[EXP] Multi-Stage Intrusion Chain Edge Exploit to Identity and Cloud Compromise

Report Type

CVE Vulnerability Intelligence Report

Threat Category

Active Exploitation Vulnerability (EXP)

Assessment Date

April 03, 2026

Primary Impact Domain

Identity and Cloud Control Plane Compromise


BLUF

 Organizations face critical enterprise risk from intrusion chains that originate from exploitation of internet-facing edge devices and rapidly escalate into identity system takeover and cloud control compromise, enabling complete operational disruption, data exfiltration, and ransomware enablement. These attacks are initiated through vulnerabilities in perimeter appliances such as Fortinet VPNs, Ivanti Connect Secure gateways, and Palo Alto firewalls, allowing attackers to bypass traditional perimeter defenses and directly access trusted network zones. Exploitation is highly mature and operationalized, with threat actors consistently weaponizing vulnerabilities within hours and executing repeatable edge-to-identity-to-cloud compromise playbooks across multiple sectors. Organizations must treat exposed edge infrastructure and identity control planes as immediate enterprise risk priorities and reallocate security focus toward rapid patch enforcement, identity session protection, and privileged access restriction to prevent full-chain compromise.

Executive Risk Translation
A single exploited edge device can allow attackers to assume trusted identities and gain administrative control of cloud environments, resulting in full enterprise compromise before traditional security controls can respond.

S3 Why This Matters Now

·        Active exploitation campaigns targeting Fortinet, Ivanti, and Palo Alto edge vulnerabilities are occurring within hours to days of public disclosure.

·        Public exploit code and automated scanning frameworks are rapidly integrated into attacker operations, increasing exploitation scale and speed.

·        Observed intrusion timelines show full progression from edge access to cloud control in less than 48 hours.

·        Persistent exposure of edge infrastructure combined with delayed patch cycles continues to expand the accessible attack surface.

·        Detection visibility remains fragmented across edge, identity, and cloud layers, delaying recognition of multi-stage compromise.

S4 Key Judgments

·        Edge device exploitation is the dominant and most reliable initial access vector in modern enterprise intrusion campaigns.

·        Identity systems function as the primary control plane for attacker expansion, persistence, and privilege escalation.

·        Cloud environments represent the ultimate objective due to centralized access to data, infrastructure, and administrative control.

·        Attacker success depends on transitioning from network access to identity control without triggering detection.

·        Organizations without integrated identity and cloud security controls remain highly susceptible to full-chain compromise.

S5 Executive Risk Summary

·        Exploitation of edge devices enables unauthorized entry into trusted network zones, bypassing perimeter security controls.

·        Attackers extract credentials and session artifacts, allowing impersonation of legitimate users and bypass of authentication safeguards.

·        Compromised identities are leveraged to escalate privileges and gain administrative access within enterprise environments.

·        Administrative access to cloud control planes enables persistent access, infrastructure manipulation, and large-scale data exfiltration.

S6 Executive Cost Summary

This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.

·        Low Impact Scenario
Edge exploitation detected and contained prior to identity compromise, resulting in limited investigation scope and minimal operational disruption. Estimated cost: 300,000 to 900,000 USD

·        Moderate Impact Scenario
Identity compromise achieved with partial cloud access, resulting in data exposure, extended response operations, and regulatory notification requirements. Estimated cost: 2 million to 8 million USD

·        High Impact Scenario
Full intrusion chain execution including identity takeover, cloud administrative control, data exfiltration, and ransomware deployment, resulting in enterprise-wide disruption, regulatory penalties, and prolonged recovery. Estimated cost: 12 million to 60 million USD or higher

S6A Key Cost Drivers

·        Speed of detection between edge exploitation and identity compromise

·        Degree of privileged identity access obtained by attackers

·        Extent of cloud control-plane access and persistence mechanisms

·        Volume and sensitivity of accessed or exfiltrated data

·        Duration and complexity of incident response across multiple environments

·        Regulatory exposure and legal obligations

·        Operational downtime and business disruption

S6B Compliance and Risk Context

Compliance Exposure Indicator
Severe exposure for organizations handling regulated data due to unauthorized identity-based access across enterprise and cloud systems.

Risk Register Entry

·        Risk Title: Edge-to-Identity-to-Cloud Intrusion Chain

·        Risk Description: Exploitation of perimeter infrastructure enabling identity compromise and cloud administrative control

·        Likelihood: High

·        Impact: Severe

·        Risk Rating: Critical

Annualized Risk Exposure
Estimated annualized exposure ranges from 5 million to 25 million USD based on high exploitation frequency, rapid attack execution timelines, and significant impact of full-chain compromise events.

S7 Operational Impact Assessment

·        Initial access originating from exploited edge infrastructure is treated as trusted internal activity, allowing attacker operations to inherit legitimate network trust and bypass internal security controls.

·        Authentication integrity is degraded as attackers operate using valid credentials and active session tokens, undermining confidence in identity-based access decisions.

·        Session persistence mechanisms enable continued access even after credential resets, delaying effective containment.

·        Administrative control over cloud environments allows unauthorized creation of privileged roles, persistence artifacts, and modification of critical services.

·        Security monitoring effectiveness is reduced as attacker behavior blends with legitimate identity and cloud activity, complicating detection and investigation.

·        Incident response requires synchronized containment across edge, identity, and cloud layers, significantly increasing operational complexity and recovery timelines.

S8 Bottom Line for Executives

Organizations must immediately eliminate exposed edge vulnerabilities, enforce strict identity session controls, and restrict privileged access to cloud environments to disrupt this attack chain. Security operations must prioritize detection of abnormal identity activity and cross-layer behavior rather than relying on endpoint-centric alerts. Failure to execute these controls allows attackers to progress from initial access to full enterprise control with minimal resistance.

S9 Board-Level Takeaway

This threat represents a governance-level failure condition where inadequate control over edge exposure, identity privilege, and cloud access enables enterprise-wide compromise. The board must ensure that management enforces accountability for vulnerability remediation at the edge, strict identity governance, and controlled cloud privilege boundaries as core risk controls. Failure to enforce these controls constitutes a material breakdown in enterprise risk management with direct financial and regulatory consequences.


S10 Campaign Overview

This campaign represents a multi-stage intrusion pattern in which attackers exploit internet-facing edge devices such as Fortinet SSL VPN, Ivanti Connect Secure, and Palo Alto GlobalProtect systems to gain trusted internal access. These systems act as authentication gateways, allowing attackers to transition from external access into enterprise identity systems without triggering traditional perimeter defenses.

Across observed incidents, attackers have leveraged device-level access to obtain authentication material, including credentials and active session artifacts, which are then used to establish valid identity sessions. This enables rapid pivot from initial access into identity control and subsequent expansion into cloud environments.

The campaign demonstrates a consistent operational model combining opportunistic exploitation at scale with targeted follow-on activity, including privilege escalation, data access, and ransomware deployment. The defining characteristic is the use of trusted identity pathways to achieve low-noise, high-impact compromise.

S11 Sectors Affected

·        Financial Services where centralized identity systems provide access to financial data and transactional platforms

·        Healthcare where remote access infrastructure supports distributed clinical systems and sensitive patient data

·        Technology and SaaS providers where identity systems directly control cloud infrastructure and customer environments

·        Government and Public Sector where large identity ecosystems and legacy edge infrastructure increase exposure

·        Critical Infrastructure where remote access systems are essential for operational continuity

·        Manufacturing where VPN access bridges corporate IT and operational technology environments

S12 Countries Affected

·        United States

·        United Kingdom

·        Canada

·        Germany

·        Australia

·        Japan

These regions are consistently targeted due to high concentrations of enterprise infrastructure, cloud adoption, and reliance on remote access technologies.

S13 Targeting Probability Assessment

Primary Targets
Organizations with exposed or unpatched edge devices that are directly integrated with identity providers and cloud platforms

Secondary Targets
Organizations with weak identity controls, including lack of session monitoring, token protection, or excessive privilege assignment

High-Probability Conditions

·        Delayed patching of internet-facing edge infrastructure

·        Direct trust relationships between VPN systems and identity providers

·        Overprivileged cloud IAM roles and broad administrative access

·        Limited monitoring of identity session activity

Attacker ROI Drivers

·        Immediate access without user interaction or phishing

·        Ability to scale exploitation across large numbers of targets

·        Direct transition from access to identity control

·        High-value outcomes through cloud and data access

S13A Exploit Conditions Snapshot

·        Internet-facing edge device exposure with active remote access services

·        Vulnerable firmware or software versions with publicly available exploit code

·        Lack of segmentation between edge systems and identity infrastructure

·        Active session handling or credential storage on edge devices

·        Identity providers configured to trust upstream authentication without additional validation

These conditions enable rapid transition from exploitation to identity-level access.

S14 Initial Access Vector

The primary initial access vector is exploitation of vulnerabilities in internet-facing edge devices, including VPN gateways and firewall systems. These vulnerabilities allow attackers to access device file systems, configuration data, or session management components.

Because these systems function as authentication intermediaries, successful exploitation provides access within trusted network boundaries. This eliminates the need for phishing or endpoint compromise and allows attackers to interact directly with authentication infrastructure.

S15 Adversary Capability Profiling

Skill Level
High, with demonstrated ability to rapidly weaponize vulnerabilities and execute multi-stage intrusion chains

Infrastructure Maturity
Mature, leveraging distributed scanning infrastructure and automated exploitation frameworks

Operational Scalability
High during initial access, enabling exploitation of large numbers of exposed edge devices

Tooling Sophistication
Moderate to high, focused on exploit execution, credential extraction, and use of legitimate administrative interfaces

Escalation Likelihood
High, with consistent progression from initial access to identity compromise and privilege escalation

S16 Adversary Operational Objectives

·        Establish authenticated access within enterprise identity systems

·        Escalate privileges to administrative levels within identity providers

·        Extend access into cloud environments through identity-based authorization

·        Access and exfiltrate sensitive data from enterprise and cloud systems

·        Establish persistent access through identity and cloud control mechanisms

·        Execute monetization objectives including ransomware deployment

S17 Exploit Status

Exploitation of edge device vulnerabilities is actively occurring in the wild, with attackers leveraging publicly available exploit code and automated scanning tools. Observed campaigns demonstrate rapid weaponization following vulnerability disclosure, with exploitation timelines measured in hours.

The widespread exposure of vulnerable edge systems and delays in patch deployment contribute to sustained exploitation opportunities. This indicates a high likelihood of continued exploitation across affected environments.

S17B Defensive Weakness Profile

·        Overreliance on perimeter security controls without sufficient identity-layer monitoring

·        Lack of visibility into session-based authentication activity within identity providers

·        Insufficient segmentation between edge infrastructure and internal identity systems

·        Limited monitoring of cloud control-plane activity and identity-based access

·        Delayed patching of critical edge infrastructure due to operational constraints


These weaknesses enable attackers to transition from initial access to identity control with minimal resistance and limited detection.

S18 Attack Chain Overview

This intrusion chain begins with exploitation of internet-facing edge devices that function as authentication gateways, allowing attackers to gain access within trusted network boundaries. Because these systems originate authenticated sessions, attacker activity inherits internal trust and bypasses traditional perimeter detection.

Following initial access, attackers obtain authentication material from compromised devices and use it to establish valid sessions within identity providers. This enables immediate access to enterprise identity systems without triggering authentication challenges.

Attackers then expand access through enumeration of identity structures and privilege relationships, identifying escalation pathways and high-value targets. Privilege escalation is subsequently achieved through modification of identity roles and permissions, transitioning attacker access to administrative control.

With identity-level administrative access established, attackers extend control into cloud environments through identity-based authorization. This enables direct manipulation of infrastructure, access to sensitive data, and establishment of persistence mechanisms.

The attack concludes with execution of objectives such as data exfiltration, persistence, or ransomware deployment, conducted entirely through legitimate identity and cloud control channels.

S19 MITRE ATT&CK Mapping

Initial Access — T1190 Exploit Public-Facing Application
Exploitation of edge devices provides direct access to trusted network and authentication infrastructure

Credential Access — T1555 Credentials from Password Stores
Access to configuration files and memory exposes stored credentials and authentication data

Credential Access — T1550 Use of Alternate Authentication Material
Session tokens and authentication artifacts are reused to establish authenticated sessions without reauthentication

Persistence — T1078 Valid Accounts
Compromised credentials and session tokens are used to maintain persistent identity-based access

Privilege Escalation — T1098 Account Manipulation
Identity roles and permissions are modified to elevate access and gain administrative control

Discovery — T1087 Account Discovery
Attackers enumerate users, roles, and identity structures within enterprise environments

Discovery — T1069 Permission Groups Discovery
Privilege group relationships and role assignments are analyzed to identify escalation pathways

Lateral Movement — T1021 Remote Services
Authenticated access is used to move across enterprise systems and services

Command and Control — T1071 Application Layer Protocol
Communication occurs through standard protocols, blending with legitimate traffic

Exfiltration — T1041 Exfiltration Over C2 Channel
Data is extracted using authenticated communication channels

Impact — T1486 Data Encrypted for Impact
Administrative access enables ransomware deployment or destructive actions


S20 Attack Stage Breakdown

Stage 1 – Credential Harvesting

Attackers exploit edge devices to access configuration storage, memory, and active session data. This allows extraction of stored credentials and authentication artifacts associated with legitimate users. In many cases, attackers obtain session tokens that represent already authenticated user sessions, eliminating the need for credential-based login attempts.

Stage 2 – Valid Account Authentication

Using harvested credentials and session artifacts, attackers establish authenticated sessions within identity providers. Session reuse allows access without triggering authentication workflows, bypassing multi-factor authentication enforcement tied to login events. Activity appears as legitimate user behavior within identity logs.

Stage 3 – Account and Resource Discovery

Once authenticated, attackers query identity providers and cloud environments to enumerate users, roles, service accounts, and privilege relationships. This stage identifies high-value targets, administrative roles, and escalation pathways across both enterprise identity systems and cloud environments.

Stage 4 – Privilege Escalation and Control Transition

Attackers escalate privileges by modifying identity roles, group memberships, or cloud IAM permissions through administrative interfaces and APIs. This transitions attacker access from standard user context to administrative control over identity systems and cloud resources.

Stage 5 – Persistence and Objective Execution

With administrative control established, attackers maintain persistent access through identity-based mechanisms and execute objectives. This includes accessing or exfiltrating data, creating additional access pathways, modifying infrastructure, or deploying ransomware. All activity occurs through legitimate identity and cloud control channels, reducing detection likelihood.

S20A Adversary Tradecraft Summary

This intrusion model reflects a mature operational approach centered on identity control rather than traditional system exploitation. Attackers prioritize acquisition of authenticated access early in the intrusion chain, recognizing that control of identity systems enables access to both enterprise and cloud environments without additional exploitation.

A defining characteristic of this tradecraft is the use of existing authentication material to establish trusted access. By leveraging session-based authentication rather than initiating new login attempts, attackers avoid triggering authentication controls and reduce visibility within security monitoring systems.

The operational model supports separation between initial access and objective execution. Opportunistic exploitation identifies vulnerable edge systems and harvests access at scale, while follow-on actors leverage identity control for monetization or strategic objectives. This division increases efficiency, scalability, and resilience across campaigns.

The approach emphasizes low-noise execution, reliance on trusted system behavior, and rapid progression from initial access to full environment control, making detection dependent on correlation across identity, endpoint, and network telemetry.

S21 Indicators of Compromise (IOC Summary)

·        Edge device access involving configuration files, session storage, or authentication components outside normal administrative activity

·        Presence of unauthorized files or scripts on edge infrastructure indicative of persistent access mechanisms

·        Identity session activity exhibiting inconsistencies in origin, continuity, or authentication lineage relative to expected user behavior

·        Identity activity originating from infrastructure-associated IP ranges, including VPN gateways or edge systems, rather than user endpoints

·        Privilege modification events within identity or cloud environments occurring outside established administrative workflows

·        Cloud control-plane activity occurring in temporal proximity to identity session irregularities or privilege escalation

S22 Malware and Tooling

·        Exploitation of internet-facing edge infrastructure including Fortinet, Ivanti, and Palo Alto systems to obtain configuration and session artifacts

·        Use of web shells or equivalent mechanisms on edge appliances to maintain access and enable command execution

·        Extraction of credential and session-related data from device storage and configuration components

·        Reuse of authentication material through session inheritance, replay, or token reuse techniques

·        Use of identity provider administrative interfaces and APIs to modify roles, permissions, and access control structures

·        Use of cloud control-plane APIs to establish persistence, escalate privileges, and manipulate infrastructure

·        Reliance on legitimate system functionality and trusted interfaces rather than traditional malware deployment

S23 Behavior and Log Artifacts

Purpose

To define stage-aligned attacker behaviors that represent observable activity and serve as candidate inputs for detection engineering validation.

