It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Simulating Cloud Security Threats - PIM user granted administrator role in Azure

  • Last updated on

This use case allows for the ability to detect an administrator role being added to a PIM user. Threat actors might give an account they’ve compromised increased permissions as a means of persistence, just in case they get kicked out of the account they are currently using.

Test Workflow

Workflow.png

How to Test

  1. Log into Azure using an administrator account.

  2. In the search bar, search for the Users.

  3. Click on the Users service.

  4. Click the name of the user to modify.

  5. On the left side of the screen, under the Manage tab, click Assigned roles.

  6. Click Add Assignments.

  7. Search for the administrator role you want to add, for example, Global Administrator.

  8. Set the conditions for the role assignment.

  9. Click Assign.