Incident Response in Azure

Incident Response in Azure

Azure provides integrated security tools for incident response:

Azure Incident Response Workflow:

# Isolate compromised VM
$vm = Get-AzVM -ResourceGroupName "MyRG" -Name "CompromisedVM"
$vm | Update-AzVM -ProximityPlacementGroup $null

# Create disk snapshot
$disk = Get-AzDisk -ResourceGroupName "MyRG" -DiskName "MyDisk"
$snapshot = New-AzSnapshot -ResourceGroupName "MyRG" `
  -SnapshotName "IRSnapshot" -Snapshot $snapshotConfig

# Query Activity Logs
Get-AzActivityLog -StartTime (Get-Date).AddDays(-7) `
  -EndTime (Get-Date) | Where-Object {$_.OperationName -like "*Delete*"}

Azure Sentinel KQL Queries:

// Detect suspicious login patterns
SigninLogs
| where TimeGenerated > ago(24h)
| where ResultType != 0
| summarize FailedLogins = count() by UserPrincipalName, IPAddress
| where FailedLogins > 5

// Find unusual resource deletions
AzureActivity
| where OperationNameValue contains "delete"
| where ActivityStatusValue == "Success"
| project TimeGenerated, Caller, Resource