Skip to content
Threat Feed
high advisory

Frequent Azure PIM Role Activation Detected

Detection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.

This threat brief addresses suspicious activity within Azure Privileged Identity Management (PIM), specifically the repeated activation of privileged roles by the same user. The alert, triggered by ‘sequentialActivationRenewalsAlertIncident’ events, suggests that an attacker may be attempting to escalate privileges or maintain persistent access to sensitive resources. This activity can be indicative of compromised credentials or malicious insider activity. The detection is based on Azure PIM logs and aims to identify deviations from normal user behavior related to role activation. Defenders should investigate these alerts promptly to determine the legitimacy of the role activations and mitigate potential risks.

Attack Chain

  1. Initial Access: An attacker gains initial access to an Azure account, possibly through compromised credentials (T1078).
  2. Privilege Discovery: The attacker identifies available privileged roles within Azure PIM.
  3. Role Activation Request: The attacker initiates a request to activate a privileged role.
  4. Role Activation: The attacker successfully activates the privileged role.
  5. Resource Access: With the activated role, the attacker accesses sensitive resources or performs privileged actions.
  6. Repeated Activation: The attacker deactivates and reactivates the same role shortly after, potentially to bypass monitoring or maintain persistent access.
  7. Lateral Movement (Optional): The attacker uses the elevated privileges to move laterally within the Azure environment.
  8. Data Exfiltration or System Damage (Impact): The attacker achieves their ultimate objective, such as exfiltrating sensitive data or causing damage to systems.

Impact

Successful exploitation could lead to unauthorized access to critical resources, data breaches, and significant damage to the organization’s Azure environment. The repeated activation of privileged roles can be used to bypass security controls and maintain persistent access, making it difficult to detect malicious activity. A single compromised account with PIM access can lead to widespread impact across the entire Azure infrastructure.

Recommendation

  • Deploy the Sigma rule “Roles Activated Too Frequently” to your SIEM and tune it based on your environment to reduce false positives (logsource: azure, service: pim).
  • Investigate any alerts generated by the Sigma rule “Roles Activated Too Frequently”, focusing on the context of the role activated and the user involved.
  • Review the active time period for roles in PIM to ensure they are not set too short, which can lead to frequent legitimate activations and false positives, as noted in the falsepositives section.
  • Implement multi-factor authentication (MFA) for all users, especially those with privileged roles, to mitigate the risk of credential compromise (T1078).
  • Monitor Azure Active Directory sign-in logs for suspicious activity, such as logins from unusual locations or devices.
  • Implement least privilege principles and regularly review role assignments to minimize the attack surface.

Detection coverage 2

Azure PIM - Frequent Role Activation by User

high

Detects frequent role activations by the same user in Azure PIM, potentially indicating privilege abuse.

sigma tactics: initial-access, persistence, privilege-escalation, stealth techniques: T1078 sources: azure, pim

Azure PIM - Multiple Role Activation Requests

medium

Detects multiple role activation requests within a short timeframe for the same user, indicating potential abuse.

sigma tactics: initial-access, privilege-escalation sources: azure, pim

Detection queries are kept inside the platform. Get full rules →