial compromise and scope of impacted resources.
Azure Resource Group Admin Privilege Granting
Possible root causes
Malicious Detection
Benign Detection
Azure Resource Group Admin Privilege Granting
Example scenarios
Azure Resource Group Admin Privilege Granting
Business impact
If this detection indicates a genuine threat, the organization faces significant risks:
Our interactive demo provides a deep dive into the advanced capabilities of our cybersecurity platform, showcasing real-time detection, comprehensive analysis, and proactive threat mitigation.
Don't just read about the possibilities – experience them.