Stage 1 – Credential Harvesting

·        Access to edge device configuration and session storage components

·        Interaction with credential-bearing system locations

·        Presence or execution of unauthorized files or scripts on edge systems

Stage 2 – Valid Account Authentication

·        Session establishment inconsistent with expected authentication flow

·        Identity activity lacking clear authentication lineage

·        Session behavior inconsistent with established user access patterns

Stage 3 – Account and Resource Discovery

·        Enumeration of identity objects, roles, permissions, and service principals

·        Repeated access to directory or IAM metadata

·        Unusual query patterns within identity and cloud environments

Stage 4 – Privilege Escalation and Control Transition

·        Modification of roles, group memberships, or IAM policies

·        Elevation of privileges beyond normal identity usage patterns

·        Administrative actions originating from previously non-privileged identities

Stage 5 – Persistence and Objective Execution

·        Creation of new identities, credentials, or long-lived access mechanisms

·        Data access inconsistent with identity baseline behavior

·        Infrastructure modification or impact-aligned activity


S24 Detection Strategy

Purpose

To define the detection approach and prioritization model that will be implemented and validated through S25 detection engineering.

Detection Philosophy

·        Focus on identity-centric intrusion behavior and post-authentication misuse rather than initial access signatures

·        Prioritize session-based anomalies and identity activity patterns over login failure detection

·        Detect multi-stage progression through correlation across edge, identity, and cloud activity

Stage-Aligned Detection Model

·        Stage 1: Monitor interaction with edge systems and credential-bearing components

·        Stage 2: Identify session anomalies and inconsistencies in authentication lineage

·        Stage 3: Detect identity and IAM enumeration behavior

·        Stage 4: Detect privilege escalation and access control modification

·        Stage 5: Detect persistence mechanisms and impact-related activity

Detection Priorities

·        Identity session irregularities and inconsistencies

·        Privilege escalation events within identity providers and cloud environments

·        Cloud administrative activity following identity anomalies

·        Edge system interaction patterns associated with credential access

Detection Constraints

·        Limited visibility into edge appliance internals depending on platform and logging configuration

·        Incomplete session lineage visibility within identity providers

·        Encrypted traffic limiting inspection of network-level activity

·        High baseline of legitimate administrative behavior introducing potential detection noise

S25 Ultra-Tuned Detection Engineering Rules

Suricata

Engineering Position

These Suricata rules are intentionally limited to realistic network-layer observables. They provide supporting detection signals, not authoritative confirmation of credential theft, valid-account misuse, privilege escalation, or persistence. Incident-level conclusions require correlation with identity, endpoint, and cloud-audit telemetry.

Rule Name
Edge Appliance Sensitive Path Access Burst

Mapped Stage
Stage 1 Credential Harvesting

MITRE ATT&CK
T1190 – Exploit Public-Facing Application
T1555 – Credentials from Password Stores
T1550 – Use of Alternate Authentication Material

Purpose
Detect repeated access to high-risk administrative, export, configuration, and session-related web paths on internet-facing edge appliances consistent with post-access retrieval behavior.

What this rule detects
Repeated HTTP GET requests to sensitive edge appliance paths associated with administrative access, export functions, diagnostics, or session/configuration retrieval.

What this rule does not prove
Does not confirm credential theft, token theft, or successful session compromise.

Tuning Explanation
Restrict to known edge appliance IP ranges only.
Use only where HTTP URI visibility or TLS decryption is available.
Suppress approved vulnerability scanners, monitoring systems, backup collectors, and administrative bastions.
This path set is a generic baseline and should be replaced with product-specific paths where possible.
Treat as a collection-behavior signal, not exploit confirmation.

Suricata Rule

alert http $EXTERNAL_NET any -> $EDGE_APPLIANCES $HTTP_PORTS (
    msg:"CYBERDAX EXP edge appliance sensitive path access burst";
    flow:to_server,established;
    http.method; content:"GET"; nocase;
    http.uri;
    pcre:"/^\/(?:admin|api|diag|debug|export|backup|session|config)(?:\/|\?|$)/Ui";
    dsize:>50;
    threshold:type both, track by_src, count 4, seconds 180;
    classtype:attempted-admin;
    metadata:service http, deployment Perimeter, attack_target edge-appliance, confidence Medium;
    sid:410001;
    rev:5;
)

Administrator Localization Instructions
Replace $EDGE_APPLIANCES with actual appliance ranges.
Replace URI patterns with vendor-specific paths where possible.
Clone POST variant only if required by the appliance.
Add suppressions for approved sources.
Disable if URI visibility is unavailable.

Logical Notes
Single-rule meaning: sensitive-path access anomaly.
Correlated meaning: possible credential or session artifact retrieval.

Rule Regret Check
Deployment caution
Requires URI visibility.

Confidence caution
May generate noise in managed environments.

Coverage value
Strong early-stage signal.

Rule Execution Validity
Correlation-ready detection. Not sufficient alone to confirm credential harvesting.

Rule Name
Identity Provider TLS Access from Non-User Infrastructure

Mapped Stage
Stage 2 Valid Account Authentication

MITRE ATT&CK
T1078 – Valid Accounts
T1550 – Use of Alternate Authentication Material

Purpose
Detect TLS access to identity-provider endpoints from infrastructure or edge network segments where user-authentication traffic is not expected.

What this rule detects
TLS sessions from non-user infrastructure to a specific identity-provider hostname.

What this rule does not prove
Does not confirm successful authentication or account compromise.

Tuning Explanation
Restrict to non-user infrastructure ranges.
Use exact IdP hostnames only.
Clone per IdP.
Suppress federation and proxy infrastructure.
Treat as contextual identity anomaly.

Suricata Rule

alert tls $INFRASTRUCTURE_NET any -> $EXTERNAL_NET 443 (
    msg:"CYBERDAX EXP identity-provider TLS access from non-user infrastructure";
    flow:to_server,established;
    tls.sni;
    content:"login.microsoftonline.com"; nocase; endswith;
    threshold:type both, track by_src, count 3, seconds 300;
    classtype:policy-violation;
    metadata:service tls, deployment Egress, attack_target identity-provider, confidence Medium;
    sid:410002;
    rev:5;
)

Administrator Localization Instructions
Replace hostname with tenant IdP domains.
Scope infrastructure ranges correctly.
Suppress legitimate identity infrastructure.
Avoid generic matching.

Logical Notes
Single-rule meaning: unexpected IdP access origin.
Correlated meaning: possible session misuse.

Rule Regret Check
Deployment caution
SNI visibility may be reduced or eliminated in some environments.

Confidence caution
Middleware may generate similar traffic.

Coverage value
Strong supporting signal.

Rule Execution Validity
Correlation-ready detection. Requires identity telemetry for confirmation.

Rule Name
Cloud Control Plane TLS Access from Non-Admin Host

Mapped Stage
Late-Chain Activity (Privilege Escalation or Persistence — cannot be distinguished at network layer)

MITRE ATT&CK

T1098 – Account Manipulation
T1078 – Valid Accounts

Purpose

Detect TLS access to cloud control-plane endpoints from hosts that are not approved administrative systems.

What this rule detects

TLS connections to cloud management endpoints from atypical host classes.

What this rule does not prove

Does not confirm escalation, persistence, or objective execution.

Tuning Explanation

Restrict to non-admin hosts.
Use exact control-plane endpoints only.
Suppress automation and admin systems.
Azure is the only concretely implemented provider in this rule set.

Suricata Rule

alert tls $NON_ADMIN_HOSTS any -> $EXTERNAL_NET 443 (
    msg:"CYBERDAX EXP cloud control-plane TLS access from non-admin host";
    flow:to_server,established;
    tls.sni;
    content:"management.azure.com"; nocase; endswith;
    threshold:type both, track by_src, count 5, seconds 600;
    classtype:policy-violation;
    metadata:service tls, deployment Egress, attack_target cloud-control-plane, confidence Medium;
    sid:410003;
    rev:5;
)

Administrator Localization Instructions

Replace host scope appropriately.
Clone per provider as needed.
Exclude admin and automation systems.

Logical Notes

Single-rule meaning: control-plane access from wrong host.
Correlated meaning: late-stage attack activity.

Rule Regret Check

Deployment caution
Depends on host-role accuracy and SNI visibility.

Confidence caution
Automation traffic may resemble malicious activity.

Coverage value
Strong late-chain signal.

Rule Execution Validity

Correlation-ready detection. Requires identity and cloud telemetry.

Engineering Note

Rule effectiveness depends on:

·        HTTP visibility or TLS decryption (Rule 1)

·        SNI visibility (Rules 2 and 3)

·        Accurate asset scoping and suppression

These rules must be correlated with identity, endpoint, and cloud telemetry for full detection confidence.

SentinelOne

Engineering Position

These detections represent host-observable behavioral signals only. They do not independently confirm identity compromise, privilege escalation, or persistence. The modeled intrusion chain is identity-centric and requires correlation across endpoint, identity-provider, and cloud telemetry for confirmation.


These rules are deployment templates requiring enforcement controls. They are not safe for unrestricted standalone deployment.

Event Taxonomy Requirement

SentinelOne event schemas vary by tenant.

Before deployment, the following must be mapped:

·        process events (for example: Process Creation, Process)

·        network events (for example: Network Connection)

·        file events (for example: File Read, File Creation)

Failure to map event taxonomy invalidates rule execution.

Rule Name
Sensitive Configuration or Session Artifact Access on Edge-Adjacent Systems

Mapped Stage

Stage 1 Credential Harvesting

MITRE ATT&CK

T1555 – Credentials from Password Stores
T1550 – Use of Alternate Authentication Material

SOC Usage Mode

Alert-capable supporting detection

Minimum Deployment Requirement

Deployment restricted to systems that store edge configuration exports, support bundles, or backup artifacts.

Enforcement Method

Enforced through deployment scoping only to approved host groups.

Implementation Constraint Notes

Deployment outside scoped edge-adjacent systems is not permitted.
Broad Linux deployment is not permitted.

SentinelOne Deep Visibility Query

EventType IN ("File Creation","File Modification","File Rename","File Read")
AND AgentOs = "linux"
AND FilePath RegExp "(?i)(session|token|config|backup|export)"
AND ProcessName IN ("bash","sh","python","python3","tar","cp","scp","curl","wget","grep","cat")
AND NOT ProcessName IN ("rsync")
AND NOT CommandLine RegExp "(?i)(ansible|puppet|chef|salt|backup|monitor|compliance)"

Logical Notes

Single-rule meaning: sensitive file-access behavior
Correlated meaning: potential credential or session artifact harvesting

Rule 2

Rule Name

Outbound Identity-Provider Access from Non-User Host

Mapped Stage

Stage 2 Valid Account Authentication

MITRE ATT&CK

T1078 – Valid Accounts
T1550 – Use of Alternate Authentication Material

SOC Usage Mode

Correlation-only
Minimum Deployment Requirement

Requires:

·        host-role classification

·        destination enrichment OR baseline deviation detection

Enforcement Method

Must be enforced through:

·        deployment only on non-user host groups

·        correlation with identity telemetry

·        enrichment identifying identity-provider infrastructure

Implementation Constraint Notes

Standalone alerting is not permitted.
Deployment without host-role scoping is not permitted.
Deployment without enrichment or correlation is not permitted.

SentinelOne Deep Visibility Query

EventType = "Network Connection"
AND DstPort = "443"
AND ProcessName IN ("chrome","msedge","firefox","curl","wget","powershell","pwsh","python","python3")
AND NOT ProcessName IN ("java","node","kubelet")
AND NOT CommandLine RegExp "(?i)(identity-sync|federation|sso|proxy)"

Logical Notes

Single-rule meaning: authentication-capable outbound traffic
Correlated meaning: potential session misuse

Rule Name
Cloud and Identity Enumeration Command Activity

Mapped Stage

Stage 3 Discovery

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery

SOC Usage Mode

Correlation or hunt only

Minimum Deployment Requirement

Requires:

·        multi-execution correlation

·        OR time-based burst logic external to SentinelOne

Enforcement Method

Enforced through:

·        SIEM/XDR correlation logic

·        OR hunt-only operational use

Implementation Constraint Notes

Standalone alerting is not permitted.
Single execution must not trigger paging.
Deployment without correlation capability is not permitted.

SentinelOne Deep Visibility Query

EventType = "Process Creation"
AND (
  CommandLine RegExp "(?i)\baz ad user list\b"
  OR CommandLine RegExp "(?i)\baws iam list-"
  OR CommandLine RegExp "(?i)\bgcloud projects get-iam-policy\b"
)
AND NOT CommandLine RegExp "(?i)(terraform|ansible|ci-runner|approved-admin)"

Logical Notes

Single-rule meaning: enumeration command execution
Correlated meaning: privilege discovery

Rule Name

Privilege Modification Command Execution from Non-Standard Host

Mapped Stage

Stage 4 Privilege Escalation

MITRE ATT&CK

T1098 – Account Manipulation

SOC Usage Mode

Enforced through:

·        suppression lists

·        host-role scoping

·        workflow exclusion

Implementation Constraint Notes

Deployment without suppression maturity is not permitted.
Deployment on approved admin systems is not permitted.

SentinelOne Deep Visibility Query

EventType = "Process Creation"
AND CommandLine RegExp "(?i)(\baz role assignment create\b|\baws iam attach-role-policy\b|\bgcloud projects add-iam-policy-binding\b)"
AND NOT CommandLine RegExp "(?i)(terraform|ci-runner|approved-admin|change-window)"

Logical Notes

Single-rule meaning: privilege-changing command execution
Correlated meaning: escalation confirmed via audit logs

Rule Name

Persistence or High-Risk Cloud Operation Tool Execution

Mapped Stage

Stage 5 Persistence / Objective Execution

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Correlation-first

Minimum Deployment Requirement

Requires:

·        host-role scoping

·        exclusion of backup, migration, provisioning systems

Enforcement Method

Enforced through:

·        deployment only on atypical hosts

·        correlation with prior-stage activity

·        optional rule splitting

Implementation Constraint Notes

Standalone alerting is not permitted until validated.
If noise persists, rule must be split into:

·        persistence creation

·        data operation

Weakening detection logic is not permitted.

SentinelOne Deep Visibility Query

EventType = "Process Creation"
AND (
  CommandLine RegExp "(?i)(\bcreate-access-key\b|\bclient secret\b|\bservice-principal create\b)"
  OR CommandLine RegExp "(?i)(\baws s3 cp\b|\bgsutil cp\b)"
)
AND NOT CommandLine RegExp "(?i)(backup|migration|provisioning|approved-admin|ci-runner)"

Logical Notes

Single-rule meaning: high-risk cloud tooling execution
Correlated meaning: persistence or objective execution

Splunk

Engineering Position

Splunk is the authoritative detection layer for identity and cloud control-plane activity. These rules detect confirmed authentication, privilege modification, persistence creation, and high-risk operational behavior when proper logging and normalization are present.

Detection quality depends on:

·        normalized fields

·        complete cloud audit log ingestion

·        suppression maturity for approved workflows

Event Normalization Requirement

User Identity
user, userPrincipalName, identity, principal

Source IP
src_ip, client_ip, ipAddress

Action
action, operationName, eventName

Failure to normalize invalidates detection consistency.

Rule Name

Sensitive Configuration or Session Artifact Access via File or Storage Logs

Mapped Stage

Stage 1 Credential Harvesting

MITRE ATT&CK

T1555 – Credentials from Password Stores

SOC Usage Mode

Correlation-only (low confidence standalone)

Minimum Deployment Requirement

Requires reliable file-access or storage-access logging.

Enforcement Method

Enforced through correlation with:

·        endpoint telemetry

·        edge access activity

Implementation Constraint Notes

Standalone alerting is not permitted.
Deployment without verified file or storage telemetry is not permitted.

