cd

5 min read

2025-01-03: Azure Activity - Public Access Enabled on Storage Account

Azure Activity: Public Access Enabled on Storage Account

Description

This query uses the AzureActivity table to detect when a request is made to enable public access to a storage account. While this should not be a problem in 2025, and you should have Azure Policy in place to prevent this. It is still possible for an exception to be made and the policy bypassed.

Query

AzureActivity
| where OperationNameValue == "MICROSOFT.STORAGE/STORAGEACCOUNTS/WRITE"
| extend parse_Properties = parse_json(Properties)
| extend parse_requestBody = parse_json(tostring(parse_Properties.requestbody))
| where parse_requestBody contains "allowBlobPublicAccess"
| extend PublicAccess = tostring(parse_requestBody.properties.allowBlobPublicAccess)
| where PublicAccess == "true"
| project TimeGenerated, CorrelationId, Caller, CallerIpAddress, SubscriptionId, ResourceGroup, _ResourceId

MITRE ATT&CK

IDTechniqueTactic
T1562.007Impair Defenses: Disable or Modify Cloud FirewallDefense Evasion
T1530Data from Cloud StorageCollection

Analytic Rule

Notes

This analytic rule detects when a request is made to enable public access on a storage account. While Azure Policy should be in place to control this setting, an administrator with appropriate permissions or an exclusion on a resource group or subscription could lead to an unwanted misconfiguration. This rule can help catch a misconfiguration before it becomes an incident.