Skip to content
Threat Feed
high advisory

Azure PIM Elevation Approved or Denied

Detection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.

The compromise of privileged accounts within cloud environments is a significant risk. Azure Privileged Identity Management (PIM) is designed to mitigate this risk by enforcing time-bound and approval-based role activation. This brief focuses on the detection of PIM elevation requests that are either approved or denied. While legitimate administrator actions will trigger these events, unexpected or unauthorized approvals/denials, especially those occurring outside of normal business hours or originating from unusual locations, warrant immediate investigation. This activity can indicate attempts at unauthorized privilege escalation, lateral movement, or data exfiltration within the Azure environment. Monitoring these events provides an opportunity to identify and respond to potential breaches before significant damage can occur.

Attack Chain

  1. An attacker gains initial access to a low-privileged Azure account, possibly through credential phishing or password reuse.
  2. The attacker attempts to activate a privileged role (e.g., Global Administrator, Security Administrator) through Azure PIM.
  3. The PIM request triggers an approval workflow, requiring authorization from designated approvers.
  4. An attacker compromises an approver account, enabling them to approve their own malicious PIM request or deny a legitimate one.
  5. Alternatively, an unwitting approver approves a malicious request, potentially due to social engineering.
  6. Upon approval, the attacker’s account is temporarily elevated to the requested privileged role.
  7. The attacker leverages the elevated privileges to perform malicious actions, such as creating new accounts, modifying security policies, or accessing sensitive data.
  8. The attacker attempts to maintain persistence by creating backdoor accounts or modifying access controls, potentially circumventing PIM restrictions.

Impact

Successful exploitation can lead to full control over the Azure environment, potentially impacting hundreds or thousands of users and services. A compromised Global Administrator role grants the attacker the ability to access and modify all resources within the Azure tenant, leading to data breaches, service disruptions, and financial losses. The targeted sectors include any organization leveraging Azure PIM for privileged access management.

Recommendation

  • Deploy the Sigma rule Azure PIM Elevation Approved or Denied to your SIEM to detect unusual PIM activity.
  • Investigate any PIM approval or denial events occurring outside of normal business hours or originating from unexpected locations, focusing on the properties.message field in the logs.
  • Implement multi-factor authentication (MFA) for all Azure accounts, especially those with approval permissions for PIM requests.
  • Regularly review and audit PIM role assignments and approval workflows to ensure they align with the principle of least privilege.
  • Enable alerting on changes to PIM policies and configurations to detect any unauthorized modifications.
  • Monitor Azure Audit Logs for suspicious activity following PIM role activation, looking for actions associated with common attack techniques (e.g., account creation, policy modification).

Detection coverage 2

Azure PIM Elevation Approved or Denied

high

Detects when a PIM elevation is approved or denied.

sigma tactics: initial-access, persistence, privilege-escalation, stealth techniques: T1078.004 sources: azure, auditlogs

Azure PIM Role Activation Request

medium

Detects when a PIM role activation is requested.

sigma tactics: initial-access, persistence, privilege-escalation, stealth sources: azure, auditlogs

Detection queries are kept inside the platform. Get full rules →