Azure Add App Role Assignment To Service Principal
Grants an application role to a service principal, allowing it to act with that role's permissions within the application.
Browse and filter cloud security events by cloud provider and MITRE ATT&CK tactics.
Grants an application role to a service principal, allowing it to act with that role's permissions within the application.
Creates and registers a new application in Microsoft Entra ID, establishing an identity that can authenticate and request access tokens.
Adds a user as an eligible member for a privileged role in Azure PIM, allowing them to activate the role on demand.
Adds a federated identity credential to an application, enabling secretless persistent access via workload identity federation.
Directly assigns a user or service principal to an Entra ID directory role, granting that role's permissions.
Adds an owner to an Entra ID application registration, granting them management rights over the application.
Adds an owner to a group, granting the ability to modify group membership for lateral movement.
Creates a new custom Azure RBAC role definition with specified allowed and denied actions.
Creates a service principal in Entra ID, representing the identity instance of an application within a tenant.
Creates a new user account in Microsoft Entra ID.
Adds a custom domain to a Microsoft Entra ID tenant and initiates the domain verification process.
Adds an IAM policy binding to a GCP resource, granting a member (user, group, or service account) a specified role.
Adds a permission to a Lambda function's resource-based policy, allowing specified principals to invoke the function.
Adds an IAM role to an EC2 instance profile, enabling EC2 instances to assume that role and access AWS services.
Adds an IAM user to a specified group, granting the user all permissions attached to that group.
Records an administrator registering authentication methods (e.g., MFA) on behalf of another user in Entra ID.
Archives GuardDuty findings to suppress active security alerts from SOC visibility.
Associates an IAM instance profile with an EC2 instance, granting the instance permissions defined by the profile's IAM role.
Returns temporary security credentials for assuming an IAM role. Allows an entity (user, service, or account) to act with the role's permissions.
Returns temporary credentials for a SAML-authenticated user to assume an IAM role, used in federated SSO scenarios.
Returns temporary credentials for a user authenticated via an OIDC identity provider (e.g., Cognito, Google) to assume an IAM role.
Attaches a managed IAM policy to a group, granting all group members the permissions defined in that policy.
Attaches a managed IAM policy to an IAM role, granting the role the permissions defined in that policy.
Attaches a managed IAM policy directly to an IAM user, granting them the permissions defined in that policy.
Adds inbound rules to an RDS DB security group, allowing specified IP ranges or EC2 security groups to access the database.
Adds outbound rules to a VPC security group, permitting traffic from instances to specified destination IP ranges or security groups.
Adds inbound rules to a VPC security group, permitting traffic from specified IP ranges or security groups to reach instances.
Creates and submits a BigQuery job (query, load, export, or copy) that accesses or transforms data in BigQuery datasets.
Allows an IAM user to change their own AWS Management Console login password.
Exports data from a Cloud SQL instance to a Cloud Storage bucket.
Sets the IAM policy on a Compute Engine persistent disk, controlling which principals have access to it.
Deletes a firewall rule from a GCP VPC network.
Modifies an existing firewall rule in a GCP VPC network.
Adds an external IP access configuration to an instance, exposing an internal resource to the internet.
Sets or updates instance-level metadata on a Compute Engine VM, which can include SSH keys or startup scripts.
Changes the service account attached to a Compute Engine instance, enabling privilege escalation via service account swap.
Sets project-wide Compute Engine metadata, applied to all instances and commonly used to manage SSH keys.
Records an admin or user granting an Entra ID application permission to access resources via an OAuth 2.0 consent grant.
Records a sign-in attempt to the AWS Management Console, capturing success or failure status and whether MFA was used.
Copies a blob within or between Azure Storage accounts or containers.
Copies an object from one S3 location to another, within or across buckets, optionally modifying metadata or encryption.
Creates an access entry for an EKS cluster, granting an IAM principal Kubernetes API access via EKS access management.
Creates a new long-term access key for an IAM user, enabling programmatic access to AWS services.
Creates a new AWS account as a member of an AWS Organization under the management account.
Creates an SSM State Manager association, binding a document to instances for persistent or scheduled command execution.
Creates a manual point-in-time snapshot of an RDS database instance for backup or recovery purposes.
Creates a Glue development endpoint providing SSH access into the Glue VPC with the Glue service role.
Creates a GuardDuty finding filter that automatically suppresses or highlights findings matching specified criteria.
Creates an Amazon Machine Image (AMI) from a running or stopped EC2 instance, capturing its disk state for reuse.