Splunk Query

index=* (file_access OR storage_access)
| eval file_path=coalesce(file_path, object, uri)
| search file_path="*config*" OR file_path="*session*" OR file_path="*token*" OR file_path="*backup*"
| bin time span=10m
| stats count by user, src
ip, file_path, _time
| where count > 3

Variant Analysis

Covered:

·        config, session, token, backup artifacts

Not Covered:

·        endpoint-local access without logging

·        encrypted storage access without visibility

Rule Name

Successful Authentication from Atypical Source or First-Seen IP

Mapped Stage

Stage 2 Valid Account Authentication

MITRE ATT&CK

T1078 – Valid Accounts

SOC Usage Mode

Alert-capable supporting detection

Minimum Deployment Requirement

Requires:

·        historical authentication data (baseline)

·        source IP tracking

Enforcement Method

Enforced through:

·        first-seen source detection OR

·        deviation from historical user baseline

Implementation Constraint Notes

Standalone alerting without baseline comparison is not permitted.

Splunk Query

index=auth_logs
| eval user=coalesce(user, userPrincipalName, identity, principal)
| eval src_ip=coalesce(src_ip, client_ip, ipAddress)
| search result="success"
| stats earliest(_time) as first_seen by user, src_ip
| where first_seen > relative_time(now(), "-1d")

Variant Analysis

Covered:

·        new source IP authentication events

Not Covered:

·        token reuse without new login

·        federated authentication without source visibility

Rule Name

Identity and IAM Enumeration Burst

Mapped Stage

Stage 3 Discovery

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery

SOC Usage Mode

Alert-capable with enforced burst logic

Minimum Deployment Requirement

Requires:

·        cloud audit logs

·        normalized action field

Enforcement Method

Enforced through:

·        time-bound burst window

·        user-level aggregation

Implementation Constraint Notes

Single-event alerting is not permitted.
Burst window enforcement is mandatory.

Splunk Query

index=cloud_logs
| eval user=coalesce(user, userPrincipalName, identity, principal)
| eval action=coalesce(action, operationName, eventName)
| search action IN ("ListUsers","ListRoles","GetRole","ListGroups","DescribeInstances")
| bin time span=5m
| stats count, dc(action) as distinct
actions by user, time
| where count > 5 OR distinct
actions > 3

Variant Analysis

Covered:

·        multi-action enumeration bursts

Not Covered:

·        low-and-slow enumeration

·        provider-specific APIs not listed

Rule Name

Privilege Boundary Change or Role Assignment Modification

Mapped Stage

Stage 4 Privilege Escalation

MITRE ATT&CK

T1098 – Account Manipulation

SOC Usage Mode

Alert-capable primary detection

Minimum Deployment Requirement

Requires:

·        cloud audit logs with administrative actions

·        suppression of approved admin workflows

Enforcement Method

Enforced through:

·        direct detection of privilege-changing actions only

Implementation Constraint Notes

Credential creation and data operations are not permitted in this rule.

Splunk Query

index=cloud_logs
| eval user=coalesce(user, userPrincipalName, identity, principal)
| eval action=coalesce(action, operationName, eventName)
| search action IN ("AddRoleAssignment","AttachRolePolicy","PutRolePolicy","AddMemberToPrivilegedGroup","GrantAdminRole")
| stats count by user, action

Variant Analysis

Covered:

·        direct role and policy modification actions

Not Covered:

·        indirect escalation paths

·        inherited privilege escalation

Rule Name

Durable Access Artifact Creation

Mapped Stage

Stage 5 Persistence

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Alert-capable high-confidence detection

Minimum Deployment Requirement

Requires cloud audit logs capturing identity-object creation.

Enforcement Method

Enforced through:

·        direct detection of credential and identity artifact creation

Implementation Constraint Notes

Privilege modification is not permitted in this rule.

Splunk Query

index=cloud_logs
| eval user=coalesce(user, userPrincipalName, identity, principal)
| eval action=coalesce(action, operationName, eventName)
| search action IN ("CreateAccessKey","CreateServicePrincipal","AddClientSecret","CreateApplicationCredential","GrantOAuthConsent")
| stats count by user, action

Variant Analysis

Covered:

·        credential and identity artifact creation

Not Covered:

·        delegated token creation not logged

·        temporary token abuse

Rule Name

High-Risk Cloud Data or Control-Plane Action

Mapped Stage

Stage 5 Objective Execution

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Correlation-first (alert after tuning maturity)

Minimum Deployment Requirement

Requires:

·        cloud audit logs

·        suppression of normal data workflows

Enforcement Method

Enforced through:

·        correlation with prior-stage activity

·        or tuned action-family filtering

Implementation Constraint Notes

If noise is high, must split by:

·        data actions

·        control-plane actions

Splunk Query

index=cloud_logs
| eval user=coalesce(user, userPrincipalName, identity, principal)
| eval action=coalesce(action, operationName, eventName)
| search action IN ("PutObject","UploadObject","CreateSnapshot","ModifyLogging","DisableSecurityControl")
| stats count by user, action

Variant Analysis

Covered:

·        storage, snapshot, and control-plane actions

Not Covered:

·        encrypted or delegated operations

·        provider-specific APIs not included

Elastic

Engineering Position

Elastic functions as the identity, cloud, and correlation enforcement layer. It is authoritative for:

·        Successful authentication validation

·        Privilege boundary changes

·        Persistence artifact creation

·        Multi-stage attack correlation

Elastic is not authoritative for edge appliance internals, and detection must account for:

·        incomplete session lineage

·        encrypted traffic limitations

·        legitimate administrative noise

Detection is therefore identity-centric and correlation-driven, not single-signal dependent.

Data Normalization Requirement (Mandatory)

User Identity

user.name, user.email, user.id

Source Context

source.ip, source.geo.country_name

Action

event.action, event.type, cloud.audit.method_name

Outcome

event.outcome

Constraint

Deployment without validated normalization is not permitted

Rule Name

Edge-Adjacent Sensitive Artifact Access or Suspicious Tooling

Mapped Stage

Stage 1 Credential Harvesting

MITRE ATT&CK

T1555 – Credentials from Password Stores
T1550 – Use of Alternate Authentication Material

Rule Type
Custom query

SOC Usage Mode

Correlation-only

Minimum Deployment Requirement

·        Edge-adjacent host scoping

·        File and process telemetry availability

Enforcement Method

Enforced through strict host scoping only

Implementation Constraint Notes

·        Standalone alerting is not permitted

·        Provides partial Stage 1 coverage only

·        Broad enterprise deployment is not permitted

Elastic Query

host.os.type:linux and
(
  (event.category:file and file.path:(*session* or token or config or backup or export))
  or
  (event.category:process and process.command_line:(*session* or token or config or backup or tmp))
)
and not process.command_line:(*ansible* or puppet or chef or backup)

Administrator Localization Instructions

·        Replace generic paths with real export and backup locations

·        Restrict to systems handling edge-derived artifacts

·        Add suppression for approved automation

Variant Analysis

Covered

·        Artifact access patterns

·        Basic suspicious tooling

Not Covered

·        Appliance-internal access

·        Memory-only harvesting

·        Vendor-specific paths

Rule Name

Successful Authentication Deviating from Historical Baseline

Mapped Stage

Stage 2 Valid Account Authentication

MITRE ATT&CK

T1078 – Valid Accounts
T1550 – Use of Alternate Authentication Material

Rule Type

ES|QL

SOC Usage Mode

Alert-capable supporting detection

Minimum Deployment Requirement

·        Minimum 14-day historical baseline

·        Normalized identity and source fields

Enforcement Method

Baseline comparison (historical vs recent activity)

Implementation Constraint Notes

·        Deployment without baseline data is not permitted

·        Failed logins must not be included

Elastic Query

FROM auth-*
| WHERE event.outcome == "success"
| EVAL actor = COALESCE(user.name, user.email, user.id)
| EVAL src = COALESCE(source.ip, related.ip)
| WHERE actor IS NOT NULL AND src IS NOT NULL
| EVAL recent = CASE(@timestamp >= NOW() - 1 day, 1, 0)
| STATS
    recent_count = SUM(recent),
    historical_count = COUNT() - SUM(recent)
  BY actor, src
| WHERE recent_count > 0 AND historical_count == 0

Administrator Localization Instructions

·        Adjust baseline window if required

·        Integrate with device trust or MFA context if available

Variant Analysis

Covered

·        First-seen source authentication

Not Covered

·        Token reuse

·        Federated auth without source attribution

Rule Name

Identity and IAM Enumeration Burst

Mapped Stage

Stage 3 Discovery

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery

Rule Type

Threshold rule

SOC Usage Mode

Alert-capable (burst enforced)

Minimum Deployment Requirement

·        Normalized cloud audit logs

·        Exception lists for admin tooling

Enforcement Method

Time-bound threshold enforcement

Implementation Constraint Notes

·        Single-event alerting is not permitted

·        Exception tuning is mandatory

Elastic Query

event.action:(
  "ListUsers" or
  "ListRoles" or
  "GetRole" or
  "ListGroups" or
  "ListServicePrincipals" or
  "GetIamPolicy" or
  "ListRoleAssignments" or
  "ListApplications"
)

Threshold Configuration

Group by: user.name
Count: ≥ 6
Window: 5 minutes

Administrator Localization Instructions

·        Replace with tenant-specific verbs

·        Add suppression for governance tools

Variant Analysis

Covered

·        Burst enumeration patterns

Not Covered

·        Low-and-slow enumeration

·        Unmapped provider actions

Rule Name

Privilege Boundary Change or Access-Control Modification

Mapped Stage

Stage 4 Privilege Escalation

MITRE ATT&CK

T1098 – Account Manipulation

Rule Type

Custom query

SOC Usage Mode

Alert-capable primary detection

Minimum Deployment Requirement

·        Cloud audit logs

·        Admin suppression rules

Enforcement Method

Direct privilege-change action matching

Implementation Constraint Notes

·        Credential creation not permitted here

·        Action set must be tenant-validated

Elastic Query

event.action:(
  "AddRoleAssignment" or
  "AttachRolePolicy" or
  "PutRolePolicy" or
  "AddMemberToPrivilegedGroup" or
  "GrantAdminRole" or
  "SetIamPolicy"
)

Administrator Localization Instructions

·        Map provider-specific privilege actions

·        Suppress approved workflows

Variant Analysis

Covered

·        Direct privilege escalation actions

Not Covered

·        Indirect escalation

·        Unlogged permission inheritance

Rule Name

Durable Access Artifact Creation

Mapped Stage

Stage 5 Persistence

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

Rule Type

Custom query

SOC Usage Mode

Alert-capable high-confidence detection

Minimum Deployment Requirement

·        Credential creation logs

Enforcement Method

Direct artifact creation detection

Implementation Constraint Notes

·        Privilege modification not permitted here

·        Action set must be tenant-validated

Elastic Query

event.action:(
  "CreateAccessKey" or
  "CreateServicePrincipal" or
  "AddClientSecret" or
  "CreateApplicationCredential" or
  "AddPasswordCredential" or
  "AddKeyCredential"
)

Administrator Localization Instructions

·        Map provider-specific credential verbs

·        Keep suppression minimal and controlled

Variant Analysis

Covered

·        Durable credential creation

Not Covered

·        Temporary tokens

·        Delegated access

Rule Name

High-Risk Cloud Action Following Privilege Transition

Mapped Stage

Stage 5 Objective Execution

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

Rule Type

EQL

SOC Usage Mode

Correlation-first

Minimum Deployment Requirement

·        Normalized logs

·        Consistent user attribution

Enforcement Method

Sequence-based correlation

Implementation Constraint Notes

·        Standalone alerting is not permitted

·        Split rule if data noise is high

Elastic Query

sequence by user.name with maxspan=30m
  [ any where event.action in (
      "AddRoleAssignment",
      "AttachRolePolicy",
      "PutRolePolicy",
      "GrantAdminRole",
      "SetIamPolicy"
    ) ]
  [ any where event.action in (
      "PutObject",
      "UploadObject",
      "CreateSnapshot",
      "ModifyLogging",
      "DisableSecurityControl",
      "DeleteTrail"
    ) ]

Administrator Localization Instructions

·        Replace action sets with tenant-specific mappings

·        Split into separate rules if needed

Variant Analysis

Covered

·        Privilege transition followed by high-risk action

Not Covered

·        Slow execution outside correlation window

·        Unattributed delegated actions

QRadar

Engineering Position

QRadar is the stateful offense and correlation layer for this chain. Event rules in CRE are the primary detection mechanism, building blocks provide reusable scope and action families, and reference sets hold watchlist/baseline state used by rules.

Mandatory Pre-Deployment Controls

Before enabling any rule below:

1. Validate building blocks

·        BB:HostDefinition:Edge_Adjacent_Systems

·        BB:HostDefinition:Non_User_Infrastructure

·        BB:HostDefinition:Non_Admin_Hosts

·        BB:LogSource:Identity_Provider

·        BB:Exclude:Approved_Admin_and_Automation

·        BB:ActionFamily:Identity_IAM_Enumeration

·        BB:ActionFamily:Privilege_Boundary_Change

·        BB:ActionFamily:Durable_Access_Artifact_Creation

BB:ActionFamily:High_Risk_Cloud_Post_Control

2. Validate reference sets

·        RS:User_Source_Baseline_14d

·        RS:Recent_Stage2_Actors_30m

·        RS:Recent_Stage4_Actors_30m

3. Validate custom event properties if DSM normalization is incomplete

·        CEP_UserName

·        CEP_SourceIP

·        CEP_ActionName

·        CEP_Outcome

·        CEP_TargetObject

·        CEP_ActorRole

Deployment without validated BB population and reference-set readiness is not permitted. QRadar supports custom event properties and reference-set-backed rule logic directly.

Reference Set Lifecycle Controls

RS:User_Source_Baseline_14d

·        populate during a 7-day burn-in period

during burn-in, do not create offenses from first-seen user/source logic

·        after burn-in, add CEP_UserName|CEP_SourceIP on successful auth events with 14-day expiry

·        review top churn pairs weekly; remove known ephemeral or synthetic sources if needed

RS:Recent_Stage2_Actors_30m

·        populated only by Rule 2

·        30-minute expiry

·        used only for downstream Stage 5B correlation

RS:Recent_Stage4_Actors_30m

·        populated only by Rule 4

·        30-minute expiry

·        used only for downstream Stage 5B correlation

Starter Building Block Content

BB:ActionFamily:Privilege_Boundary_Change

Starter provider verbs:

·        Azure / Entra: Add member to role, Add directory role member, Add app role assignment

·        AWS: AttachRolePolicy, AttachUserPolicy, PutRolePolicy, PutUserPolicy

·        GCP: SetIamPolicy, projects.setIamPolicy

BB:ActionFamily:Durable_Access_Artifact_Creation

Starter provider verbs:

·        Azure / Entra: Add client secret, Add password credential, Add key credential, Create service principal

·        AWS: CreateAccessKey, CreateLoginProfile

·        GCP: service-account key creation equivalents as normalized in the tenant

BB:ActionFamily:High_Risk_Cloud_Post_Control

Starter provider verbs:

·        Azure: storage upload, diagnostic/logging changes, snapshot or disk export equivalents as normalized

·        AWS: PutObject, CloudTrail/logging changes, snapshot creation equivalents

·        GCP: storage object upload, logging/config changes, snapshot equivalents as normalized


These are starter populations, not complete coverage. Variant completeness still depends on tenant-normalized event names and QIDs. Building blocks are specifically intended to hold reusable groups of event names, IPs, or privileged identities.

Rule Name
Edge-Adjacent Artifact Access or Suspicious Tooling

Mapped Stage

Stage 1 Credential Harvesting

MITRE ATT&CK

T1555 – Credentials from Password Stores
T1550 – Use of Alternate Authentication Material

Rule Type

Event Rule — Local

SOC Usage Mode

Correlation-only

Minimum Deployment Requirement

·        BB:HostDefinition:Edge_Adjacent_Systems validated

·        edge-adjacent host telemetry available

·        approved maintenance exclusions validated

Enforcement Method

Strict host scoping with BB:HostDefinition:Edge_Adjacent_Systems and BB:Exclude:Approved_Admin_and_Automation

Implementation Constraint Notes

·        standalone offense creation is not permitted

·        broad deployment is not permitted

·        partial Stage 1 coverage only, consistent with the source model’s edge-visibility constraints

CRE Wizard Test Order

when the event matches any of:

o   event name/category indicates file access to session, token, config, backup, or export artifacts

o   event name/category indicates suspicious process or script touching those artifacts

and when the event matches BB:HostDefinition:Edge_Adjacent_Systems

and when the event does not match BB:Exclude:Approved_Admin_and_Automation

and when at least 3 events are seen with the same source IP or hostname in 10 minutes

Responses

·        add to offense only

·        magnitude: Low

·        rule response note: Stage1_Supporting_Edge_Artifact_Access

AQL Validation

SELECT username, sourceip, destinationip, QIDNAME(qid), COUNT(*) AS event_count
FROM events
WHERE (
  UTF8(payload) ILIKE '%session%' OR
  UTF8(payload) ILIKE '%token%' OR
  UTF8(payload) ILIKE '%config%' OR
  UTF8(payload) ILIKE '%backup%' OR
  UTF8(payload) ILIKE '%export%'
)
GROUP BY username, sourceip, destinationip, QIDNAME(qid)
LAST 10 MINUTES

Variant Analysis

Covered

copied config, session, token, and backup artifact access; suspicious tooling on edge-adjacent systems.

