cd

5 min read

Azure Key Vault - Large Number of Keys, Secrets, Certs Deleted

Description

This query detects when a large number of Keys, Secrets, or Certificates are deleted from Azure Key Vault in a short period of time. Use the Threshold value to define an alert value.

Query

let Threshold = 5;
let DeleteOperations = dynamic(["SecretDelete", "KeyDelete", "CertificateDelete"]);
AzureDiagnostics
| where ResourceType == "VAULTS" and OperationName in (DeleteOperations)
| where ResultType == "Success"
| extend Caller = coalesce(identity_claim_unique_name_s, "UnknownCaller")
| summarize EventCount = count(), StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), IPAddressSet = make_set(CallerIPAddress) 
    by Caller, bin(TimeGenerated, 1h)
| where EventCount > Threshold
| project StartTime, EndTime, Caller, EventCount, IPAddressSet

MITRE ATT&CK

IDTechniqueTactic
T1555.006Credentials from Password Stores: Cloud Secrets Managemetn StoresCredential Access
T1485Data DestructionImpact

Analytic Rule

Notes

This query can be beneficial in hunting for unusual or potentially malicious activity, such as mass deletions of secrets, keys, or certificates, which could indicate insider threats, compromised accounts, or automation errors impacting critical services.