☁️
CTHFM: Azure
  • Welcome
  • Getting Started
    • Account Setup
      • Account Creation Instructions
  • Azure Fundamentals
    • Azure Fundamentals Overview
      • Azure Documentation
      • Azure Entra
      • Azure Hierarchy
      • Identities
      • Azure Entra Roles
      • Azure RBAC
      • Azure Licensing Overview
        • Azure Entra ID Premium Licenses Comparison
      • Azure Shared Responsibility Model
      • Azure Frameworks
      • Azure Security Services
      • Conditional Access Policies
        • How Conditional Access Policies Work
        • Benefits of Conditional Access
        • Best Practices for Conditional Access
        • Conditions for Conditional Access
        • Conditional Access Controls
        • Sign-In Risk and Identity Protection
        • Conditional Access Session Control
        • Name Locations IP Location
      • Azure Quotas
      • Azure Tokens
        • Access Tokens
        • ID Tokens
        • Refresh Tokens
          • Invalidate Refresh Tokens
        • Primary Refresh Tokens
        • Continuous Access Evaluation (CAE)
        • Token Protection: Conditional Access (Public Preview)
  • Azure CLI
    • Introduction to Azure CLI
    • Installing Azure CLI
    • CLI Commands
    • Resource Group Management
    • Creating and Managing Resources with Azure CLI
    • Managing IAM
    • Azure CLI Automation
    • Monitoring and Troubleshooting in Azure CLI
    • Azure CLI Overview
      • Azure CLI: Linux
      • Azure CLI: Windows
      • Azure CLI: MacOS
  • KQL
    • KQL Overview
      • KQL Introduction
      • Data Types
      • Quick Reference
      • Render
      • Basic Queries
  • Powershell
    • PowerShell for Azure
      • Powershell Documentation
      • Powershell Basics
      • Understanding Powershell Variables
      • Understanding Cmdlets
      • Powershell Console & ISE
      • Powershell: Entra Module
        • Module Reference & Getting Started
      • Powershell: Azure Module
        • Installation Instructions
        • Powershell Azure CLI: Windows
        • Powershell Azure CLI: Linux
        • Powershell Azure CLI: MacOS
        • Example Azure Cmdlets
  • Bicep
    • Bicep File Structure
    • Variable Types
  • Azure Logging References
    • Logging
      • Log Retention Strategies
      • Azure Log Types
      • Azure Activity Logs
        • Administrative Event Schema
        • Service Health Notification Schema
        • Resource Health
        • Alert Category
        • Autoscale
        • Security
        • Recommendation
        • Policy
      • Entra ID Logging
        • Identity Based Logs
          • Audit Logs
          • Sign-In Logs
            • AADNonInteractiveUserSignInLogs
            • AADManagedIdentitySignInLogs
            • AADServicePrincipalSignInLogs
            • First Party Sign-In Activity
          • Provisioning Logs (AADProvisioningLogs)
          • Microsoft Graph Activity
          • Identity Protection
            • Risk Detections
            • AADRiskyServicePrincipals
            • AADRiskyUsers
            • AADUserRiskEvents
            • AADServicePrincipalRiskEvents
        • Additional Entra ID Logs
      • Azure Key Vault
        • Azure Key Vault Logging Overview
      • Network Watcher
        • RBAC Permissions
        • Flow Log Types
          • NSG Flow Log Schema
          • VNET Flow Log Schema
        • Enabling Logs
          • NSG Flow Logs
          • VNET Flow Logs
        • Packet Capture
          • Packet Capture: VM
          • Packet Capture: Scale Sets
      • Compute Resources
        • Azure Monitor Agent
        • VM Insights
          • VM Insights Tables
      • Storage Accounts
        • Storage Account Logging
          • File
            • Enable StorageFileLogs
            • StorageFileLogs
          • Blob
            • Enable Blob Logging
            • StorageBlobLogs
          • Queue
            • Enable Queue Logging
            • StorageQueueLogs Table
          • Table
            • Enable Table Logging
            • StorageTableLogs Table
      • Azure App Service
        • Log Types
        • Enabling Logging
      • Azure Monitor
        • Resource Logs
          • Resource Log Top Level Documentation
