<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Privileged-Identity-Management — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/privileged-identity-management/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 22 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/privileged-identity-management/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure Privileged Identity Management (PIM) Invalid License Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-invalid-pim-license/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-invalid-pim-license/</guid><description>Detection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).</description><content:encoded><![CDATA[<p>This alert identifies scenarios where an organization lacks the necessary Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses required for proper Privileged Identity Management (PIM) functionality. Attackers may attempt to exploit misconfigured or unlicensed PIM deployments to gain unauthorized privileged access to critical Azure resources. This detection is crucial as it indicates a compliance issue that can be leveraged to escalate privileges, bypass security controls, and potentially lead to data breaches or system compromise. The absence of appropriate licensing hinders the effectiveness of PIM controls, creating opportunities for malicious actors to operate undetected. Defenders need to ensure appropriate licenses are in place.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Azure environment lacking a valid Microsoft Entra Premium P2 or Microsoft Entra ID Governance license for Privileged Identity Management (PIM).</li>
<li>The attacker attempts to activate a privileged role within the Azure environment through PIM.</li>
<li>Due to the invalid license, the PIM activation process may not enforce proper multi-factor authentication (MFA) or approval workflows.</li>
<li>The attacker gains unauthorized access to the privileged role without proper authorization or auditing.</li>
<li>The attacker leverages the compromised privileged role to access sensitive Azure resources, such as virtual machines, databases, or storage accounts.</li>
<li>The attacker performs malicious actions, such as data exfiltration, modification of system configurations, or deployment of malware.</li>
<li>The attacker attempts to establish persistence within the Azure environment by creating rogue user accounts or modifying existing access controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of an invalid PIM license can be severe. Organizations may experience unauthorized access to critical Azure resources, leading to data breaches, system compromise, and compliance violations. The absence of proper PIM controls can enable attackers to escalate privileges, bypass security measures, and operate undetected within the Azure environment. Identifying invalid PIM licenses is crucial for maintaining the security and integrity of Azure deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>invalidLicenseAlertIncident</code> events in Azure PIM logs (logsource: azure, service: pim).</li>
<li>Investigate any detected instances of <code>invalidLicenseAlertIncident</code> to determine the scope of the issue and potential unauthorized access.</li>
<li>Verify that all Azure subscriptions utilizing PIM have valid Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses.</li>
<li>Implement automated monitoring to proactively identify and alert on invalid PIM licenses.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privileged-identity-management</category><category>invalid-license</category></item><item><title>Unused Privileged Identity Management (PIM) Roles in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-not-used/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-not-used/</guid><description>Detection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.</description><content:encoded><![CDATA[<p>This alert identifies a condition where users have been assigned privileged roles within Azure&rsquo;s Privileged Identity Management (PIM) but are not actively utilizing those roles. This situation can arise from various factors, including misconfiguration of PIM settings, over-allocation of privileged roles due to process gaps or lack of oversight, or the presence of dormant accounts with elevated privileges. Such unused roles represent a potential security risk, as they can be exploited by malicious actors or misused inadvertently, especially if MFA or conditional access policies are not enforced. Regularly auditing and addressing unused PIM roles is crucial for maintaining a strong security posture and optimizing license utilization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator assigns a privileged role to a user within Azure PIM.</li>
<li>The user is granted the role but does not activate or use it to perform any privileged actions.</li>
<li>Azure PIM monitors role usage and detects the lack of activity for the assigned role.</li>
<li>The &ldquo;redundantAssignmentAlertIncident&rdquo; event is triggered within the Azure PIM logs.</li>
<li>An attacker gains access to the user&rsquo;s account through credential compromise or other means.</li>
<li>The attacker activates the unused privileged role.</li>
<li>The attacker leverages the now-active privileged role to perform unauthorized actions, such as modifying system configurations, accessing sensitive data, or escalating privileges further.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise, without being detected due to the pre-existing role assignment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The presence of unused privileged roles can lead to significant security breaches and compliance violations. An attacker exploiting an unused role can gain immediate access to sensitive resources and perform unauthorized actions, potentially leading to data breaches, system outages, or financial losses. The number of affected users and resources depends on the scope of the unused role and the attacker&rsquo;s objectives. Failure to identify and address these unused roles can also result in unnecessary license costs and increased attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>redundantAssignmentAlertIncident</code> events indicating unused PIM roles in Azure (see &ldquo;Roles Are Not Being Used&rdquo; rule).</li>
<li>Investigate all detected instances of unused PIM roles to determine the reason for inactivity and potential risks.</li>
<li>Revoke the assigned role if the user no longer requires it, or provide training and guidance to ensure proper role utilization.</li>
<li>Review and refine PIM role assignment policies to minimize the allocation of unnecessary privileges.</li>
<li>Implement regular audits of PIM role assignments to identify and address unused roles promptly.</li>
<li>Configure security alerts within Azure PIM to receive notifications about unused roles and other potential security incidents.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privileged-identity-management</category><category>role-based-access-control</category><category>initial-access</category><category>privilege-escalation</category></item></channel></rss>