Exports an EC2 instance as a virtual machine image to an S3 bucket in a format such as OVF or VMDK.
Creates a GuardDuty IP set — a list of trusted or known malicious IP addresses used in threat intelligence.
Creates an EC2 key pair and returns the private key material, used for SSH authentication to EC2 instances.
Creates a password for an IAM user, enabling them to sign into the AWS Management Console.
Adds an allow or deny rule to a Network ACL, controlling traffic entering or leaving a specific VPC subnet.
Registers an OIDC identity provider with IAM, enabling federated access from external identity systems like GitHub Actions.
Creates a new managed IAM policy that can be attached to users, groups, or roles to define permissions.
Creates a new version of an IAM managed policy, which can optionally be set as the default active version.
Creates a new IAM role with a trust policy that defines which principals are permitted to assume it.
Creates a custom IAM role in GCP with a specified set of granular permissions.
Registers a SAML 2.0 identity provider metadata document with IAM, enabling federated authentication via SAML.
Creates a service-linked IAM role that allows an AWS service to perform actions on your behalf.
Creates a point-in-time snapshot of an EBS volume, stored durably for backup or volume duplication.
Creates a CloudFormation stack by provisioning AWS resources defined in a specified template.
Creates a new IAM user in the AWS account for programmatic or console-based access.
Creates a virtual MFA device that can be associated with an IAM user for multi-factor authentication.
Deactivates an MFA device associated with an IAM user, removing the MFA requirement for their authentication.
Permanently deletes an IAM user's access key, revoking the associated programmatic access credentials.
Deletes one or more CloudWatch alarms, removing their monitoring configurations and associated notifications.
Permanently deletes an S3 bucket; the bucket must be empty before deletion can succeed.
Removes the resource-based policy from an S3 bucket, reverting to default access controls.
Deletes an AWS Config rule that was evaluating the compliance of AWS resource configurations.
Deletes the AWS Config configuration recorder, stopping resource configuration recording in the region.
Permanently deletes an Aurora DB cluster and optionally its automated backups.
Permanently deletes an RDS database instance, with an option to take a final snapshot before deletion.
Deletes the AWS Config delivery channel, stopping delivery of configuration snapshots and change notifications to S3 or SNS.
Disables and permanently deletes a GuardDuty detector in the region, stopping all threat detection.
Deletes a CloudTrail Lake event data store, destroying stored forensic evidence and audit logs.
Permanently deletes an EFS file system and all its data; all mount targets must be deleted first.
Deletes VPC Flow Log configurations, stopping the capture of network traffic metadata for the specified resources.
Deletes an Aurora global database cluster that spans multiple AWS regions.
Permanently deletes a CloudWatch Logs log group and all its log streams and stored data.
Removes an IAM user's console password, preventing them from signing in to the AWS Management Console.
Permanently deletes a log stream and all its events from within a CloudWatch Logs log group.
Removes member accounts from a GuardDuty administrator account, ending the delegated monitoring relationship.
Deletes a Network ACL from a VPC; the default NACL cannot be deleted.
Removes a rule from a Network ACL, modifying traffic filtering for the associated VPC subnet.
Deletes a single object from an S3 bucket; with versioning enabled, a delete marker is created instead.
Deletes multiple S3 objects in a single batch request, more efficient than individual delete operations.
Removes the permissions boundary from an IAM role, potentially expanding the role's maximum effective permissions.
Deletes an inline policy embedded directly in an IAM role.
Permanently deletes a WAF rule group containing a set of web traffic filtering rules.
Permanently deletes an EBS snapshot; any AMIs based on it must be deregistered first.
Permanently deletes a CloudTrail trail, stopping API activity logging for that trail configuration.
Permanently deletes an IAM user; all attached policies, group memberships, and keys must be removed first.
Removes the permissions boundary from an IAM user, potentially expanding their maximum effective permissions.
Deletes an inline policy embedded directly in an IAM user.
Deletes a virtual MFA device, weakening account security by removing multi-factor authentication.
Permanently deletes an EBS volume; the volume must be detached from any instance before deletion.
Permanently deletes a WAF Web ACL used to protect web applications from common web threats.
Detaches a managed IAM policy from a role, removing those permissions from the role's effective policy.
Detaches a managed IAM policy from an IAM user, removing those permissions from the user.
Disables multi-factor authentication for a user account, weakening authentication security.
Disables a KMS encryption key, preventing any operations that depend on it until the key is re-enabled.