Not Covered

appliance-internal-only activity, memory-only harvesting, vendor-specific artifact names absent from normalized telemetry.

Rule Name

Successful Identity Activity from First-Seen or Infrastructure Source

Mapped Stage

Stage 2 Valid Account Authentication

MITRE ATT&CK

T1078 – Valid Accounts
T1550 – Use of Alternate Authentication Material

Rule Type

Event Rule — Global

SOC Usage Mode

Alert-capable supporting detection

Minimum Deployment Requirement

·        BB:LogSource:Identity_Provider validated

·        BB:HostDefinition:Non_User_Infrastructure validated

·        RS:User_Source_Baseline_14d active after burn-in

·        CEP_Outcome normalized

Enforcement Method

Infrastructure-origin scoping or first-seen user/source baseline test

Implementation Constraint Notes

·        failed-auth-only logic is not permitted

·        deployment before baseline burn-in is not permitted for first-seen mode

·        this remains supporting detection because session lineage can be incomplete in the source model

CRE Wizard Test Order

1.       when the event matches BB:LogSource:Identity_Provider

2.       and when CEP_Outcome = success

3.       and when any of:

o   source IP is in BB:HostDefinition:Non_User_Infrastructure

o   CEP_UserName|CEP_SourceIP is not in RS:User_Source_Baseline_14d

4.       and when the event does not match BB:Exclude:Approved_Admin_and_Automation

Responses

·        create offense

·        magnitude: Medium

·        add CEP_UserName to RS:Recent_Stage2_Actors_30m with 30-minute expiry

·        after burn-in, add CEP_UserName|CEP_SourceIP to RS:User_Source_Baseline_14d with 14-day expiry

·        rule response note: Stage2_Supporting_Identity_Anomaly

AQL Validation

SELECT username, sourceip, LOGSOURCENAME(logsourceid), QIDNAME(qid), COUNT(*) AS event_count
FROM events
WHERE LOGSOURCENAME(logsourceid) ILIKE '%okta%'
   OR LOGSOURCENAME(logsourceid) ILIKE '%azure%'
   OR LOGSOURCENAME(logsourceid) ILIKE '%entra%'
GROUP BY username, sourceip, LOGSOURCENAME(logsourceid), QIDNAME(qid)
LAST 1 DAY

Variant Analysis

Covered: infrastructure-origin successful identity activity and first-seen user/source pairs.
Not Covered: token reuse with no IdP event, federated flows with poor attribution, session inheritance without a new success event.

Rule Name

Identity and IAM Enumeration Burst

Mapped Stage

Stage 3 Account and Resource Discovery

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery

Rule Type

Event Rule — Global

SOC Usage Mode

Alert-capable with burst enforcement

Minimum Deployment Requirement

·        BB:ActionFamily:Identity_IAM_Enumeration populated

·        approved governance and inventory exclusions validated

·        actor field normalized

Enforcement Method

Global burst threshold by actor, with distinct-action expectation

Implementation Constraint Notes

·        single-event alerting is not permitted

·        governance and inventory suppression is mandatory

·        if the tenant cannot distinguish event families well, keep this rule supporting-only

CRE Wizard Test Order

1.       when the event matches BB:ActionFamily:Identity_IAM_Enumeration

2.       and when the event does not match BB:Exclude:Approved_Admin_and_Automation

3.       and when at least 6 events are seen with the same CEP_UserName in 5 minutes

4.       and when at least 2 different QIDs or normalized actions are observed for that same CEP_UserName in the same interval

Responses

·        create offense if none exists

·        otherwise add to existing offense for same CEP_UserName

·        magnitude: Medium

·        rule response note: Stage3_Enumeration_Burst

AQL Validation

SELECT username, QIDNAME(qid), COUNT(*) AS event_count
FROM events
WHERE QIDNAME(qid) ILIKE '%ListUsers%'
   OR QIDNAME(qid) ILIKE '%ListRoles%'
   OR QIDNAME(qid) ILIKE '%ListGroups%'
   OR QIDNAME(qid) ILIKE '%GetIamPolicy%'
GROUP BY username, QIDNAME(qid)
LAST 5 MINUTES

Variant Analysis

Covered: burst enumeration of users, groups, roles, service principals, applications, and IAM metadata.
Not Covered: low-and-slow discovery, provider-specific verbs absent from the BB, and discovery only visible in upstream SaaS logs not ingested into QRadar.

Rule Name

Privilege Boundary Change or Access-Control Modification

Mapped Stage

Stage 4 Privilege Escalation and Control Transition

MITRE ATT&CK

T1098 – Account Manipulation

Rule Type

Event Rule — Local

SOC Usage Mode

Alert-capable primary detection

Minimum Deployment Requirement

·        BB:ActionFamily:Privilege_Boundary_Change populated

·        approved admin exceptions validated

·        CEP_ActionName normalized

Enforcement Method

Direct action-family match only

Implementation Constraint Notes

·        credential creation is not permitted in this rule

·        data actions are not permitted in this rule

·        deployment without approved admin exceptions is not permitted

CRE Wizard Test Order

1.       when the event matches BB:ActionFamily:Privilege_Boundary_Change

2.       and when the event does not match BB:Exclude:Approved_Admin_and_Automation

Responses

·        create offense

·        magnitude: High

·        add CEP_UserName to RS:Recent_Stage4_Actors_30m with 30-minute expiry

·        rule response note: Stage4_Privilege_Boundary_Change

AQL Validation

SELECT username, sourceip, QIDNAME(qid), COUNT(*) AS event_count
FROM events
WHERE QIDNAME(qid) ILIKE '%Role%'
   OR QIDNAME(qid) ILIKE '%Policy%'
   OR QIDNAME(qid) ILIKE '%PrivilegedGroup%'
GROUP BY username, sourceip, QIDNAME(qid)
LAST 1 DAY

Variant Analysis

Covered: direct role, policy, trust-policy, and privileged membership changes.
Not Covered: indirect escalation via inherited permissions, non-audited control expansion, and poorly normalized provider actions.

Rule Name

Durable Access Artifact Creation

Mapped Stage

Stage 5 Persistence

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

Rule Type

Event Rule — Local

SOC Usage Mode

Alert-capable high-confidence detection

Minimum Deployment Requirement

·        BB:ActionFamily:Durable_Access_Artifact_Creation populated

·        credential/application creation logs ingested

·        CEP_ActionName normalized

Enforcement Method

Direct artifact-creation match only

Implementation Constraint Notes

·        privilege-boundary changes are not permitted in this rule

·        bulk data or storage actions are not permitted in this rule

CRE Wizard Test Order

1.       when the event matches BB:ActionFamily:Durable_Access_Artifact_Creation

2.       and when the event does not match BB:Exclude:Approved_Admin_and_Automation

Responses

·        create offense

·        magnitude: High

·        rule response note: Stage5_Persistence_Durable_Access

AQL Validation

SELECT username, sourceip, QIDNAME(qid), COUNT(*) AS event_count
FROM events
WHERE QIDNAME(qid) ILIKE '%AccessKey%'
   OR QIDNAME(qid) ILIKE '%ServicePrincipal%'
   OR QIDNAME(qid) ILIKE '%ClientSecret%'
   OR QIDNAME(qid) ILIKE '%Credential%'
GROUP BY username, sourceip, QIDNAME(qid)
LAST 1 DAY

Variant Analysis

Covered: durable credential and identity-artifact creation.
Not Covered: temporary-token abuse, delegated grants without durable object creation, unmanaged trust-path persistence.

Rule Name
High-Risk Cloud Action Following Privilege Transition or Identity Anomaly

Mapped Stage
Stage 5 Objective Execution

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

Rule Type

Event Rule — Global

SOC Usage Mode

Correlation-first

Minimum Deployment Requirement

·        BB:ActionFamily:High_Risk_Cloud_Post_Control populated

·        RS:Recent_Stage2_Actors_30m and RS:Recent_Stage4_Actors_30m active

·        shared actor field normalized

·        backup and sanctioned automation exceptions validated

Enforcement Method

Reference-set-backed staged correlation

Implementation Constraint Notes

·        standalone single-event alerting is not permitted

·        if CEP_UserName is unreliable, define and validate one fallback join key before deployment, such as:

o   sourceip|targetobject

o   service principal ID

o   application ID

·        do not mix join strategies inside one deployed rule

CRE Wizard Test Order

1.       when the event matches BB:ActionFamily:High_Risk_Cloud_Post_Control

2.       and when the event does not match BB:Exclude:Approved_Admin_and_Automation

3.       and when either:

o   CEP_UserName is in RS:Recent_Stage2_Actors_30m

o   CEP_UserName is in RS:Recent_Stage4_Actors_30m

Responses

·        create offense if none exists for CEP_UserName

·        otherwise add to existing offense for CEP_UserName

·        magnitude: Critical

·        rule response note: Stage5_Objective_Execution_Post_Control

AQL Validation

SELECT username, QIDNAME(qid), COUNT(*) AS event_count
FROM events
WHERE QIDNAME(qid) ILIKE '%PutObject%'
   OR QIDNAME(qid) ILIKE '%UploadObject%'
   OR QIDNAME(qid) ILIKE '%Snapshot%'
   OR QIDNAME(qid) ILIKE '%Logging%'
   OR QIDNAME(qid) ILIKE '%SecurityControl%'
GROUP BY username, QIDNAME(qid)
LAST 30 MINUTES

Variant Analysis

Covered: late-stage storage, snapshot, logging, and security-control actions after earlier identity anomaly or privilege transition.
Not Covered: low-and-slow post-control activity outside the window, delegated-service actions without stable attribution, provider verbs missing from the BB.

Sigma

Engineering Position

Sigma is the portable detection-content layer. These rules are designed to be converted into backend-specific implementations, not to replace backend-native state, baseline, threshold, reference-set, or offense logic.

These rules are:

·        detection-portable

·        implementation-aware

·        backend-dependent for enforcement of stateful logic

Global Backend Enforcement Requirement

Before conversion and deployment, validate backend mappings for:

User Identity

user.name, user.id, user.email

Source Context

source.ip, source.geo.country_name

Action / Operation

event.action

Outcome

event.outcome

Process / File Context

process.name, process.command_line, file.path

Constraint

Deployment without validated backend field mapping is not permitted.

Rule Name

Edge-Adjacent Sensitive Artifact Access or Suspicious Tooling

Mapped Stage

Stage 1 Credential Harvesting

MITRE ATT&CK

T1555 – Credentials from Password Stores
T1550 – Use of Alternate Authentication Material

SOC Usage Mode

Correlation-only

Minimum Deployment Requirement

Deploy only to:

·        edge-adjacent Linux telemetry

·        hosts that store copied edge artifacts

·        hosts with process and file visibility

Enforcement Method

Host scoping and exclusion logic must be enforced in the destination backend.

Implementation Constraint Notes

·        Standalone alerting is not permitted

·        Broad enterprise deployment is not permitted

·        Partial Stage 1 coverage only

·        Backend host scoping is mandatory

Backend Enforcement Notes

The destination SIEM or EDR must restrict this rule to approved edge-adjacent host groups or equivalent tags.

title: Edge-Adjacent Sensitive Artifact Access or Suspicious Tooling
id: 8a3f1d2e-1c6b-4d15-9b11-110000000001
status: experimental
description: Detects suspicious access to copied edge configuration, session, token, backup, export, or support-bundle artifacts, or suspicious tooling interacting with those artifacts on edge-adjacent Linux systems.
references:
  - internal-source
author: OpenAI
date: 2026-04-03
logsource:
  product: linux
detection:
  selection_file:
    file.path|contains:
      - session
      - token
      - config
      - backup
      - export
      - support
  selection_proc:
process.name|endswith:
      - bash
      - sh
      - python
      - python3
      - curl
      - wget
      - chmod
      - chown
  selection_cmd:
    process.command_line|contains:
      - session
      - token
      - config
      - backup
      - export
      - support
      - /tmp/
      - /var/tmp/
  filter_main_legit:
    process.command_line|contains:
      - ansible
      - puppet
      - chef
      - salt
      - backup
      - monitor
      - compliance
  condition: (selection_file or (selection_proc and selection_cmd)) and not filter_main_legit
falsepositives:
  - Approved maintenance or support activity on edge-adjacent systems
level: medium
tags:
  - attack.credential_access
  - attack.t1555
  - attack.t1550

Variant Analysis

Covered

·        artifact access patterns

·        suspicious tooling touching session, token, config, backup, export, or support artifacts

Not Covered

·        appliance-internal-only activity

·        memory-only harvesting

·        vendor-specific artifact names not present in file or process telemetry

Rule Name

Successful Authentication from Infrastructure-Associated Source Context

Mapped Stage

Stage 2 Valid Account Authentication

MITRE ATT&CK

T1078 – Valid Accounts
T1550 – Use of Alternate Authentication Material

SOC Usage Mode

Alert-capable supporting detection

Minimum Deployment Requirement

Requires:

·        successful authentication logs

·        source IP visibility

·        backend-specific infrastructure source scoping

Enforcement Method

Infrastructure-source context must be enforced in the destination backend.

Implementation Constraint Notes

This Sigma rule does not implement first-seen or baseline logic by itself

·        Failed-login-only deployment is not permitted

·        This is supporting detection only

Backend Enforcement Notes

If first-seen, baseline deviation, impossible-travel, or device-anomaly logic is required, it must be implemented in the destination backend after Sigma conversion.

title: Successful Authentication from Infrastructure-Associated Source Context
id: 8a3f1d2e-1c6b-4d15-9b11-110000000002
status: experimental
description: Detects successful authentication events from infrastructure-associated source ranges or other non-user source contexts. Historical baseline and first-seen logic must be implemented in the target backend if required.
references:
  - internal-source
author: OpenAI
date: 2026-04-03
logsource:
  category: authentication
detection:
  selection_success:
    event.outcome: success
  selection_infra_source:
    source.ip|cidr:
      - 10.0.0.0/8
      - 172.16.0.0/12
      - 192.168.0.0/16
  condition: selection_success and selection_infra_source
falsepositives:
  - Approved identity middleware
  - Federation services
  - Infrastructure-based identity workflows
level: medium
tags:
  - attack.persistence
  - attack.valid_accounts
  - attack.t1078
  - attack.t1550

Variant Analysis

Covered

·        successful auth from infrastructure-associated source context

Not Covered

·        token reuse without new login

·        baseline deviation or first-seen logic unless added downstream

·        federated auth with poor source attribution

Rule Name

Identity and IAM Enumeration Activity

Mapped Stage

Stage 3 Account and Resource Discovery

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery

SOC Usage Mode

Correlation or threshold-backed alerting

Minimum Deployment Requirement

Requires:

·        normalized cloud and identity audit verbs

·        backend thresholding or correlation support

·        exception lists for governance and inventory activity

Enforcement Method

Burst thresholds and actor grouping must be enforced in the destination backend.

Implementation Constraint Notes

·        Single-event alerting is not permitted

·        Backend thresholding is mandatory for production use

Backend Enforcement Notes

Destination backend should require:

·        actor grouping

·        short interval threshold

·        approved inventory/admin suppressions

title: Identity and IAM Enumeration Activity
id: 8a3f1d2e-1c6b-4d15-9b11-110000000003
status: experimental
description: Detects identity and IAM enumeration actions associated with discovery of users, roles, groups, service principals, applications, and IAM policy metadata.
references:
  - internal-source
author: OpenAI
date: 2026-04-03
logsource:
  category: cloud
detection:
  selection_actions:
    event.action:
      - ListUsers
      - ListRoles
      - GetRole
      - ListGroups
      - ListServicePrincipals
      - GetIamPolicy
      - ListRoleAssignments
      - GetDirectoryRole
      - ListApplications
  filter_main_legit:
user.name:
      - governance-service
      - inventory-service
      - approved-admin
  condition: selection_actions and not filter_main_legit
falsepositives:
  - Governance collectors
  - Inventory tooling
  - Approved administrative review activity
level: medium
tags:
  - attack.discovery
  - attack.account_discovery
  - attack.permission_groups_discovery
  - attack.t1087
  - attack.t1069

Variant Analysis

Covered

·        identity and IAM read actions for users, roles, groups, service principals, applications, and policy metadata

Not Covered

·        low-and-slow discovery

·        provider-specific unmapped verbs

·        production-safe burst logic unless enforced downstream

Rule Name

Privilege Boundary Change or Access-Control Modification

Mapped Stage

Stage 4 Privilege Escalation

MITRE ATT&CK

T1098 – Account Manipulation

SOC Usage Mode

Alert-capable primary detection

Minimum Deployment Requirement

Requires:

·        normalized cloud and identity admin verbs

·        approved admin exclusions

·        tenant verb validation

Enforcement Method

Direct privilege-change matching in the destination backend.

