Pricing Login
Pricing
Back to blog results

June 1, 2022 By Julian Crowley

Sumo Logic expands Cloud SIEM security coverage for Microsoft Azure

Sumo Logic expands Cloud SIEM security coverage for Microsoft Azure

With more and more organizations moving from traditional on-premises infrastructure to the cloud, it remains critical for organizations to have robust security monitoring, regardless of their cloud platform of choice.

Sumo Logic Threat Labs has expanded our log parsing, mapping and detection rules for Microsoft Azure. While our Cloud SIEM has broad coverage for AWS and GCP platforms, we wanted to close the gap for Azure coverage, which previously addressed:

  • Identity and Access Management within Azure Active Directory
    • Monitoring user and group management

    • Suspicious Login Activity

    • Privilege Enumeration

Azure - Event Hub Deleted Signal Firing

Cloud SIEM heavily leverages the MITRE ATT&CK Framework to map our detection rules to MITRE tactics and techniques from the larger cybersecurity community. To broaden our support for Azure, we use the data source types provided in MITRE ATT&CK for cloud services to help ensure wider coverage. We drilled into the tactics and techniques those types of data sources can reveal. And finally, we identified the specific Azure platform activities and the logs produced by those platform services. A complete list of the data sources we focused on, the types of detections added, and how those can map to MITRE ATT&CK follows.

Dark clouds

Azure platform logging limitations

At present, there is an apparent gap in how Azure logs GET or LIST type operations within most platform resources. Apart from Azure Key Vault, Azure Storage Analytics, and in some cases, Azure Active Directory, we were unable to locate these types of events via audit, activity logs, or by enabling auditing policies for specific activities, like the creation of public storage containers.

While these types of events are inherently noisy, other cloud platforms log these events as they are instrumental in the detection of reconnaissance and discovery activities. Should these types of events become available, our coverage will also expand accordingly.

Making it rain (logs)

Azure platform logging is mostly accomplished via the Activity log for subscription level events and in Resource logs for individual services. Azure Storage Analytics logs are separate from the Resource and Activity logs and are configured independently.

Activity logs can be configured to be sent outside of the Azure portal, such as to an Event Hub, via the Azure Monitor, as well as other methods.

Further documentation can be found on Microsoft's documentation portal for the Azure Activity log.

Resource logs require that a diagnostic setting be configured per service and forwarded to an Event Hub, typically, for external consumption. It’s recommended that diagnostic settings for each service be set at Audit or All to ensure a complete view of resource activities. It’s also recommended to use Key Vault audit logging if the Azure Key Vault service is being utilized.

Further documentation can be found on Microsoft's Documentation Portal for Azure Diagnostic Settings.

Storage Analytics logs are similarly configured using diagnostic settings. It is recommended to enable Read, Write and Delete data logging. Version 1.0 and 2.0 of Storage Analytics logs are supported.

Further documentation can be found on Microsoft's Documentation Portal for Azure Storage Analytics Logs

Both Activity and Resource logs are in JSON format and are parsed and mapped using the same parser and mapper in Cloud SIEM. Because Azure Storage Analytics is in CSV format, it uses an independent parser and mapper.

Newly formed cloud detections

We’ve added coverage for the MITRE ATT&CK Data Sources with Tactics & Techniques in Cloud SIEM. These detections monitor largely for sensitive operations undertaken within Microsoft’s Azure platform. For example, attempts to disable logging for an attacker to hide subsequent malicious activities and the creation of cloud infrastructure to carry out further attacks within and without the compromised environment.

Cloud Service (DS0025)

Impair Defenses (T1562)
  • Diagnostic Setting deletions

  • Diagnostic Setting modifications

  • Event Hub deletions

Data Destruction (T1485)
  • Key and Secret deletions

  • Key and Secret backups

  • Protected item deletion

OS Credential Dumping (T1003)
  • Excessive Key and Secret access

Modify Cloud Compute Infrastructure (T1578)
  • SQL database export

Cloud Storage (DS0010)

Data from Cloud Storage Object (T1530)
  • Anonymous storage blob access

  • Storage Blob Container creations

  • Storage Blob Container deletions

Instance (DS0030)

Modify Cloud Compute Infrastructure (T1578)
  • Virtual Machine and Bastion Host creations

  • Virtual Machine and Bastion Host deletions

  • Virtual Machine Start and Stops

Image (DS0007)

Build Image on Host (T1612)
  • Azure - Image Created/Modified

Data Destruction (T1485)
  • Azure - Image Deleted

Container (DS0032)

Deploy Container (T1610)
  • Container Instance created/modified

User Execution (T1204)
  • Container starts

Each of these new parsers, mappers and detections are available now out-of-the-box for Cloud SIEM customers. As with all Cloud SIEM content, we are always making additions and changes to our content to better serve our customers and respond to the always-evolving threat landscape.

If you’d like to learn more about how we monitor Microsoft Azure and other cloud platforms, see our support for multi-cloud monitoring. We also have a range of existig Microsoft Azure integrations to further streamline your work with Sumo Logic in a Microsoft Azure environment.

Complete visibility for DevSecOps

Reduce downtime and move from reactive to proactive monitoring.

Sumo Logic cloud-native SaaS analytics

Build, run, and secure modern applications and cloud infrastructures.

Start free trial

Julian Crowley

More posts by Julian Crowley.

People who read this also enjoyed