Disassociates the current account from its GuardDuty administrator account, ending the delegated monitoring relationship.
Disassociates specified member accounts from a GuardDuty administrator account.
Enables a previously disabled AWS region for the account, making its services available for use.
Enables the EC2 Serial Console at the account level, allowing direct serial port access to instances for troubleshooting.
Re-enables a previously disabled GCP service account, restoring its ability to authenticate and make API calls.
Generates a short-lived OAuth2 access token for a service account, used for impersonation or workload federation. This is the admin activity audit log format; see also iam.serviceAccounts.getAccessToken for the data access format.
Retrieves an ECR authorization token for Docker image operations, seen in container escape and lateral movement chains.
Returns temporary security credentials for a federated user, optionally scoped to an inline IAM policy.
Retrieves (downloads) an object from an S3 bucket; logged in CloudTrail only when S3 data events are enabled.
Retrieves one or more parameters from AWS Systems Manager Parameter Store, optionally decrypting SecureString values.
Retrieves the encrypted Windows administrator password for a newly launched EC2 Windows instance.
Retrieves the plaintext value of a secret stored in AWS Secrets Manager.
Returns temporary credentials for an IAM user, typically used to satisfy an MFA requirement for subsequent API calls.
Generates a sign-in token used to construct a federation URL for single sign-on to the AWS Management Console.
Mutes Security Command Center findings, suppressing security alerts from visibility.
Creates a new key for a GCP service account, producing a JSON credentials file for programmatic authentication. This is the admin activity audit log format; see also iam.serviceAccountKeys.create for the data access format.
Deletes a service account, disrupting workloads and applications that depend on it for authentication.
Deletes a service account key, potentially removing evidence of attacker-created credentials.
Replaces the complete IAM policy for a GCP resource, controlling access for all principals.
Uploads an external key to a service account, enabling persistent access that survives credential rotation.
Deletes log entries from Cloud Logging, destroying forensic evidence of attacker activity.
Modifies a logging exclusion filter to silently drop specific log entries, hiding ongoing attacker activity.
Establishes a serial console connection to a Compute Engine VM, providing low-level instance access.
Updates an existing custom IAM role, modifying its set of permitted permissions.
Creates a new key for a GCP service account, generating credentials for external services to authenticate as the account. This is the data access audit log format; see also google.iam.admin.v1.CreateServiceAccountKey for the admin activity format.
Records a token exchange where a service account implicitly delegates its authority to another identity.
Records use of the actAs permission, where one identity impersonates and acts on behalf of a GCP service account.
Generates an OAuth2 access token for a service account via the IAM Credentials API, enabling service account impersonation. This is the data access audit log format; see also generateAccessToken for the admin activity format.
Signs a JWT on behalf of a service account via the IAM Credentials API, used for authentication or token exchange.
Imports an existing RSA or ED25519 public key into EC2 for use as a key pair when launching instances.
Sends a B2B guest invitation to an external user, granting them access to the tenant's resources.
Invokes a Lambda function synchronously or asynchronously, triggering its execution with an optional input payload.
Removes the current member account from its AWS Organization; the management account cannot leave.
Creates a log exclusion rule in Cloud Logging that prevents matching log entries from being ingested.
Deletes a Cloud Logging sink that was routing log entries to a destination such as Cloud Storage or BigQuery.
Modifies a Cloud Logging sink's configuration, such as its destination or log filter criteria.
Lists the access keys for an Azure App Configuration store, exposing credentials used to read or write configuration data.
Global Admin elevates to User Access Administrator at root scope, granting control over all Azure subscriptions.
Deletes a resource lock, removing protection against deletion or modification of critical resources.
Deletes a role assignment, removing access for legitimate users and disrupting operations.
Creates or updates an Azure RBAC role assignment, granting a principal specific permissions on a resource or scope.
Reads credential assets stored in an Azure Automation account, potentially exposing sensitive authentication data.
Creates or starts a runbook job in an Azure Automation account.
Creates or updates a runbook in an Azure Automation account.
Triggers an Azure Automation runbook via a webhook invocation.
Creates or updates a webhook that can trigger an Azure Automation runbook remotely.
Lists the access keys for an Azure Batch account, exposing credentials used to authenticate Batch API calls.
Generates a time-limited SAS URL to access or download the data of an Azure managed disk.
Generates a time-limited SAS URL to access or download the data from an Azure VM disk snapshot.
Creates or updates an SSH public key resource in Azure, used to authenticate to Linux virtual machines.
Permanently deletes an Azure virtual machine.