Implementation Constraint Notes

·        Credential creation is not permitted in this rule

·        Post-control data actions are not permitted in this rule

·        Provider verb validation is mandatory

Backend Enforcement Notes

Destination backend should preserve direct action-family semantics and maintain approved admin exceptions.

title: Privilege Boundary Change or Access-Control Modification
id: 8a3f1d2e-1c6b-4d15-9b11-110000000004
status: experimental
description: Detects direct authority-expanding changes such as role assignment, privileged group membership modification, or IAM policy change.
references:
  - internal-source
author: OpenAI
date: 2026-04-03
logsource:
  category: cloud
detection:
  selection_actions:
    event.action:
      - AddRoleAssignment
      - AttachRolePolicy
      - PutRolePolicy
      - AddMemberToPrivilegedGroup
      - GrantAdminRole
      - UpdateAssumeRolePolicy
      - SetIamPolicy
      - AddDirectoryRoleMember
  filter_main_legit:
user.name:
      - approved-admin
      - pam-service
      - breakglass-approved
  condition: selection_actions and not filter_main_legit
falsepositives:
  - Approved privileged administration
  - Emergency access workflows
level: high
tags:
  - attack.privilege_escalation
  - attack.account_manipulation
  - attack.t1098

Variant Analysis

Covered

·        direct role, policy, trust-policy, and privileged membership changes

Not Covered

·        indirect escalation through inherited permissions

·        poorly normalized provider verbs

Rule Name

Durable Access Artifact Creation

Mapped Stage

Stage 5 Persistence

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Alert-capable high-confidence detection

Minimum Deployment Requirement

Requires:

·        cloud and identity audit coverage for credential and identity-object creation

·        tenant verb validation

Enforcement Method

Direct durable-artifact creation matching in the destination backend.

Implementation Constraint Notes

·        Privilege-boundary change actions are not permitted here

·        Bulk data actions are not permitted here

·        Provider verb validation is mandatory

Backend Enforcement Notes

Destination backend should keep suppressions narrow and tied only to approved provisioning workflows.

title: Durable Access Artifact Creation
id: 8a3f1d2e-1c6b-4d15-9b11-110000000005
status: experimental
description: Detects creation of long-lived access artifacts such as access keys, service principals, client secrets, and application credentials.
references:
  - internal-source
author: OpenAI
date: 2026-04-03
logsource:
  category: cloud
detection:
  selection_actions:
    event.action:
      - CreateAccessKey
      - CreateServicePrincipal
      - AddClientSecret
      - CreateApplicationCredential
      - GrantOAuthConsent
      - AddPasswordCredential
      - AddKeyCredential
  filter_main_legit:
user.name:
      - approved-provisioning
      - approved-admin
  condition: selection_actions and not filter_main_legit
falsepositives:
  - Approved provisioning systems
  - Narrowly scoped credential rotation workflows
level: high
tags:
  - attack.persistence
  - attack.valid_accounts
  - attack.account_manipulation
  - attack.t1078
  - attack.t1098

Variant Analysis

Covered

·        durable credential and identity-artifact creation

Not Covered

·        temporary-token abuse

·        delegated access paths without durable object creation

Rule Name

High-Risk Cloud Action Following Privilege Transition

Mapped Stage

Stage 5 Objective Execution

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Correlation-first

Minimum Deployment Requirement

Requires a backend that supports:

·        Sigma correlation

·        or equivalent translated sequence logic

·        stable actor attribution

Enforcement Method

Sequence or correlation logic must be implemented in the destination backend.

Implementation Constraint Notes

·        Standalone single-event alerting is not permitted

·        This rule requires a backend supporting Sigma correlation or an equivalent translated feature

·        If storage-heavy activity is common, split storage actions from control-plane impairment actions downstream

Backend Enforcement Notes

Do not deploy this rule as a plain single-event Sigma conversion. It must be converted into backend correlation or sequence logic.

title: High-Risk Cloud Action Following Privilege Transition
id: 8a3f1d2e-1c6b-4d15-9b11-110000000006
status: experimental
description: Detects high-risk cloud data or control-plane actions following a privilege boundary change by the same actor within a constrained interval.
references:
  - internal-source
author: OpenAI
date: 2026-04-03
correlation:
  type: event_count
  rules:
    - 8a3f1d2e-1c6b-4d15-9b11-110000000004
    - 8a3f1d2e-1c6b-4d15-9b11-110000000006-base
  group-by:
    - user.name
  timespan: 30m
level: high
tags:
  - attack.exfiltration
  - attack.impact
  - attack.valid_accounts
  - attack.account_manipulation
  - attack.t1078
  - attack.t1098
---
title: High-Risk Cloud Action Following Privilege Transition Base
id: 8a3f1d2e-1c6b-4d15-9b11-110000000006-base
status: experimental
description: Base detector for high-risk cloud post-control actions.
references:
  - internal-source
author: OpenAI
date: 2026-04-03
logsource:
  category: cloud
detection:
  selection_actions:
    event.action:
      - PutObject
      - UploadObject
      - CreateSnapshot
      - ModifyLogging
      - DisableSecurityControl
      - StopLogging
      - DeleteTrail
      - UpdateBucketPolicy
  filter_main_legit:
user.name:
      - approved-backup
      - approved-admin
      - approved-automation
  condition: selection_actions and not filter_main_legit
falsepositives:
  - Approved backup workflows
  - Sanctioned cloud administration
level: medium
tags:
  - attack.exfiltration
  - attack.impact
  - attack.t1078
  - attack.t1098

Variant Analysis

Covered

·        ordered progression from privilege transition into storage, snapshot, logging, and security-control-impacting actions

Not Covered

·        slow post-control actions outside the correlation window

·        delegated service activity without stable actor attribution

·        backends that do not support Sigma correlation or equivalent translated logic

YARA

Engineering Position

YARA is the artifact and content-detection layer.

It is appropriate for:

·        suspicious web shells

·        dropped scripts

·        copied session or credential dump artifacts

·        shell-history fragments

·        recovered admin tooling

·        operator notes and staging files

It is not the authoritative layer for:

·        successful authentication detection

·        identity session anomalies

·        privilege changes in IdP or cloud logs

·        cloud control-plane sequencing

Those behaviors are identity- and cloud-native in this intrusion model and belong in log and correlation layers rather than static content signatures.

Rule Name

Edge Web Shell or Unauthorized Edge Script Artifact

Mapped Stage

Stage 1 Credential Harvesting

MITRE ATT&CK

T1190 – Exploit Public-Facing Application
T1555 – Credentials from Password Stores

SOC Usage Mode

Alert-capable supporting detection

Minimum Deployment Requirement
Deploy only on:

·        edge-adjacent file collections

·        suspicious web directories

·        extracted appliance file systems

·        support bundles

·        forensic triage sets from suspected edge compromise

Enforcement Method

Restrict scanning scope to edge-adjacent artifacts only.

Implementation Constraint Notes

Broad enterprise-wide YARA deployment is not permitted.
This rule is intended for unauthorized files or scripts on edge systems, which the intrusion model explicitly identifies as a Stage 1 behavior.

rule CYBERDAX_EXP_Edge_Webshell_Or_Unauthorized_Script
{
    meta:
        description = "Detects suspicious edge web shells or unauthorized script artifacts associated with edge-to-identity intrusion chains"
        author = "OpenAI"
        date = "2026-04-03"
        stage = "Stage 1 Credential Harvesting"
        mitre_1 = "T1190 - Exploit Public-Facing Application"
        mitre_2 = "T1555 - Credentials from Password Stores"
        usage_mode = "Alert-capable supporting detection"

    strings:
        $php_1 = "system($_" ascii nocase
        $php_2 = "shell_exec($_" ascii nocase
        $php_3 = "passthru($_" ascii nocase
        $php_4 = "eval(base64_decode(" ascii nocase
        $php_5 = "assert($_POST" ascii nocase

        $jsp_1 = "Runtime.getRuntime().exec" ascii nocase
        $jsp_2 = "ProcessBuilder(" ascii nocase

        $py_1  = "subprocess.Popen(" ascii nocase
        $py_2  = "os.system(" ascii nocase

        $sh_1  = "/bin/sh" ascii nocase
        $sh_2  = "/bin/bash" ascii nocase

        $net_1 = "curl -k" ascii nocase
        $net_2 = "wget --no-check-certificate" ascii nocase
        $net_3 = "chmod +x /tmp/" ascii nocase

        $edge_1 = "sessionid" ascii nocase
        $edge_2 = "auth_token" ascii nocase
        $edge_3 = "vpn" ascii nocase
        $edge_4 = "support bundle" ascii nocase
        $edge_5 = "configuration export" ascii nocase

    condition:
        (
            2 of ($php_*) or
            2 of ($jsp_*) or
            2 of ($py_*) or
            2 of ($sh_*,$net_*)
        )
        or
        (
            1 of ($php_*,$jsp_*,$py_*,$sh_*,$net_*) and
            2 of ($edge_*)
        )
}

Variant Analysis

Covered

·        PHP, JSP, Python, and shell-style web-shell or script artifacts

·        unauthorized tooling with edge/session-oriented context

Not Covered

·        heavily obfuscated shells

·        compiled implants with no useful strings

·        pure memory-only shell activity

·        benign admin scripts that do not contain shell-like or web-shell-like behavior markers

Rule Name
Edge Session or Credential Dump Artifact

Mapped Stage

Stage 1 Credential Harvesting

MITRE ATT&CK

T1555 – Credentials from Password Stores
T1550 – Use of Alternate Authentication Material

SOC Usage Mode

Correlation-first

Minimum Deployment Requirement

Use only on:

·        copied config files

·        extracted edge storage

·        support bundles

·        memory string dumps exported to text

·        recovered dump artifacts from suspected edge compromise

Enforcement Method

Restrict to artifacts collected from exploited or suspected edge infrastructure.

Implementation Constraint Notes

Standalone alerting is not permitted.
This rule is intended to detect artifact content consistent with session or credential exposure, which the intrusion model places at the core of Stage 1.

rule CYBERDAX_EXP_Edge_Session_Or_Credential_Dump_Artifact
{
    meta:
        description = "Detects edge-derived dump artifacts containing session, cookie, token, or credential-related content"
        author = "OpenAI"
        date = "2026-04-03"
        stage = "Stage 1 Credential Harvesting"
        mitre_1 = "T1555 - Credentials from Password Stores"
        mitre_2 = "T1550 - Use of Alternate Authentication Material"
        usage_mode = "Correlation-first"

    strings:
        $h1 = "Set-Cookie:" ascii nocase
        $h2 = "Authorization: Bearer " ascii nocase
        $h3 = "Cookie:" ascii nocase

        $t1 = "sessionid=" ascii nocase
        $t2 = "auth_token=" ascii nocase
        $t3 = "remember_token=" ascii nocase
        $t4 = "refresh_token" ascii nocase
        $t5 = "access_token" ascii nocase

        $c1 = "password=" ascii nocase
        $c2 = "credential" ascii nocase
        $c3 = "saml" ascii nocase
        $c4 = "oauth" ascii nocase
        $c5 = "vpn" ascii nocase

    condition:
        (
            2 of ($h*) and
            2 of ($t*,$c*)
        )
        or
        (
            4 of ($t*,$c*)
        )
}

Variant Analysis

Covered

·        dumped cookies, bearer headers, token fields, and credential-bearing text artifacts

·        support-bundle or copied-storage text with auth-related residue

Not Covered

·        encrypted dumps

·        binary-only token containers

·        proprietary vendor encodings with no readable auth markers

Rule Name

Recovered Identity and Cloud Administration Script Artifact

Mapped Stage

Stage 3 Account and Resource Discovery
Stage 4 Privilege Escalation and Control Transition

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery
T1098 – Account Manipulation

SOC Usage Mode

Hunt-only

Minimum Deployment Requirement

Use on:

·        recovered scripts

·        dropped admin tooling

·        shell-history exports

·        forensic text collections

·        operator notes

Enforcement Method

Hunt in recovered files only. Do not use as a standalone production alert.

Implementation Constraint Notes

Standalone alerting is not permitted.
This rule is hunt-only because these stages are primarily expressed through IdP and cloud administrative interfaces and APIs, not static malware artifacts.

rule CYBERDAX_EXP_Recovered_Identity_Cloud_Admin_Script
{
    meta:
        description = "Detects recovered scripts or textual artifacts containing identity and cloud enumeration or privilege modification tooling"
        author = "OpenAI"
        date = "2026-04-03"
        stage = "Stage 3 and Stage 4"
        mitre_1 = "T1087 - Account Discovery"
        mitre_2 = "T1069 - Permission Groups Discovery"
        mitre_3 = "T1098 - Account Manipulation"
        usage_mode = "Hunt-only"

    strings:
        $az_1 = "az ad user list" ascii nocase
        $az_2 = "az role assignment list" ascii nocase
        $az_3 = "az role assignment create" ascii nocase

        $aws_1 = "aws iam list-" ascii nocase
        $aws_2 = "aws iam get-" ascii nocase
        $aws_3 = "aws iam attach-role-policy" ascii nocase

        $gcp_1 = "gcloud projects get-iam-policy" ascii nocase
        $gcp_2 = "gcloud projects add-iam-policy-binding" ascii nocase

        $ms_1 = "Add-AzureADDirectoryRoleMember" ascii nocase
        $ms_2 = "Add-MgGroupMember" ascii nocase
        $ms_3 = "Get-MgUser" ascii nocase
        $ms_4 = "Get-MgDirectoryRole" ascii nocase

    condition:
        2 of them
}

Variant Analysis

Covered

·        recovered scripts or notes containing common Azure, AWS, GCP, and Microsoft identity administration verbs

Not Covered

·        pure API abuse with no script artifact

·        GUI-only admin activity

·        renamed or encoded tooling with no readable command residue

Rule Name

Durable Access Creation Artifact

Mapped Stage

Stage 5 Persistence

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Alert-capable supporting detection

Minimum Deployment Requirement

Use on:

·        attacker scripts

·        shell-history exports

·        automation fragments

·        recovered admin tooling files

·        textual forensic artifacts

Enforcement Method

Restrict to recovered or suspicious artifacts and pair with cloud-audit confirmation.

Implementation Constraint Notes

This rule does not confirm successful persistence on its own.
Use with identity or cloud logs to confirm long-lived access creation, which the intrusion model identifies as Stage 5 behavior.

rule CYBERDAX_EXP_Durable_Access_Creation_Artifact
{
    meta:
        description = "Detects scripts or text artifacts used to create durable cloud or identity access artifacts"
        author = "OpenAI"
        date = "2026-04-03"
        stage = "Stage 5 Persistence"
        mitre_1 = "T1078 - Valid Accounts"
        mitre_2 = "T1098 - Account Manipulation"
        usage_mode = "Alert-capable supporting detection"

    strings:
        $a1 = "CreateAccessKey" ascii nocase
        $a2 = "CreateServicePrincipal" ascii nocase
        $a3 = "AddClientSecret" ascii nocase
        $a4 = "AddPasswordCredential" ascii nocase
        $a5 = "AddKeyCredential" ascii nocase
        $a6 = "CreateApplicationCredential" ascii nocase
        $a7 = "service-principal create" ascii nocase
        $a8 = "create-access-key" ascii nocase
        $a9 = "grant oauth consent" ascii nocase

    condition:
        2 of them
}

Variant Analysis

Covered

·        scripts or text showing durable credential, secret, key, or service-principal creation

Not Covered

·        direct console/API activity without artifact residue

·        temporary token abuse

·        delegated-consent paths with no local script or text evidence

Rule Name

High-Risk Cloud Objective or Impact Artifact

Mapped Stage

Stage 5 Objective Execution

MITRE ATT&CK

T1041 – Exfiltration Over C2 Channel
T1486 – Data Encrypted for Impact
T1098 – Account Manipulation

SOC Usage Mode

Hunt-only or correlation-first

Minimum Deployment Requirement

Use on:

·        recovered scripts

·        operator notes

·        shell-history files

·        dumped command files

·        staging artifacts

Enforcement Method

Use as hunt content or supporting artifact detection only.

