Add Entra ID identity attack rules: TAP creation, guest-to-member promotion, OAuth redirect URI (3 rules)#6168
Open
descambiado wants to merge 1 commit into
Conversation
…member, OAuth redirect URI Three new rules covering Entra ID persistence and credential access techniques with no existing coverage in the azure integration ruleset: - persistence_entra_id_temporary_access_pass_created: T1556.006 / T1098 Detects TAP creation, a passwordless credential that bypasses all MFA factors. - persistence_entra_id_guest_account_promoted_to_member: T1098 Detects UserType Guest->Member conversion, removing all external identity restrictions without triggering role assignment alerts. - persistence_entra_id_oauth_app_redirect_uri_modified: T1528 Detects ReplyUrls modification on existing trusted apps, enabling OAuth authorization code interception without a new app registration or consent event.
|
❌ Author of the following commits did not sign a Contributor Agreement: Please, read and sign the above mentioned agreement if you want to contribute to this project |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Three new detection rules for Entra ID identity attack techniques with no existing coverage in the azure integration ruleset. All three target operations that produce no role assignment events and no new app registration events — the categories most commonly monitored — making them effective at evading standard detection logic.
Rules
persistence_entra_id_temporary_access_pass_created.toml— T1556.006, T1098 — HighDetects
Create Temporary Access Pass method for userandAdmin registered security infooperations where a TAP is provisioned. A TAP is a time-limited passcode that bypasses all MFA factors including FIDO2 and certificate-based auth. An attacker with User Administrator or Authentication Administrator can issue one for any target account, sign in without the current password, and register persistent authentication methods before expiry. Steady-state TAP creation frequency is near zero in most tenants.persistence_entra_id_guest_account_promoted_to_member.toml— T1098 — MediumDetects
Update userevents where theUserTypeproperty changes from Guest to Member. The conversion grants the account full directory read access, removes external-identity Conditional Access restrictions, and makes the account indistinguishable from an internal employee — without any role assignment event. An attacker who compromises a guest account and promotes it gains persistent tenant access that survives Conditional Access policies scoped to external identities.persistence_entra_id_oauth_app_redirect_uri_modified.toml— T1528 — MediumDetects
Update applicationevents where theReplyUrlsfield changes. Adding an attacker-controlled redirect URI to an existing trusted application allows interception of OAuth authorization codes when users authenticate through that application's normal login flow. No new application registration is created; no consent event is generated. The attack hijacks an app that users have already consented to.Verification
rules/integrations/azure/data_stream.dataset: "azure.auditlogs"withindex = ["logs-azure.auditlogs-*"]"Data Source: Microsoft Entra ID","Data Source: Microsoft Entra ID Audit Logs"