Installs or updates a VM extension on an Azure virtual machine, which can run scripts or install software agents.
Executes a script or command on an Azure VM without requiring network-based access such as SSH or RDP.
Creates or updates an Azure VM with a Custom Script Extension, executing a script on the VM at provisioning time.
Lists the admin credentials for an Azure Container Registry, exposing the username and password for registry access.
Retrieves the cluster-admin kubeconfig for an AKS cluster, granting full administrative access to the cluster.
Retrieves the user-level kubeconfig for an AKS cluster.
Executes a command against an AKS cluster's Kubernetes API without requiring direct network connectivity to the API server.
Adds or removes members from an Entra ID security group or Microsoft 365 group.
Adds or updates credentials (client secrets or certificates) for an Entra ID service principal.
Permanently deletes an Azure Event Hub entity within a namespace.
Removes an extension from an Azure Arc-enabled server.
Deletes an activity log alert rule, disabling security detection and notification capabilities.
Deletes an Azure Monitor diagnostic setting, stopping the forwarding of logs and metrics to a configured destination.
Deletes an Azure Monitor metric alert rule.
Modifies Key Vault access policies, potentially granting unauthorized access to secrets, keys, and certificates.
Reads a certificate stored in an Azure Key Vault.
Permanently deletes an Azure Key Vault; without soft-delete, all secrets, keys, and certificates are unrecoverable.
Reads a cryptographic key from an Azure Key Vault.
Deletes a secret from an Azure Key Vault.
Reads a secret value from an Azure Key Vault.
Assigns a user-assigned managed identity to an Azure resource, enabling it to authenticate to other Azure services.
Deletes a network security group, removing network access controls from associated resources.
Creates or updates a security rule in an Azure Network Security Group, controlling inbound or outbound traffic.
Deletes an NSG flow log configuration, stopping the capture of network traffic metadata for a network security group.
Creates or modifies a virtual network peering, enabling network connectivity for lateral movement across VNets.
Permanently deletes a Log Analytics workspace and its stored data.
Retrieves the primary and secondary access keys for a Log Analytics workspace.
Removes a protected item from Azure Backup, stopping protection and deleting associated backup data.
Creates or updates a suppression rule in Microsoft Defender for Cloud, hiding matching security alerts.
Modifies auto-provisioning settings, potentially disabling automatic deployment of security monitoring agents.
Changes the pricing tier (plan) for Microsoft Defender for Cloud on a subscription or specific resource type.
Removes a security solution integrated with Microsoft Defender for Cloud.
Connects to the serial console of an Azure VM, providing low-level access without requiring network connectivity.
Lists the access keys for an Azure Service Bus namespace authorization rule, exposing connection strings for messaging.
Permanently deletes an Azure SQL Database.
Exports an Azure SQL Database to a BACPAC file stored in Azure Blob Storage.
Permanently deletes a blob container from an Azure Storage account.
Permanently deletes an Azure Storage account and all of its data.
Lists the access keys for an Azure Storage account, exposing credentials that provide full data-plane access.
Regenerates one of the two access keys for an Azure Storage account, invalidating the previous key.
Stops logging for an Azure Storage account, disabling the collection of storage analytics logs.
Lists the host keys for an Azure App Service or Azure Functions app, exposing function-level and master access keys.
Modifies settings on an RDS database instance, such as instance class, storage, networking, and access configuration.
Modifies the attributes of an RDS DB snapshot, such as sharing it with other AWS accounts.
Modifies attributes of an AMI, such as making it public or sharing it with specific AWS accounts.
Modifies a specific attribute of an EC2 instance, such as its instance type, user data, or security groups.
Modifies the permissions of an EBS snapshot, such as making it public or sharing it with specific AWS accounts.
Allows a principal to pass an IAM role to an AWS service, granting the service permission to assume that role on their behalf.
Records a request to recover or reset the AWS account root user password via the password reset process.
Sets the Access Control List (ACL) for an S3 bucket, controlling access for specific AWS accounts or predefined groups.
Sets lifecycle configuration on an S3 bucket to automate object transitions or expiration over time.
Sets lifecycle rules on an S3 bucket to automatically transition objects to cheaper storage tiers or expire them.
Applies or replaces the resource-based policy on an S3 bucket, defining who can access it and how.
Modifies S3 bucket public access block settings, potentially disabling protections to allow public data exposure.
Enables replication for an S3 bucket, automatically copying objects to a destination bucket in the same or another region.
Configures which API events (management or data, read/write) a CloudTrail trail records.
