Azure-Sentinel/Playbooks/Affected-Key-Credentials-CV...
Sreedhar Ande 6c690a0778
update Affected-Key-Credentials-CVE-2021-42306 ARM
2022-03-16 15:47:09 -07:00
..
images Updated playbook graphics 2021-12-15 18:11:11 -08:00
README.md Updated Link in ReadMe 2021-12-07 12:45:39 -08:00
azuredeploy.json update Affected-Key-Credentials-CVE-2021-42306 ARM 2022-03-16 15:47:09 -07:00

README.md

Affected Key Credentials

This Playbook scans all key credentials in all apps/serviceprincipals in the specified tenant for credentials with property hasExtendedValue == true by calling Microsoft Graph and adds to Azure Sentinel Watchlist

https://msrc-blog.microsoft.com/2021/11/17/guidance-for-azure-active-directory-ad-keycredential-property-information-disclosure-in-application-and-service-principal-apis/

Author: Sreedhar Ande, Chi Nguyen, Ajeet Prakash

Register an application in Azure AD

  1. Go to Azure Active Directory / App Registrations
  2. Create New Registration
  3. Call it "GraphAPItoAzureSentinel". Click Register.
  4. Click API Permissions Blade.
  5. Click Add a Permission.
  6. Click Microsoft Graph.
  7. Click Delegated Permissions
  8. Check Application.Read.All, Application.ReadWrite.All, Directory.Read.All, Directory.ReadWrite.All, Directory.AccessAsUser.All.
  9. Click Application Permissions
  10. Check Application.Read.All, Application.ReadWrite.All, Directory.Read.All
  11. Click Add permissions.
  12. Click Certificates and Secrets blade.
  13. Click New Client Secret.
  14. Enter a description, select never. Click Add.
  15. IMPORTANT. Click copy next to the new secret and paste it somewhere temporaily. You can not come back to get the secret once you leave the blade.
  16. Copy the client Id from the application properties and paste it somewhere.
  17. Also copy the tenant Id from the AAD directory properties blade.

Deployment

Deploy to Azure Deploy to Azure Gov

Post Deployment Steps

  1. API connections are used to connect Logic Apps to SaaS services, such as Azure Sentinel
    Apiconnections