        • Log Analytics Workspace
          • Setup
        • Workbooks
        • Dashboards
        • Alerts
        • Azure Monitor Documentation
      • Defender for Cloud
      • Intune
      • Sysmon
      • Purview Audit Log Schema
      • Kubernetes Audit Log (AKS)
  • Threat Hunting
    • Threat Hunting in Azure
      • Threat Hunting Introduction
      • Threat Hunting Process
        • Hypothesis Generation
        • Investigation
        • Identification
        • Resolution & Follow Up
      • Pyramid of Pain
      • Azure Threat Hunting Ideas
      • Hands On Threat Hunting Examples
      • OSINT Feeds
  • Sigma
    • Sigma Rule Structure
  • Microsoft Defender TI
    • Microsoft Defender Threat Intelligence
      • Data Sets
      • Reputational Scoring
      • Analyst Insights
      • Microsoft Defender TI: Copilot Integration
  • MITRE Att&ck
    • MITRE Att&ck
      • MITRE Att&ck Concepts
      • MITRE Data Sources
      • MITRE Att&ck Mitigations
      • MITRE Att&ck: Azure
        • MITRE Att&CK: Azure Security Control Mapping
  • Microsoft Resources
    • Microsoft Incident Response Ninja Hub
    • Microsoft Defender XDR Ninja Hub
  • Azure Threat Research Matrix (ATRM)
  • Security Research & Resources
    • Azure Goat
    • Azure Security Research
      • Azure Related CVEs
  • Defender XDR
    • Defender XDR Overview
    • Defender XDR Licensing
    • Defender XDR Default Retention
    • Defender XDR Advanced Hunting Table Schemas
    • Automated Response Requirements
    • Supported Response Actions
  • Azure Sentinel
    • Sentinel Overview
    • Azure Sentinel Deployments
    • Supported Data
    • Workbook, Playbook, Notebook Comparison
    • Sentinel Workbooks
    • Entities
    • User and Entity Behavior Analytics
    • Anomaly Detection
    • Mult-Stage Attack Detection
    • Sentinel: Az CLI
  • Microsoft Defender
    • Microsoft Defender for Cloud References
    • Defender for Cloud: Az CLI
  • Azure Policy
    • Azure Policy
    • Azure Policy Components
    • Azure Policy Rules
    • Scope Azure Policy
    • Policy Assignments
    • Policy Effect
    • Initiative Definition
    • Policy Parameters
    • Remediation Task Structure
    • Use Cases for Azure Policy
    • Azure Policy: Az CLI
  • Intune
    • Intune Overview
    • Intune Licensing
    • Intune API Permission Scopes
    • Intune Sample Script Resources
  • Intune Logging
    • Configure Logging
    • Logging Schema References
    • Intune Queries and Resources
  • Windows Host Security
    • Windows System Architecture and OS Fundamentals
    • SysInternals
    • Basic vs Advanced Security Auditing
    • Sysmon
  • Adversary Emulation
    • AzureHound
    • AADInternals
      • Install
    • RoadTools
      • Install
    • Oh365UserFinder
    • GraphRunner
  • Incident Response
    • Incident Response
      • Azure IR Program Development Cheat Sheet
      • Azure IR Playbooks (MS Guidance)
      • Ransomware (MS Guidance)
  • Automation
    • Automation Overview
    • Logic Apps
      • How Logic Apps Work
      • Logic App Types
      • Triggers
      • Connectors
      • Conditional Logic and Control Flow
      • APIs in Logic Apps
      • Handling Large Workflows with Stateful Logic Apps
      • External Service Integration
      • Securing, Managing, and Scaling Azure Logic Apps
      • Logic Apps: Az CLI
  • Packet Analysis
    • Wireshark Cheatsheet
    • TShark Cheatsheet
    • TCPDUMP Cheatsheet
    • Protocol Analysis Basics
    • HTTP Response Code Cheatsheet
    • RFC Protocol Mappings
    • PCAP Acquisition
  • Detection Lab
    • Detection Lab Introduction
    • Account Creation Instructions
    • Enable MFA Within Azure Tenant
    • Create an Azure Admin With Cloud Shell
    • Setup and Install Instructions
  • VSCode and Code Setup
  • Deploying Code
  • Enabling Logs for Log Analytics Workspace
  • Logging Into Windows VM
  • Verifying Logs in Log Analytics Workspace
  • Creating Detections: Azure Monitor
  • Cost Management: Billing Alarms
Powered by GitBook
On this page
  • Azure Threat Research Matrix (ATRM)
  • What is the Azure Threat Research Matrix (ATRM)?
  • Why the ATRM is Important
  • Resource Matrix Github.io
  • Resource Matrix Github Reference

