Defensive Strategies: TA0007
Defensive Strategies for TA0007 - Discovery
The Discovery (TA0007) tactic involves attackers gathering critical information about accounts, resources, and configurations to plan subsequent moves. Defending against these activities in Entra ID environments requires monitoring, restricting permissions, and hardening configurations to limit exposure.
1. Account Discovery
Mitigates: T1087 - Account Discovery Action: Prevent attackers from enumerating Entra ID accounts to identify potential targets. Azure Procedure:
Use Role-Based Access Control (RBAC) to restrict directory enumeration to least privilege.
Enable audit logging and set alerts for user enumeration attempts in Entra ID audit logs.
Apply Conditional Access Policies to enforce MFA and restrict access to sensitive APIs.
2. Cloud Account Enumeration
Mitigates: T1087.004 - Cloud Account Action: Prevent attackers from locating valuable or privileged accounts in Entra ID. Azure Procedure:
Monitor for suspicious commands such as
Get-AzADUser
.Restrict API and CLI permissions to authorized users only.
Enable Azure Security Defaults to enforce MFA for all users automatically.
3. Cloud Service Dashboard Access
Mitigates: T1087 - Cloud Service Dashboard Action: Block unauthorized access to the Azure Portal and prevent attackers from exploring services and configurations. Azure Procedure:
Enforce RBAC to limit portal access to essential personnel.
Require the use of privileged access workstations (PAWs) for administrative tasks.
Conduct regular access reviews to identify and remove unnecessary access.
4. Cloud Service Discovery
Mitigates: T1526 - Cloud Service Discovery Action: Prevent attackers from using CLI, APIs, or dashboards to list cloud services and resources. Azure Procedure:
Disable unused Azure services to reduce the attack surface.
Monitor and set alerts for commands like:
Implement service principal restrictions and enforce least privilege for API calls.
5. Password Policy Discovery
Mitigates: T1201 - Password Policy Discovery Action: Prevent attackers from querying Entra ID password policies to inform brute-force or credential stuffing attacks. Azure Procedure:
Enable strong password policies using banned password lists.
Monitor changes to password policies via Entra audit logs and set alerts.
Use Smart Lockout to block brute-force attempts based on behavior analysis.
6. Permission Groups Discovery
Mitigates: T1069 - Permission Groups Discovery Action: Block unauthorized enumeration of groups to identify privileged or misconfigured group memberships. Azure Procedure:
Restrict group enumeration permissions to necessary roles only.
Implement Privileged Identity Management (PIM) for critical groups, such as Global Administrators.
Monitor group changes using Azure Monitor or Microsoft Sentinel.
7. Cloud Groups Enumeration
Mitigates: T1069.003 - Cloud Groups Action: Prevent attackers from enumerating Entra ID cloud groups to locate administrative or sensitive access roles. Azure Procedure:
Monitor and restrict the use of commands such as:
Conduct regular access reviews of sensitive groups to detect unauthorized access.
Enforce just-in-time (JIT) access for administrative groups using PIM.
Summary of Defensive Procedures for TA0007
Last updated