Detections
- Home
- - Detections
- -DT117
- ID: DT117
- Created: 29th April 2025
- Updated: 29th April 2025
- Platform: Microsoft Azure
- Contributor: The ITM Team
Azure Unauthorized System or Service Modification
Monitor Azure Activity Logs and Azure Resource Graph for detection of unauthorized creation, modification, or deletion of resources in Azure subscriptions. Unapproved deployments may signal insider staging, misuse of compute, or persistence attempts.
Where to Configure/Access
- Azure Activity Logs (via Azure Portal): https://portal.azure.com/#blade/Microsoft_Azure_Monitoring/AzureMonitoringBrowseBlade/activitylog
- Azure Resource Graph Explorer: https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.ResourceGraph/queries
Detection Methods
Monitor for critical resource operation event types:
Microsoft.Compute/virtualMachines/write
(VM creation)Microsoft.Storage/storageAccounts/write
(Storage)Microsoft.KeyVault/vaults/write
(Key Vaults)Microsoft.Authorization/roleAssignments/write
(Role Assignments)
Deploy Azure Monitor or Sentinel queries for operational drift and unauthorized resource creation.
Indicators
VMs or services deployed outside managed resource groups.
Use of non-standard SKU types (e.g., GPU-enabled VMs).
Resources missing mandatory tags such as cost center or compliance level.
Sections
ID | Name | Description |
---|---|---|
IF009.006 | Installing Crypto Mining Software | The subject installs and operates unauthorized cryptocurrency mining software on organizational systems, leveraging compute, network, and energy resources for personal financial gain. This activity subverts authorized system use policies, degrades operational performance, increases attack surface, and introduces external control risks.
Characteristics
Example ScenarioA subject installs a customized |