Implementation Constraint Notes

Standalone alerting is not permitted.
This rule is supporting-only because Stage 5 objective execution in the intrusion model occurs largely through legitimate identity and cloud control channels, not necessarily static malware files.

rule CYBERDAX_EXP_High_Risk_Cloud_Objective_Artifact
{
    meta:
        description = "Detects scripts or artifacts associated with high-risk cloud data access, logging impairment, snapshot activity, or destructive objective execution"
        author = "OpenAI"
        date = "2026-04-03"
        stage = "Stage 5 Objective Execution"
        mitre_1 = "T1041 - Exfiltration Over C2 Channel"
        mitre_2 = "T1486 - Data Encrypted for Impact"
        mitre_3 = "T1098 - Account Manipulation"
        usage_mode = "Hunt-only or correlation-first"

    strings:
        $d1 = "aws s3 cp" ascii nocase
        $d2 = "gsutil cp" ascii nocase
        $d3 = "PutObject" ascii nocase
        $d4 = "UploadObject" ascii nocase
        $d5 = "CreateSnapshot" ascii nocase
        $d6 = "DeleteTrail" ascii nocase
        $d7 = "DisableSecurityControl" ascii nocase
        $d8 = "ModifyLogging" ascii nocase
        $d9 = "encrypt" ascii nocase
        $d10 = "ransom" ascii nocase

    condition:
        (
            2 of ($d1,$d2,$d3,$d4,$d5,$d6,$d7,$d8)
        )
        or
        (
            1 of ($d1,$d2,$d3,$d4,$d5,$d6,$d7,$d8) and
            1 of ($d9,$d10)
        )
}

Variant Analysis

Covered

·        recovered artifacts indicating bulk data movement, snapshot creation, logging impairment, security-control manipulation, or destructive intent

Not Covered

·        pure console/API activity with no file or text artifact

·        provider-specific verbs not represented in strings

·        minimalist operator behavior leaving no script residue

Engineering Note

This hardened YARA set now matches the intrusion model’s real detection boundaries:

·        strongest at Stage 1 for web shells, dump artifacts, and unauthorized files/scripts

·        supporting or hunt-only for later stages where the attack shifts into identity and cloud control channels

·        not a replacement for identity or cloud-native telemetry, which the source model explicitly prioritizes for detection across Stage 2 through Stage 5

AWS

Engineering Position

AWS is the native cloud audit and control-plane detection layer for AWS-visible behavior in this intrusion chain. It is strongest for:

·        Stage 3 discovery

·        Stage 4 privilege escalation

·        Stage 5 persistence

·        Stage 5 objective execution

It is weaker for:

·        direct Stage 1 edge exploit visibility

·        upstream identity-provider session lineage outside AWS-visible telemetry

·        appliance-internal artifact access

Mandatory Data Source Requirement

Before deployment, validate:

CloudTrail

·        Management events enabled

·        Write events enabled

·        Read events enabled where required

·        Global service events enabled

S3 / Data Events

·        Enable S3 data events for relevant buckets if using object-level actions like PutObject

Identity Context

·        Principal attribution fields available and consistent enough for downstream joins

Constraint

Deployment without validated CloudTrail coverage is not permitted. Rules using object-level S3 actions are not valid unless S3 data events are enabled for the relevant scope.

Rule Name
AWS Identity and IAM Enumeration Burst

Mapped Stage

Stage 3 Account and Resource Discovery

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery

SOC Usage Mode

Correlation or threshold-backed alerting

Minimum Deployment Requirement

Requires:

·        CloudTrail IAM read activity

·        downstream thresholding

·        downstream exclusions for approved inventory, governance, and admin automation

Enforcement Method

EventBridge matches IAM enumeration APIs.
Burst logic must be enforced in the downstream target.

Implementation Constraint Notes

·        Single-event alerting is not permitted

·        Production use requires short-window actor grouping

·        Approved governance and inventory tooling must be excluded downstream

·        Failed API calls should be excluded

EventBridge Event Pattern JSON

{
  "source": ["aws.iam"],
  "detail-type": ["AWS API Call via CloudTrail"],
  "detail": {
    "eventSource": ["iam.amazonaws.com"],
    "eventName": [
      "ListUsers",
      "ListRoles",
      "ListAttachedUserPolicies",
      "ListAttachedRolePolicies",
      "GetRole",
      "GetPolicy",
      "GetPolicyVersion",
      "ListAccessKeys",
      "GetAccountAuthorizationDetails"
    ],
    "readOnly": [true],
    "errorCode": [
      { "exists": false }
    ]
  }
}

Target / Downstream Action Guidance

Downstream logic should:

·        group by actor, such as principal ARN or username

·        alert only when the same actor performs repeated enumeration in a short window such as 5 minutes

·        optionally require 3 or more distinct enumeration APIs

·        suppress known inventory, governance, and approved admin tooling

Variant Analysis

Covered

·        common AWS IAM enumeration APIs

Not Covered

·        low-and-slow discovery

·        non-IAM enumeration outside this action family

·        service-specific read APIs not listed here

Logical Notes

Single-rule meaning: IAM enumeration activity observed.
Correlated meaning: privilege-path or target discovery in AWS.

Rule Execution Validity

Deployable only with downstream thresholding or correlation.

Rule Name

Privilege Boundary Change via IAM Policy or Role Modification

Mapped Stage

Stage 4 Privilege Escalation

MITRE ATT&CK

T1098 – Account Manipulation

SOC Usage Mode

Alert-capable primary detection

Minimum Deployment Requirement

Requires:

·        CloudTrail write activity

·        downstream allowlist for approved administration and automation

·        principal normalization

Enforcement Method

Direct match on privilege-boundary-changing IAM APIs.

Implementation Constraint Notes

·        Durable-access creation is not permitted in this rule

·        Storage or data actions are not permitted in this rule

·        Approved admin exceptions must be enforced downstream

·        Failed API calls should be excluded

EventBridge Event Pattern JSON

{
  "source": ["aws.iam"],
  "detail-type": ["AWS API Call via CloudTrail"],
  "detail": {
    "eventSource": ["iam.amazonaws.com"],
    "eventName": [
      "AttachUserPolicy",
      "AttachRolePolicy",
      "PutUserPolicy",
      "PutRolePolicy",
      "PutRolePermissionsBoundary",
      "CreatePolicyVersion",
      "UpdateAssumeRolePolicy",
      "AddUserToGroup"
    ],
    "readOnly": [false],
    "errorCode": [
      { "exists": false }
    ]
  }
}

Target / Downstream Action Guidance

Downstream logic should:

·        suppress explicitly approved admin and automation identities

·        raise severity when the actor is not a normal administrator

·        optionally inspect whether CreatePolicyVersion created a new default version

·        enrich AddUserToGroup to confirm the group is privileged

Variant Analysis

Covered

·        direct IAM role, user, inline policy, permissions-boundary, trust-policy, and group membership changes

Not Covered

·        indirect escalation through inherited permissions

·        escalation caused by pre-existing over-privileged roles without a new IAM change

·        privilege changes hidden behind unmapped APIs

Logical Notes

Single-rule meaning: direct privilege-boundary change in AWS IAM.
Correlated meaning: confirmed escalation into higher authority.

Rule Execution Validity

Deployable as a primary escalation detector.

Rule Name

Durable Access Artifact Creation in AWS

Mapped Stage

Stage 5 Persistence

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Alert-capable high-confidence detection

Minimum Deployment Requirement

Requires:

·        CloudTrail write activity

·        downstream exception handling for tightly controlled provisioning workflows

Enforcement Method

Direct match on durable-access artifact creation APIs.

Implementation Constraint Notes

·        Privilege-boundary changes are not permitted in this rule

·        Storage and data actions are not permitted in this rule

·        Suppressions must remain narrow and explicit

·        CreateUser is often legitimate in some environments; split or suppress aggressively if onboarding volume is high

·        Failed API calls should be excluded

EventBridge Event Pattern JSON

{
  "source": ["aws.iam"],
  "detail-type": ["AWS API Call via CloudTrail"],
  "detail": {
    "eventSource": ["iam.amazonaws.com"],
    "eventName": [
      "CreateAccessKey",
      "CreateLoginProfile",
      "CreateUser"
    ],
    "readOnly": [false],
    "errorCode": [
      { "exists": false }
    ]
  }
}

Target / Downstream Action Guidance

Downstream logic should:

·        exclude only tightly controlled provisioning identities

·        raise severity on access-key creation by non-admin or non-provisioning actors

·        distinguish expected onboarding from suspicious persistence creation

·        strongly consider splitting CreateUser into its own rule if it is common in the tenant

Variant Analysis

Covered

·        access key creation

·        console credential creation

·        IAM user creation where relevant to the environment

Not Covered

·        STS-only temporary session abuse

·        delegated access paths without durable IAM artifact creation

·        persistence through unmanaged or external identity trust not reflected in IAM creation events

Logical Notes

Single-rule meaning: durable access artifact creation in AWS.
Correlated meaning: persistence establishment through legitimate AWS control-plane mechanisms.

Rule Execution Validity

Deployable as a primary persistence detector, with careful CreateUser handling.

Rule Name

High-Risk Cloud Action Following Privilege Transition

Mapped Stage

Stage 5 Objective Execution

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Correlation-first

Minimum Deployment Requirement

Requires:

·        CloudTrail write activity

·        a stateful downstream target

·        actor continuity or an alternate join-key strategy

·        mature backup and automation exceptions

·        S3 data events enabled for the relevant buckets if PutObject is used

Enforcement Method

EventBridge matches high-risk post-control actions.
Downstream logic must correlate them to a prior Rule 2 privilege-transition event.

Implementation Constraint Notes

·        Standalone single-event alerting is not permitted

·        Actor continuity must be validated downstream

·        If storage-heavy workloads are common, split data actions from logging or security-control impairment actions

·        Do not rely on event proximity alone; use the same actor or a validated fallback join key

·        PutObject requires S3 data events and should be removed if those data events are not enabled

·        Failed API calls should be excluded

EventBridge Event Pattern JSON

{
  "source": ["aws.s3", "aws.ec2", "aws.cloudtrail"],
  "detail-type": ["AWS API Call via CloudTrail"],
  "detail": {
    "eventSource": [
      "s3.amazonaws.com",
      "ec2.amazonaws.com",
      "cloudtrail.amazonaws.com"
    ],
    "eventName": [
      "PutObject",
      "PutBucketPolicy",
      "CreateSnapshot",
      "StopLogging",
      "DeleteTrail",
      "UpdateTrail"
    ],
    "readOnly": [false],
    "errorCode": [
      { "exists": false }
    ]
  }
}

Target / Downstream Action Guidance

Downstream logic should:

·        correlate to a prior privilege-transition event by the same actor within a bounded interval such as 30 minutes

·        separate storage-heavy operations from trail or logging impairment if needed

·        elevate to critical only when prior privilege-transition context exists

·        define fallback join strategy if actor naming is inconsistent, such as:

o   principal ARN

o   session issuer ARN

o   assumed-role principal ID

Variant Analysis

Covered

·        storage policy or object actions

·        snapshot creation

·        CloudTrail trail/logging changes after privilege transition

Not Covered

·        low-and-slow post-control activity outside the correlation window

·        delegated-service execution with weak actor attribution

·        high-risk post-control APIs outside the listed services or event names

Logical Notes

Single-rule meaning: high-risk AWS action observed.
Correlated meaning: objective execution, defense impairment, or late-stage operational action after escalation.

Rule Execution Validity

Deployable only as correlation-first content.

Rule Name

AWS Administrative API Activity Signal Aggregator from Infrastructure-Associated Source Context

Mapped Stage

Stage 2 Valid Account Authentication
Stage 3 Account and Resource Discovery

MITRE ATT&CK

T1078 – Valid Accounts
T1087 – Account Discovery

SOC Usage Mode

Supporting detection or correlation-first

Minimum Deployment Requirement

Requires:

·        source IP visibility in CloudTrail-delivered events

·        downstream infrastructure-source scoping

·        approved automation exclusions

Enforcement Method

EventBridge matches a narrow AWS IAM administrative signal family.
Downstream logic must determine whether source context is infrastructure-associated or otherwise suspicious.

Implementation Constraint Notes

·        Standalone paging is not permitted unless infrastructure-source logic is mature

·        This remains supporting-only because AWS-native logs do not always prove the upstream identity anomaly by themselves

·        Approved automation and CI or CD roles must be excluded

·        This is a signal aggregator, not a primary high-confidence rule

·        Failed API calls should be excluded

EventBridge Event Pattern JSON

{
  "source": ["aws.iam"],
  "detail-type": ["AWS API Call via CloudTrail"],
  "detail": {
    "eventSource": ["iam.amazonaws.com"],
    "eventName": [
      "ListUsers",
      "ListRoles",
      "GetRole",
      "AttachUserPolicy",
      "AttachRolePolicy"
    ],
    "errorCode": [
      { "exists": false }
    ]
  }
}

Target / Downstream Action Guidance

Downstream logic should:

·        compare source IP against known infrastructure or non-user ranges

·        exclude approved automation, CI or CD, and sanctioned admin roles

·        treat as a supporting signal linking infrastructure-origin activity to AWS discovery or control actions

·        optionally enrich with VPC, proxy, NAT, or organization egress context

Variant Analysis

Covered

·        AWS IAM administrative APIs from potentially suspicious source context

Not Covered

·        token reuse without distinguishable source context

·        AWS service-to-service paths that mask the initiating actor

·        persistence creation or high-risk storage actions, which are intentionally excluded from this aggregator

Logical Notes

Single-rule meaning: AWS administrative API signal observed.
Correlated meaning: suspicious authenticated-session use leading into AWS discovery or control activity.

Rule Execution Validity

Deployable as supporting or correlation-first content only.

Engineering Note

This corrected AWS rule set is now explicitly written in the agreed system-ready format: Amazon EventBridge event pattern JSON.

That means:

·        EventBridge handles matching

·        downstream targets handle state

·        downstream targets handle thresholding

·        downstream targets handle correlation

·        downstream targets handle exceptions and severity

It is therefore easier to translate for teams using:

·        EventBridge directly

·        Lambda

·        Step Functions

·        SIEM forwarding

·        Security Hub custom findings

·        other cloud-native or third-party pipelines

Azure

Engineering Position

Azure Activity Log Alert JSON is strongest for:

·        Stage 4 privilege-boundary and access-control modification

·        Stage 5 high-risk post-control Azure management actions

It is weaker for:

·        Stage 1 edge artifact visibility

·        Stage 2 identity session lineage and sign-in anomaly detection

·        Stage 3 burst-based discovery detections

·        identity-native persistence actions that live primarily outside Azure Activity Log

Mandatory Data Source Requirement

Before deployment, validate:

·        Azure Activity Log coverage for all intended subscriptions or scopes

·        reliable use of:

o   category

o   operationName

o   caller

o   status

o   resourceProvider

o   resourceType

·        action groups for downstream handling

Constraint
Deployment without validated Activity Log coverage is not permitted.