Azure Threat Research Matrix (ATRM)

Azure Threat Research Matrix (ATRM)

In previous sections, we discussed the MITRE ATT&CK framework. While MITRE Att&ck provides a holistic view of TTPS it does not specifically provide the relevant detection information such as API calls, specific log sources, detection queries, and options to deploy alerts within your Azure Tenant.

To address this gap, Microsoft, in collaboration with top Azure security researchers, has developed the Azure Threat Research Matrix (ATRM). This knowledge base is specifically designed to document and organize TTPs relevant to Azure and Azure AD (Entra ID), providing a valuable resource for both offensive and defensive security professionals.

What is the Azure Threat Research Matrix (ATRM)?

The ATRM is essentially a structured guide that details the various ways adversaries might attempt to compromise Azure resources or Entra ID. It serves two key purposes:

  1. Visualization of Azure-Specific TTPs: The ATRM offers a clear and organized framework that allows you to see how different attack techniques are related to broader tactics, giving you a comprehensive view of potential threats within Azure and Azure AD.

  2. Education on Configuration Risks: The matrix also educates users about the risks associated with misconfigurations in Azure and Azure AD. By understanding these risks, you can take proactive measures to secure your environment according to best practices.

Why the ATRM is Important

While the MITRE ATT&CK framework is a powerful tool for understanding cyber threats, it doesn’t specifically address the nuances of Azure and Entra ID. The ATRM fills this gap by focusing exclusively on these environments. This focus is crucial because Entra ID, in particular, is deeply integrated with other Microsoft products, such as Microsoft 365, which introduces unique challenges and opportunities for both attackers and defenders.

For example, the ATRM includes techniques like AZT303 - Managed Device Scripting, which explains how attackers might exploit Microsoft Intune (integrated with Azure AD) to execute scripts on devices. This level of detail is essential for security teams working in Azure environments because it provides actionable insights that are directly relevant to their specific context.

How to Use the ATRM

The ATRM is organized in a way that makes it easy to navigate and find the information you need:

  • Tactics: The matrix starts with broad categories called tactics, which represent the high-level goals an adversary might have, such as gaining access to sensitive data or maintaining persistence in your environment.

  • Techniques and Sub-Techniques: Under each tactic, you’ll find specific techniques and sub-techniques that describe how an adversary might achieve those goals. Each technique has a unique identifier and a brief description, making it easy to understand and reference.

  • Detailed Technique Pages: When you click on a technique, you’ll be taken to a page that provides more detailed information, including:

    • Affected Resources: Which Azure resources are impacted by this technique.

    • Required Actions: What steps an adversary would need to take to exploit this technique.

    • Command Examples: Examples of commands that could be used to carry out the technique, along with suggestions for how to detect and prevent it.

    • Additional Resources: Links to further reading or tools that can help you deepen your understanding or apply the information in practice.

This structure ensures that you can quickly find relevant information and use it to improve your security posture in Azure.

Practical Application of the ATRM

The ATRM is not just a theoretical framework—it’s designed to be highly practical. By using the matrix, you can:

  • Map Out Potential Threats: Use the ATRM to identify potential threats specific to your Azure environment and map them against your current defenses.

  • Develop Detection Strategies: Leverage the command examples and detection suggestions provided in the matrix to build effective monitoring and alerting mechanisms.

  • Educate Your Team: Share the ATRM with your team to ensure that everyone has a clear understanding of the unique threats facing your Azure environment and how to defend against them.

Resource Matrix Github.io

Resource Matrix Github Reference

Last updated 9 months ago

Azure Threat Research Matrix
GitHub - microsoft/Azure-Threat-Research-MatrixGitHub
Logo
Logo