Creates or updates an inline policy embedded directly in an IAM group.
Pushes a container image to ECR, potentially introducing backdoored images into the deployment pipeline.
Modifies a KMS key policy to grant cross-account access or expand key usage permissions.
Sets a permissions boundary on an IAM role, capping the maximum permissions the role can be granted.
Creates or updates an inline policy embedded directly in an IAM role.
Creates an EventBridge rule that triggers on specific events, used for persistent execution of Lambda or other targets.
Adds or updates targets for an EventBridge rule, defining which resources are invoked when the rule matches an event.
Sets a permissions boundary on an IAM user, limiting the maximum permissions they can ever be granted.
Creates or updates an inline policy embedded directly in an IAM user.
Removes an AWS account from the organization, stripping it of SCP protections and centralized security controls.
Replaces the IAM instance profile associated with a running EC2 instance with a different one.
Resets an Entra ID user's password through an administrative action.
Restores an RDS instance from a snapshot, enabling an attacker to access database contents by spinning up a copy.
Resumes a previously disconnected Systems Manager Session Manager session with a managed instance.
Schedules a KMS customer managed key for deletion after a waiting period (7-30 days), after which encrypted data is unrecoverable.
Permanently deletes a secret and all of its versions from GCP Secret Manager.
Retrieves the plaintext value of a specific secret version from GCP Secret Manager.
Permanently destroys a specific version of a secret in GCP Secret Manager, making its data irrecoverable.
Updates the settings or configuration of Google Security Command Center for the organization or project.
Deletes a finding source from Google Security Command Center.
Remotely executes a command or script on one or more managed instances via AWS Systems Manager Run Command.
Pushes an SSH public key to an EC2 instance's serial console interface, enabling SSH access over the serial port.
Pushes a temporary SSH public key to an EC2 instance via EC2 Instance Connect, valid for 60 seconds.
Sets the default version of an IAM managed policy, changing which version of the policy is active for all attached entities.
Records the start of a copy operation for an EBS snapshot shared from another AWS account.
Records the creation of an EBS volume from a snapshot shared by another AWS account.
Starts a CodeBuild build, executing arbitrary code with the build project's IAM role credentials.
Starts an export of an RDS snapshot to Amazon S3 in Apache Parquet format for use in analytics.
Starts an interactive Systems Manager Session Manager session with a managed EC2 instance or on-premises server.
Stops AWS Config from recording resource configuration changes in the region.
Stops logging API activity for a CloudTrail trail, disabling audit log collection for that trail.
Stops GuardDuty from monitoring specified member accounts under an administrator account.
Permanently deletes a GCP Cloud Storage bucket; the bucket must be empty before deletion.
Creates HMAC keys for S3-compatible access to Cloud Storage, providing a persistent access mechanism often missed by defenders.
Deletes objects from Cloud Storage, used in data destruction or anti-forensics operations.
Sets the IAM policy on a Cloud Storage bucket or object, controlling which principals can access it.
Permanently terminates one or more EC2 instances, releasing instance store data and associated resources.
Modifies an existing Conditional Access policy, changing the conditions or controls that govern how users authenticate.
Updates a named location definition (IP ranges or countries) used in Entra ID Conditional Access policy conditions.
Modifies an existing custom Azure RBAC role definition, updating its allowed or denied actions.
Changes the MFA or passwordless authentication methods registered for a user in Microsoft Entra ID.
Changes the status of an IAM user's access key between Active and Inactive.
Updates the trust policy of an IAM role, changing which principals are permitted to assume it.
Updates the configuration of a GuardDuty detector, such as enabling or disabling specific threat detection data sources.
Updates a Glue development endpoint, potentially injecting SSH public keys for unauthorized access.
Updates the feedback status on GuardDuty findings, marking them as useful or not useful.
Updates the code of an existing Lambda function with a new deployment package or container image URI.
Updates Lambda function configuration including environment variables, IAM role, or layers — used to inject credentials or swap execution context.
Modifies the IP addresses or CIDR ranges in a GuardDuty IP set used for threat intelligence.
Updates the console login password for an IAM user.
Modifies the configuration of an existing CloudTrail trail, such as its S3 bucket, log validation, or multi-region settings.
Imports an SSH public key into a user's GCP OS Login profile, enabling SSH access to Compute Engine instances.
Updates an existing SSH public key in a user's GCP OS Login profile.
Updates the properties of an Azure Key Vault, such as its access policies, network rules, or soft-delete configuration.