Rule Name

Azure Privilege Boundary Change or Access-Control Modification

Mapped Stage

Stage 4 Privilege Escalation

MITRE ATT&CK

T1098 – Account Manipulation

SOC Usage Mode

Alert-capable primary detection

Minimum Deployment Requirement

Requires:

·        Administrative Activity Log coverage

·        approved admin exception process

·        scope set to relevant subscription or management scope

Enforcement Method

Direct Activity Log matching on high-risk RBAC, policy, and access-control operations

Implementation Constraint Notes

·        Durable-access creation is not permitted in this rule

·        Data-plane actions are not permitted in this rule

·        Approved admin exceptions must be enforced downstream

Azure Activity Log Alert JSON

{
  "type": "Microsoft.Insights/activityLogAlerts",
  "apiVersion": "2020-10-01",
  "name": "cdx-az-priv-boundary-change",
  "location": "Global",
  "properties": {
    "enabled": true,
    "description": "Detect direct Azure privilege-boundary or access-control modification events.",
    "scopes": [
      "/subscriptions/<SUBSCRIPTION_ID>"
    ],
    "condition": {
      "allOf": [
        {
          "field": "category",
          "equals": "Administrative"
        },
        {
          "anyOf": [
            {
              "field": "operationName",
              "containsAny": [
                "Microsoft.Authorization/roleAssignments/write",
                "Microsoft.Authorization/roleDefinitions/write",
                "Microsoft.Authorization/denyAssignments/write",
                "Microsoft.Authorization/policyAssignments/write",
                "Microsoft.Authorization/policyDefinitions/write",
                "Microsoft.Authorization/policySetDefinitions/write",
                "Microsoft.Authorization/elevateAccess/Action"
              ]
            }
          ]
        },
        {
          "field": "status",
          "equals": "Succeeded"
        }
      ]
    },
    "actions": {
      "actionGroups": [
        {
          "actionGroupId": "/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RG>/providers/microsoft.insights/actionGroups/<ACTION_GROUP_NAME>"
        }
      ]
    }
  }
}

Target / Downstream Action Guidance

Downstream handling should:

·        suppress approved change windows and sanctioned admin workflows

·        enrich with caller, resourceGroup, resourceProvider, and resourceType

·        elevate severity when the caller is not part of a known privileged-admin set

Variant Analysis

Covered

·        direct RBAC, deny-assignment, policy, and elevate-access control-plane changes

Not Covered

·        indirect escalation through pre-existing privilege

·        identity-native entitlement changes visible only in Entra-focused audit sources

Logical Notes

Single-rule meaning: direct Azure privilege-boundary or access-control modification observed.
Correlated meaning: confirmed escalation into higher authority in Azure control plane.

Rule Execution Validity

Deployable as a primary escalation detector.

Rule Name

Azure High-Risk Control-Surface Change Signal

Mapped Stage

Stage 4 Privilege Escalation
Stage 5 Objective Execution

MITRE ATT&CK

T1098 – Account Manipulation

SOC Usage Mode

Supporting detection

Minimum Deployment Requirement

Requires:

·        Administrative Activity Log coverage

·        downstream approved-admin and approved-governance handling

·        well-chosen scope

Enforcement Method

Direct Activity Log matching on policy and diagnostics control-surface changes

Implementation Constraint Notes

·        This is a supporting signal, not a primary high-confidence detector

·        Use this to enrich investigations around policy rollback, diagnostics tampering, or broader control-surface manipulation

·        If noisy, split policy changes from diagnostics changes

Azure Activity Log Alert JSON

{
  "type": "Microsoft.Insights/activityLogAlerts",
  "apiVersion": "2020-10-01",
  "name": "cdx-az-control-surface-signal",
  "location": "Global",
  "properties": {
    "enabled": true,
    "description": "Detect high-impact Azure policy or diagnostics control-surface changes as supporting signals.",
    "scopes": [
      "/subscriptions/<SUBSCRIPTION_ID>"
    ],
    "condition": {
      "allOf": [
        {
          "field": "category",
          "equals": "Administrative"
        },
        {
          "anyOf": [
            {
              "field": "operationName",
              "containsAny": [
                "Microsoft.Authorization/policyAssignments/write",
                "Microsoft.Authorization/policyDefinitions/write",
                "Microsoft.Authorization/policySetDefinitions/write",
                "Microsoft.Insights/diagnosticSettings/write",
                "Microsoft.Insights/diagnosticSettings/delete"
              ]
            }
          ]
        },
        {
          "field": "status",
          "equals": "Succeeded"
        }
      ]
    },
    "actions": {
      "actionGroups": [
        {
          "actionGroupId": "/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RG>/providers/microsoft.insights/actionGroups/<ACTION_GROUP_NAME>"
        }
      ]
    }
  }
}

Target / Downstream Action Guidance

Downstream logic should:

·        suppress known approved governance and diagnostics workflows

·        annotate this alert as supporting-only unless tied to earlier suspicious identity or privilege events

Variant Analysis

Covered

·        policy assignment and definition changes

·        diagnostics-setting changes

Not Covered

·        identity-only events outside Activity Log

·        semantically risky but operationally normal governance changes

Logical Notes

Single-rule meaning: Azure policy or diagnostics control-surface change observed.
Correlated meaning: supporting signal for escalation or post-control activity.

Rule Execution Validity

Deployable as supporting detection only.

Rule Name
High-Risk Azure Control-Plane Action Following Privilege Transition

Mapped Stage

Stage 5 Objective Execution

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Correlation-first

Minimum Deployment Requirement

Requires:

·        Administrative Activity Log coverage

·        a stateful downstream target

·        actor continuity or a validated fallback join-key strategy

·        mature automation and backup exceptions

Enforcement Method

The Activity Log alert matches high-risk post-control management actions.
Downstream logic must correlate them to a prior Rule 1 privilege-transition event.

Implementation Constraint Notes

·        Standalone single-event alerting is not permitted

·        This rule is intentionally stateless at the Activity Log layer and must be correlated downstream

·        If one action family is noisy, split resource-write actions from diagnostics or logging actions

Azure Activity Log Alert JSON

{
  "type": "Microsoft.Insights/activityLogAlerts",
  "apiVersion": "2020-10-01",
  "name": "cdx-az-high-risk-post-control",
  "location": "Global",
  "properties": {
    "enabled": true,
    "description": "Detect high-risk Azure control-plane actions intended for downstream correlation after privilege transition.",
    "scopes": [
      "/subscriptions/<SUBSCRIPTION_ID>"
    ],
    "condition": {
      "allOf": [
        {
          "field": "category",
          "equals": "Administrative"
        },
        {
          "anyOf": [
            {
              "field": "operationName",
              "containsAny": [
                "Microsoft.Storage/storageAccounts/write",
                "Microsoft.Compute/snapshots/write",
                "Microsoft.Insights/diagnosticSettings/write",
                "Microsoft.Insights/diagnosticSettings/delete",
                "Microsoft.Security/securitySolutions/write"
              ]
            }
          ]
        },
        {
          "field": "status",
          "equals": "Succeeded"
        }
      ]
    },
    "actions": {
      "actionGroups": [
        {
          "actionGroupId": "/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RG>/providers/microsoft.insights/actionGroups/<ACTION_GROUP_NAME>"
        }
      ]
    }
  }
}

Target / Downstream Action Guidance

Downstream logic should:

·        correlate this event to a prior Rule 1 privilege-transition event by the same caller within a bounded window such as 30 minutes

·        define fallback join strategy if caller is inconsistent, such as service principal ID or application ID

·        split storage-heavy actions from diagnostics modifications if they behave differently in the tenant

Variant Analysis

Covered

·        storage-account changes

·        snapshot creation

·        diagnostics changes

·        selected security-control-related management actions

Not Covered

·        data-plane actions not represented in Activity Log

·        low-and-slow post-control activity outside the downstream correlation window

·        delegated or unattributed actions without stable actor continuity

Logical Notes

Single-rule meaning: high-risk Azure control-plane action observed.
Correlated meaning: objective execution or late-stage operational action after privilege transition.

Rule Execution Validity

Deployable only as correlation-first content.

Rule Name

Azure Administrative Signal Aggregator for Suspicious Caller Context

Mapped Stage

Stage 2 Valid Account Authentication
Stage 3 Account and Resource Discovery

MITRE ATT&CK

T1078 – Valid Accounts
T1087 – Account Discovery

SOC Usage Mode

Supporting detection or correlation-first

Minimum Deployment Requirement

Requires:

·        Activity Log visibility

·        downstream caller-context enrichment

·        approved automation exclusions

Enforcement Method

The Activity Log alert matches a narrow Azure administrative signal family.
Downstream logic must determine whether the caller or execution context is suspicious.

Implementation Constraint Notes

·        Activity Log Alert JSON does not natively implement first-seen caller logic, impossible travel, or identity-risk logic

·        Standalone paging is not permitted unless downstream caller-context enrichment is mature

·        This is intentionally a signal wrapper, not a primary self-contained detector

Azure Activity Log Alert JSON

{
  "type": "Microsoft.Insights/activityLogAlerts",
  "apiVersion": "2020-10-01",
  "name": "cdx-az-admin-signal-wrapper",
  "location": "Global",
  "properties": {
    "enabled": true,
    "description": "Detect Azure administrative signal family intended for downstream correlation with suspicious caller context.",
    "scopes": [
      "/subscriptions/<SUBSCRIPTION_ID>"
    ],
    "condition": {
      "allOf": [
        {
          "field": "category",
          "equals": "Administrative"
        },
        {
          "anyOf": [
            {
              "field": "operationName",
              "containsAny": [
                "Microsoft.Authorization/roleAssignments/write",
                "Microsoft.Authorization/policyAssignments/write",
                "Microsoft.Storage/storageAccounts/write",
                "Microsoft.Insights/diagnosticSettings/write"
              ]
            }
          ]
        },
        {
          "field": "status",
          "equals": "Succeeded"
        }
      ]
    },
    "actions": {
      "actionGroups": [
        {
          "actionGroupId": "/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RG>/providers/microsoft.insights/actionGroups/<ACTION_GROUP_NAME>"
        }
      ]
    }
  }
}

Target / Downstream Action Guidance

Downstream logic should:

·        enrich with caller, execution context, and known admin or automation exceptions

·        compare caller context against non-user or otherwise suspicious indicators

·        treat as a supporting signal linking suspicious caller context to Azure discovery or control activity

Variant Analysis

Covered

·        Azure administrative signal family for supporting suspicious-context detections

Not Covered

·        true first-seen caller logic

·        impossible-travel or device-anomaly logic

·        Entra-native session anomalies outside Activity Log visibility

Logical Notes

Single-rule meaning: Azure administrative activity observed.
Correlated meaning: suspicious authenticated use leading into Azure control activity.

Rule Execution Validity

Deployable as supporting or correlation-first content only.

GCP / Eventarc

Rule Name

GCP IAM Discovery Signal

Mapped Stage

Stage 3 Account and Resource Discovery

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery

SOC Usage Mode

Supporting detection

Minimum Deployment Requirement

·        Cloud Audit Logs enabled

·        downstream processor capable of actor grouping and short-window counting

·        allowlisting for governance, inventory, and approved admin tooling

Enforcement Method

Eventarc matches narrow IAM discovery events only. Burst enforcement must happen downstream.

Implementation Constraint Notes

·        Standalone alerting is not permitted

·        Single events should be treated as signal only

·        This rule should not be used as a complete burst detector by itself

Variant Analysis

Covered

·        IAM role enumeration

·        service account listing

·        IAM policy retrieval

Not Covered

·        broad service-specific discovery outside these methods

·        low-and-slow enumeration

·        data-plane discovery

Logical Notes

Single event = benign-capable discovery signal
Correlated pattern = discovery activity

Rule Execution Validity

Supporting only

System-Ready Code

# Primary trigger
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: iam.googleapis.com
  - attribute: methodName
    value: google.iam.admin.v1.ListRoles

# Additional variants
---
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: iam.googleapis.com
  - attribute: methodName
    value: google.iam.admin.v1.ListServiceAccounts

---
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: cloudresourcemanager.googleapis.com
  - attribute: methodName
    value: GetIamPolicy

Log Type Dependency

Admin Activity only.

Rule Name

GCP IAM Policy Modification

Mapped Stage

Stage 4 Privilege Escalation

MITRE ATT&CK

T1098 – Account Manipulation

SOC Usage Mode

Primary detection

Minimum Deployment Requirement

·        Cloud Audit Logs enabled

·        admin and automation allowlisting defined

·        resource hierarchy context available downstream

Enforcement Method

Direct match on privilege-boundary-changing IAM methods.

Implementation Constraint Notes

·        Persistence behavior is not permitted in this rule

·        Post-control or storage behavior is not permitted in this rule

·        Approved admin exceptions must be applied downstream

Variant Analysis

Covered

·        IAM policy changes

·        custom role creation

·        custom role update

Not Covered

·        indirect escalation through pre-existing privilege

·        adjacent identity-system privilege changes not emitted here

Logical Notes

Single event = privilege-boundary change
Correlated meaning = escalation

Rule Execution Validity

Primary alert-capable detection

System-Ready Code

# Primary trigger
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: cloudresourcemanager.googleapis.com
  - attribute: methodName
    value: SetIamPolicy

# Additional variants
---
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: iam.googleapis.com
  - attribute: methodName
    value: google.iam.admin.v1.CreateRole

---
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: iam.googleapis.com
  - attribute: methodName
    value: google.iam.admin.v1.UpdateRole

Log Type Dependency

Admin Activity only.

Rule Name

GCP Service Account Key Creation

Mapped Stage

Stage 5 Persistence

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Supporting detection

Minimum Deployment Requirement

·        Cloud Audit Logs enabled

·        provisioning workflows identified

·        tight suppressions for approved service-account lifecycle operations

Enforcement Method

Direct match on durable access artifact creation visible in audit logs.

Implementation Constraint Notes

·        Broad provisioning suppressions are not permitted

·        This is supporting detection because not every persistence path is equally visible here

·        Temporary-token abuse is out of scope for this rule

Variant Analysis

Covered

·        service account key creation

·        service account creation

Not Covered

·        temporary-token abuse

·        delegated access without durable artifact creation

·        external trust-based persistence

Logical Notes

Single event = credential or identity artifact creation
Correlated meaning = persistence

Rule Execution Validity

Supporting, high-confidence with tuning

System-Ready Code

# Primary trigger
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: iam.googleapis.com
  - attribute: methodName
    value: google.iam.admin.v1.CreateServiceAccountKey

# Additional variant
---
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: iam.googleapis.com
  - attribute: methodName
    value: google.iam.admin.v1.CreateServiceAccount

Log Type Dependency

Admin Activity only.

Rule Name

GCP High-Risk Post-Control Action

Mapped Stage

Stage 5 Objective Execution

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

SOC Usage Mode

Correlation-first

Minimum Deployment Requirement

·        Cloud Audit Logs enabled

·        stateful downstream processor

·        actor continuity or fallback join strategy

·        automation and backup exceptions

Enforcement Method

Eventarc matches high-risk post-control management actions. Downstream logic must correlate them to a prior Rule 2 event.

Implementation Constraint Notes

·        Standalone alerting is not permitted

·        Eventarc itself does not provide the needed state

·        If noisy, split storage-permission changes from logging-impact changes

Variant Analysis

Covered

·        snapshot creation

·        logging sink changes

·        storage bucket IAM policy changes

Not Covered

·        data-plane object activity

·        low-and-slow post-control activity outside correlation window

·        unattributed delegated actions

Logical Notes

Single event = high-risk action
Correlated meaning = objective execution

Rule Execution Validity

Correlation-only

System-Ready Code

# Primary trigger
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: compute.googleapis.com
  - attribute: methodName
    value: v1.compute.snapshots.insert

# Additional variants
---
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: logging.googleapis.com
  - attribute: methodName
    value: google.logging.v2.ConfigServiceV2.UpdateSink

---
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: storage.googleapis.com
  - attribute: methodName
    value: storage.buckets.setIamPolicy

Log Type Dependency

Admin Activity only in this canonical set. Data Access is intentionally excluded here.

