T1021.007

Cloud Services

Adversaries may log into accessible cloud services within a compromised environment using Valid Accounts that are synchronized with or federated to on-premises user identities. Many enterprises federate user identities to cloud services (Azure AD/Entra ID, AWS, GCP, M365), allowing adversaries with compromised on-premises credentials to move laterally into cloud control planes. APT29 leveraged synced high-privileged accounts to move into Office 365/Azure. Storm-0501 abused Entra Connect Sync Server for hybrid lateral movement. Scattered Spider used existing AWS EC2 instances for lateral movement. Methods include cloud CLI tools (Connect-AZAccount, gcloud auth, aws configure), web console access, and Application Access Tokens.

Microsoft Sentinel / Defender
kusto
// Detect suspicious cloud service lateral movement from on-premises to cloud
// Pattern 1: Azure/M365 CLI authentication from suspicious processes
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
    "Connect-AzAccount", "Connect-MgGraph", "Connect-ExchangeOnline",
    "az login", "az account", "aws configure", "aws sts",
    "gcloud auth login", "gcloud auth print-access-token"
  )
| extend CloudPlatform = case(
    ProcessCommandLine has_any ("Connect-Az", "Connect-Mg", "az login", "az account"), "Azure",
    ProcessCommandLine has_any ("aws configure", "aws sts", "aws cli"), "AWS",
    ProcessCommandLine has_any ("gcloud"), "GCP",
    "Unknown"
  )
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, CloudPlatform
| union (
    // Pattern 2: Sign-in from new location or impossible travel in Entra ID
    SigninLogs
    | where TimeGenerated > ago(24h)
    | where ResultType == "0"  // Successful signin
    | extend AppName = tostring(AppDisplayName)
    | extend Location = tostring(LocationDetails)
    | extend IsRisky = RiskLevelDuringSignIn in ("medium", "high")
    | where IsRisky == true or NetworkLocationDetails has "anonymizedIPAddress"
    | project TimeGenerated, UserPrincipalName, AppName, IPAddress, Location,
             RiskLevelDuringSignIn, ConditionalAccessStatus
)
| sort by TimeGenerated desc
high severity medium confidence

Data Sources

Logon Session: Logon Session Creation Cloud Service: Cloud Service Authentication Azure Active Directory: Entra ID Sign-in Logs

Required Tables

DeviceProcessEvents SigninLogs AuditLogs

False Positives

  • Developers and DevOps engineers legitimately using cloud CLI tools (az, aws, gcloud) from their workstations
  • CI/CD pipeline agents authenticating to cloud services for deployment automation
  • Cloud administrators performing routine management via cloud CLI from authorized workstations
  • Multi-cloud monitoring tools that authenticate to multiple cloud platforms to collect metrics
  • Azure Arc and hybrid management services that sync identities between on-premises and cloud environments

Unlock Pro Content

Get the full detection package for T1021.007 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections