Defensive Strategies: TA0007

Defensive Strategies for TA0007 - Discovery

The Discovery (TA0007) tactic involves attackers gathering critical information about accounts, resources, and configurations to plan subsequent moves. Defending against these activities in Entra ID environments requires monitoring, restricting permissions, and hardening configurations to limit exposure.

1. Account Discovery

Mitigates: T1087 - Account Discovery Action: Prevent attackers from enumerating Entra ID accounts to identify potential targets. Azure Procedure:

  • Use Role-Based Access Control (RBAC) to restrict directory enumeration to least privilege.

  • Enable audit logging and set alerts for user enumeration attempts in Entra ID audit logs.

  • Apply Conditional Access Policies to enforce MFA and restrict access to sensitive APIs.

2. Cloud Account Enumeration

Mitigates: T1087.004 - Cloud Account Action: Prevent attackers from locating valuable or privileged accounts in Entra ID. Azure Procedure:

  • Monitor for suspicious commands such as Get-AzADUser.

  • Restrict API and CLI permissions to authorized users only.

  • Enable Azure Security Defaults to enforce MFA for all users automatically.

3. Cloud Service Dashboard Access

Mitigates: T1087 - Cloud Service Dashboard Action: Block unauthorized access to the Azure Portal and prevent attackers from exploring services and configurations. Azure Procedure:

  • Enforce RBAC to limit portal access to essential personnel.

  • Require the use of privileged access workstations (PAWs) for administrative tasks.

  • Conduct regular access reviews to identify and remove unnecessary access.

4. Cloud Service Discovery

Mitigates: T1526 - Cloud Service Discovery Action: Prevent attackers from using CLI, APIs, or dashboards to list cloud services and resources. Azure Procedure:

  • Disable unused Azure services to reduce the attack surface.

  • Monitor and set alerts for commands like:

    az resource list --output table
  • Implement service principal restrictions and enforce least privilege for API calls.

5. Password Policy Discovery

Mitigates: T1201 - Password Policy Discovery Action: Prevent attackers from querying Entra ID password policies to inform brute-force or credential stuffing attacks. Azure Procedure:

  • Enable strong password policies using banned password lists.

  • Monitor changes to password policies via Entra audit logs and set alerts.

  • Use Smart Lockout to block brute-force attempts based on behavior analysis.

6. Permission Groups Discovery

Mitigates: T1069 - Permission Groups Discovery Action: Block unauthorized enumeration of groups to identify privileged or misconfigured group memberships. Azure Procedure:

  • Restrict group enumeration permissions to necessary roles only.

  • Implement Privileged Identity Management (PIM) for critical groups, such as Global Administrators.

  • Monitor group changes using Azure Monitor or Microsoft Sentinel.

7. Cloud Groups Enumeration

Mitigates: T1069.003 - Cloud Groups Action: Prevent attackers from enumerating Entra ID cloud groups to locate administrative or sensitive access roles. Azure Procedure:

  • Monitor and restrict the use of commands such as:

    az ad group list --output table
    az ad group member list --output table
  • Conduct regular access reviews of sensitive groups to detect unauthorized access.

  • Enforce just-in-time (JIT) access for administrative groups using PIM.

Summary of Defensive Procedures for TA0007

Defensive Strategy

Mitigates

Azure Procedure

Monitor and Restrict Account Discovery

T1087 - Account Discovery

- Use RBAC to restrict directory enumeration to least privilege. - Enable audit logging and alerts for user enumeration. - Apply Conditional Access Policies to enforce MFA and restrict access to sensitive APIs.

Monitor Cloud Account Enumeration

T1087.004 - Cloud Account

- Monitor for suspicious commands like Get-AzADUser. - Restrict API and CLI permissions to authorized users. - Enable Azure Security Defaults to enforce MFA for all users automatically.

Restrict Cloud Service Dashboard Access

T1087 - Cloud Service Dashboard

- Enforce RBAC to limit portal access. - Require the use of privileged access workstations (PAWs) for administrative tasks. - Conduct regular access reviews to remove unnecessary access.

Prevent Unauthorized Cloud Service Discovery

T1526 - Cloud Service Discovery

- Disable unused Azure services. - Monitor and set alerts for commands like az resource list --output table. - Implement service principal restrictions and enforce least privilege.

Monitor Password Policy Discovery Attempts

T1201 - Password Policy Discovery

- Enable strong password policies using banned password lists. - Monitor changes to password policies via Entra audit logs and set alerts. - Use Smart Lockout to block brute-force attempts.

Block Permission Groups Enumeration

T1069 - Permission Groups Discovery

- Restrict group enumeration permissions to necessary roles. - Implement PIM for critical groups like Global Administrators. - Monitor group changes using Azure Monitor or Microsoft Sentinel.

Detect Cloud Groups Enumeration Attempts

T1069.003 - Cloud Groups

- Monitor and restrict commands like az ad group list and az ad group member list. - Conduct access reviews of sensitive groups. - Enforce JIT access for administrative groups using PIM.

Last updated