Rule Name

GCP Administrative Signal Wrapper

Mapped Stage

Stage 2 Valid Account Authentication
Stage 3 Account and Resource Discovery

MITRE ATT&CK

T1078 – Valid Accounts
T1087 – Account Discovery

SOC Usage Mode

Supporting / correlation input

Minimum Deployment Requirement

·        Cloud Audit Logs enabled

·        downstream caller-context enrichment

·        admin and automation exception handling

Enforcement Method

Eventarc matches a narrow admin signal family. Downstream logic determines whether caller context is suspicious.
Implementation Constraint Notes

·        Standalone alerting is not permitted

·        This rule must not duplicate primary rule families

·        First-seen logic, baseline deviation, and identity-risk scoring are downstream-only

Variant Analysis

Covered

·        IAM read operations used as supporting admin-context signals

Not Covered

·        true identity anomalies

·        session risk analytics

·        device or impossible-travel context

Logical Notes

Single event = admin activity signal
Correlated meaning = suspicious authenticated usage

Rule Execution Validity

Supporting / correlation-only

System-Ready Code

# Primary trigger
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: iam.googleapis.com
  - attribute: methodName
    value: google.iam.admin.v1.ListRoles

# Additional variant
---
eventType: google.cloud.audit.log.v1.written
filters:
  - attribute: serviceName
    value: iam.googleapis.com
  - attribute: methodName
    value: google.iam.admin.v1.ListServiceAccounts

Log Type Dependency

Admin Activity only‍ ‍

S26 Threat-to-Rule Traceability Matrix

Behavior

IAM role, service account, and policy discovery through repeated control-plane read activity

MITRE ATT&CK

T1087 – Account Discovery
T1069 – Permission Groups Discovery

Mapped Rule(s)

·        Rule 1 — GCP IAM Discovery Signal

·        Rule 5 — GCP Administrative Signal Wrapper

Telemetry Source

Cloud Audit Logs — Admin Activity

Coverage Disposition

Hunt Only

Detection Limitation

·        Single events are benign-capable

·        Detection requires downstream aggregation and thresholding

Behavior

Privilege boundary change through IAM policy modification or custom-role manipulation

MITRE ATT&CK

T1098 – Account Manipulation

Mapped Rule(s)

·        Rule 2 — GCP IAM Policy Modification

Telemetry Source

Cloud Audit Logs — Admin Activity

Coverage Disposition

Detected

Detection Limitation

·        Abuse of existing privileges does not generate new IAM change events

Behavior

Creation of durable access through service account or service account key creation

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

Mapped Rule(s)

·        Rule 3 — GCP Service Account Key Creation

Telemetry Source

Cloud Audit Logs — Admin Activity

Coverage Disposition

Detected

Detection Limitation

·        Token-based or federated persistence may not generate equivalent artifacts

Behavior

High-risk post-escalation action through snapshot creation, logging modification, or storage permission change

MITRE ATT&CK

T1078 – Valid Accounts
T1098 – Account Manipulation

Mapped Rule(s)

·        Rule 4 — GCP High-Risk Post-Control Action

Telemetry Source

Cloud Audit Logs — Admin Activity

Coverage Disposition

Partially Detected

Detection Limitation

·        Requires correlation with prior escalation events

Behavior

Suspicious administrative activity from a caller context inconsistent with operational expectations

MITRE ATT&CK

T1078 – Valid Accounts

Mapped Rule(s)

·        Rule 5 — GCP Administrative Signal Wrapper

Telemetry Source

Cloud Audit Logs — Admin Activity

Coverage Disposition

Hunt Only

Detection Limitation

·        Requires downstream identity enrichment and context analysis

S27 Behavior & Log Artifacts

Behavioral Profile

·        Control-plane activity driven through legitimate cloud APIs

·        IAM and policy discovery preceding privilege changes

·        Transition from read operations to write operations

·        Creation of service account credentials for persistence

·        Administrative actions following escalation affecting critical resources

Primary Log Artifacts

·        iam.googleapis.com — ListRoles

·        iam.googleapis.com — ListServiceAccounts

·        cloudresourcemanager.googleapis.com — SetIamPolicy

·        iam.googleapis.com — CreateServiceAccountKey

·        compute.googleapis.com — snapshots.insert

·        logging.googleapis.com — UpdateSink

Behavior-to-Artifact Logic

·        Discovery manifests as repeated IAM read operations

·        Escalation manifests as IAM policy modification

·        Persistence manifests as credential creation

·        Objective activity manifests as high-risk administrative actions

Telemetry Pillar Mapping

Cloud Control-Plane Telemetry

·        Cloud Audit Logs — Admin Activity

Identity Context

·        Principal identity

·        User versus service account

Operational Context

·        Project, folder, or organization scope

S27A Infrastructure Intelligence

Infrastructure Characteristics

·        Single principal performing multiple IAM and administrative actions

·        Transition from read-heavy to write-heavy API usage

·        Execution through service accounts or delegated identities

Operational Pattern

·        Discovery followed by escalation

·        Escalation followed by persistence or administrative action

·        Repeated use of the same identity across multiple resources

·        Activity spanning multiple scopes

Infrastructure Insight

·        Cloud control-plane APIs function as the attacker’s operational infrastructure

·        Identity reuse is a primary indicator of activity chaining

·        Traditional external infrastructure indicators are less relevant


S28 Detection Strategy and SOC Implementation Guidance

Detection Strategy

·        Use Eventarc as a signal-generation layer

·        Apply correlation and aggregation in downstream systems

·        Prioritize escalation and persistence signals

SOC Implementation Model

Signal Intake

·        Ingest Eventarc-triggered events

·        Normalize identity and resource context

Correlation Layer

·        Correlate escalation to post-control actions

·        Apply thresholds to discovery behavior

Decision Layer

·        Suppress approved workflows

·        Escalate abnormal or unauthorized activity

Decision Conditions

·        Escalate on unauthorized IAM policy modification

·        Escalate on unauthorized service account key creation

·        Escalate critically when escalation is followed by high-risk action

·        Do not alert on isolated discovery events

SOC Usage Mapping

·        Rule 2 — Primary detection

·        Rule 3 — High-confidence supporting detection

·        Rule 4 — Correlation-only

·        Rule 1 and Rule 5 — Supporting signals

S29 Detection Coverage Matrix (Strategic Layer)

Coverage Mapping

IAM discovery

·        Coverage Disposition: Hunt Only

·        Detection Strength: Low

·        Strategic Value: Early-stage signal requiring aggregation

Privilege escalation

·        Coverage Disposition: Detected

·        Detection Strength: High

·        Strategic Value: Strong control-plane indicator

Persistence through service account key creation

·        Coverage Disposition: Detected

·        Detection Strength: High

·        Strategic Value: Durable access indicator

High-risk post-control actions

·        Coverage Disposition: Partially Detected

·        Detection Strength: Medium

·        Strategic Value: Correlation-dependent signal

Suspicious administrative context

·        Coverage Disposition: Hunt Only

·        Detection Strength: Low

·        Strategic Value: Contextual enrichment signal

Strategic Assessment

·        Strong coverage of escalation and persistence

·        Moderate coverage of post-escalation activity

·        Limited coverage of early discovery behavior

Coverage Gaps

·        Identity-session anomalies

·        Low-and-slow discovery patterns

·        Cross-project lateral movement

·        Non-key persistence mechanisms

S30 Detection Validation

Validation Approach

·        Validate against known administrative workflows

·        Simulate escalation, persistence, and post-control activity

·        Verify suppression and correlation logic

Validation Criteria

·        Rules trigger on expected malicious behavior

·        Rules do not generate excessive false positives

·        Correlation produces actionable alerts

Validation Outcome

·        Escalation detection is reliable

·        Persistence detection is reliable with tuning

·        Post-control detection requires correlation

·        Discovery and context signals require enrichment

Validation Limitations

·        Eventarc provides no native stateful logic

·        Detection depends on downstream correlation

·        Identity context requires additional telemetry

Final Validation Statement

·        Detection model is effective for control-plane threats

·        Full effectiveness depends on a properly implemented correlation layer

S31 — Telemetry Dependencies

Purpose

Define the required telemetry and context necessary to support detection and correlation of control-plane abuse across the attack lifecycle.

Dependencies

Cloud Audit Logs — Admin Activity

·        Required for IAM policy changes, service account activity, and high-risk administrative actions

·        Must be enabled across project, folder, and organization scope

Eventarc Trigger Layer

·        Required for ingestion of audit-log events using serviceName and methodName

·        Misconfiguration results in loss of detection signals

Principal Identity Context

·        Required to track actor continuity across discovery, escalation, and execution

·        Must distinguish user identities, service accounts, and delegated identities

Downstream Correlation Engine

·        Required for aggregation of discovery activity

·        Required to correlate escalation to post-control actions

·        Required for suppression of approved workflows

Allowlisting and Administrative Context

·        Required to differentiate approved administrative actions from unauthorized activity

·        Includes admin roles, automation identities, and change windows

S32 — Detection Limitations

Purpose

Define detection gaps and adversarial conditions that reduce detection effectiveness.

Identified Gaps

Pre-existing privilege abuse

·        Attackers using existing elevated access do not trigger IAM change events

Identity-layer visibility limitations

·        No native visibility into login anomalies, token theft, or session hijacking

Low-and-slow discovery

·        Distributed or delayed discovery avoids aggregation thresholds

Persistence without key creation

·        Workload identity, federation, or delegated access may bypass key-based detection

Distributed execution

·        Activity spread across multiple identities reduces correlation effectiveness

Logging manipulation risk

·        Early modification of logging configuration may degrade visibility

Impact

·        Detection effectiveness depends on centralized and consistent attacker behavior

·        Distributed or delayed activity reduces detection reliability

·        Identity-layer attacks remain partially unobserved

S33 — Defensive Control & Hardening Improvements

Purpose

Define control improvements directly aligned to detection gaps and attacker bypass paths.

Strategic Improvements

Restrict IAM policy modification permissions

·        Limit SetIamPolicy capability to controlled roles

·        Enforce approval workflows for privilege changes

Reduce service account key exposure

·        Disable unnecessary key creation

·        Replace long-lived keys with short-lived identity mechanisms

Enforce identity isolation

·        Reduce reuse of service accounts across systems

·        Limit identity reuse across attack stages

Protect logging configuration

·        Monitor and restrict logging sink modifications

·        Preserve telemetry integrity

Strengthen correlation capability

·        Implement actor-based aggregation

·        Enforce escalation-to-action correlation

Control Impact Mapping

·        IAM restriction reduces escalation risk

·        Service account hardening reduces persistence risk

·        Identity isolation reduces attack chaining capability

·        Logging protection preserves detection visibility

·        Correlation improves multi-stage detection accuracy

S34 — Defensive Control & Hardening Architecture


Purpose

Define the defensive architecture and its alignment to attack phases.

Defensive Architecture Layers
Signal Layer

·        Eventarc ingestion of Cloud Audit Logs

·        Supports rule-based signal generation

Correlation Layer

·        Aggregates discovery activity

·        Correlates escalation to post-control actions

Decision Layer

·        Produces alerts based on unauthorized escalation and persistence

·        Applies suppression and prioritization

Governance Layer

·        Enforces IAM control and identity management

·        Maintains allowlisting and policy enforcement

Architecture Alignment to Attack Phases

Discovery

·        Detected through aggregated IAM activity

Escalation

·        Detected through IAM policy modification

Persistence

·        Detected through service account and key creation

Objective Execution

·        Detected through correlated administrative actions

Architecture Objectives

·        Detect privilege escalation immediately

·        Detect persistence through credential creation

·        Correlate multi-stage attack behavior

·        Maintain low false positives through contextual suppression

S35 — Defensive Control Mapping Matrix

Purpose

Map defensive controls to each attack phase and assess effectiveness.

Control Mapping by Phase

Phase 1A — Credential Lure Delivery

·        Not observed in currently available reporting; may occur during post-exploitation depending on attacker objectives and target environment

Phase 1B — Credential and Session Artifact Access

·        Limited visibility in control-plane telemetry

·        Requires identity-provider integration

Phase 2 — Discovery

·        Control: IAM activity monitoring and aggregation

·        Effectiveness: Low without correlation

Phase 3 — Privilege Escalation

·        Control: IAM policy change detection

·        Effectiveness: High

Phase 4 — Persistence

·        Control: Service account and key monitoring

·        Effectiveness: High with suppression

Phase 5 — Objective Execution

·        Control: Correlated administrative action detection

·        Effectiveness: Medium

Control Effectiveness

·        Strong for escalation and persistence detection

·        Moderate for post-escalation activity

·        Weak for identity-layer and early discovery behavior

S36 — CyberDax Intelligence Maturity Assessment

Purpose

Assess detection, telemetry, and response maturity for this threat model.

Maturity Assessment

Detection Maturity

·        Moderate

·        Strong for escalation and persistence events

·        Dependent on correlation for full coverage

Telemetry Maturity

·        Moderate to High

·        Strong control-plane visibility

·        Limited identity-layer visibility

Response Maturity

·        Moderate

·        Requires structured triage and correlation workflows

Control Effectiveness Score

·        Moderate

Audit Evidence Statement

·        Detection capability validated against control-plane activity

·        Known bypass paths identified in detection limitations

·        Detection effectiveness depends on correlation implementation

Security Program Integration Note

·        Detection must integrate with centralized SOC workflows

·        Correlation and enrichment are required for full effectiveness

·        IAM governance must align with detection and response

S37 — Strategic Defensive Improvements

Purpose

Define prioritized actions to improve security posture and detection capability.

Recommendations

·        Restrict IAM policy modification to approved roles

·        Monitor all service account key creation

·        Implement correlation for multi-stage detection

·        Protect logging configuration from unauthorized changes

·        Reduce identity reuse across environments

Implementation Priorities

Immediate
Alert on unauthorized IAM policy changes
Alert on service account key creation

Near-Term
Implement correlation between escalation and post-control actions
Apply aggregation to discovery activity

Long-Term
Adopt identity-centric security model
Replace long-lived credentials with short-lived mechanisms
Strengthen cross-scope governance

S38 — Attack Economics & Organizational Impact Model

Purpose

Model adversary operational investment, execution efficiency, and return on investment to determine exploitation attractiveness and recurrence likelihood.

Adversary Operational Investment

·        Low infrastructure cost due to reliance on native GCP control-plane APIs rather than external command-and-control infrastructure

·        Minimal tooling requirements; activity executed through authenticated API calls

·        Operational dependency centered on identity access acquisition rather than malware development

·        High scalability through reuse of compromised identities

Credential Harvesting Operations

·        Acquisition of valid authentication material through phishing, token capture, or credential reuse

·        Low operational cost relative to success rate in cloud-enabled environments

·        High success probability due to credential reuse and exposure patterns

Credential Store and Session Artifact Access

·        Immediate access when valid credentials or session artifacts are obtained

·        Eliminates need for initial privilege escalation when sufficient permissions exist

·        Reduces time-to-impact and operational complexity

Authentication Material Staging and Reuse Preparation

·        Service account key creation enables durable credential staging

·        Credentials reusable across sessions, systems, and time periods

·        Persistence cost negligible once credentials are established

Credential Reuse Against Enterprise Services

·        Reuse of credentials enables access across multiple services and projects

·        Supports lateral movement without additional exploitation effort

·        Enables repeated operational use without re-compromise

Adversary Return on Investment

·        High return due to elimination of infrastructure cost and low execution complexity

·        Durable access increases long-term value of compromise

·        Minimal reinvestment required after initial compromise

Return on Investment Assessment

·        High ROI driven by low operational cost and high scalability

·        Attack model economically sustainable and repeatable

·        Detection gaps increase probability of successful execution

Economic Alignment to S6

·        Low attacker cost combined with moderate-to-high enterprise impact creates asymmetric risk

·        Detection limitations increase likelihood of prolonged unauthorized access

·        Control gaps increase total impact cost through extended exposure duration

S39 — Economic Impact & Organizational Exposure

Incident Response and Remediation Costs

·        Investigation of IAM policy changes and control-plane activity

·        Revocation and rotation of compromised credentials and service account keys

·        Revalidation of IAM policies across project, folder, and organization scope

·        Comprehensive audit of identity permissions and access paths

Operational Disruption

·        Temporary loss of access during credential revocation and policy correction

·        Service disruption where access dependencies are impacted

·        Increased operational load on security and cloud operations teams

Security Exposure

·        Unauthorized access to cloud resources and administrative control surfaces

·        Potential data exposure, modification, or destruction depending on attacker objectives

·        Persistent access extending exposure duration through credential reuse

Alignment with Executive Cost Model

·        Aligns with identity compromise, privilege escalation, and persistence cost drivers

·        Impact increases with duration of undetected access and scope of compromised permissions

·        Extended access amplifies operational and remediation costs

Annualized Risk Exposure

·        Elevated due to repeatable and scalable attack model

·        Increased by dependence on correlation for effective detection

·        Amplified in environments with weak IAM governance and high service account usage

Estimated Probability of Recurrence

·        Moderate to High

·        Driven by low attacker cost, high scalability, and persistence capability

·        Increased in environments lacking mature detection correlation and identity governance

S40 — References

Security Vendor Analysis

Google Cloud — Security Best Practices for IAM

·        hxxps://cloud[.]google[.]com/iam/docs/using-iam-securely

Google Cloud — Cloud Audit Logs Documentation

·        hxxps://cloud[.]google[.]com/logging/docs/audit

Google Cloud — Service Account Security Guidance

·        hxxps://cloud[.]google[.]com/iam/docs/best-practices-service-accounts

Mandiant — Cloud Threat Landscape and Identity-Based Attacks

·        hxxps://www[.]mandiant[.]com/resources

Analytical Framework

MITRE ATT&CK Framework

·        hxxps://attack[.]mitre[.]org

Next
Next

[CVE] CVE-2026-5281 Pre-Authentication RCE Enabling Unauthenticated Initial Access via Network Input Handling Flaw