T1562.007
Disable or Modify Cloud Firewall
Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources. Cloud environments typically utilize restrictive security groups and firewall rules that only allow network activity from trusted IP addresses via expected ports and protocols. An adversary with appropriate permissions may introduce new firewall rules or policies to allow access into a victim cloud environment. For example, adversaries may create new ingress rules in existing security groups or create new security groups entirely to allow any TCP/IP connectivity.
Microsoft Sentinel / Defender
kusto
let CloudFirewallActions = dynamic(["AuthorizeSecurityGroupIngress", "AuthorizeSecurityGroupEgress", "RevokeSecurityGroupIngress", "RevokeSecurityGroupEgress", "CreateSecurityGroup", "DeleteSecurityGroup", "UpdateSecurityGroup", "microsoft.network/networksecuritygroups/write", "microsoft.network/networksecuritygroups/securityRules/write", "microsoft.network/networksecuritygroups/delete", "compute.firewalls.create", "compute.firewalls.delete", "compute.firewalls.update"]);
AuditLogs
| where TimeGenerated > ago(24h)
| where OperationName has_any (CloudFirewallActions)
| extend SourceIP = tostring(parse_json(tostring(InitiatedBy.user)).ipAddress)
| extend Actor = tostring(parse_json(tostring(InitiatedBy.user)).userPrincipalName)
| extend IsOpenToAll = Result has "0.0.0.0/0" or Result has "::/0"
| project TimeGenerated, OperationName, Actor, SourceIP, TargetResources, Result, IsOpenToAll
| sort by TimeGenerated desc high severity
medium confidence
Data Sources
Cloud Service: Cloud Service Modification Firewall: Firewall Rule Modification AWS CloudTrail Azure Activity Log GCP Audit Log
Required Tables
AuditLogs
False Positives
- Cloud infrastructure teams deploying new services with appropriate security group configurations
- Infrastructure-as-Code pipelines (Terraform, CloudFormation, ARM templates) that manage security groups during deployment
- Auto-scaling events that create temporary security groups for new instances
Last updated: 2026-04-20 Research depth: deep
Unlock Pro Content
Get the full detection package for T1562.007 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance
Related Detections
Parent Technique
T1562Impair DefensesRelated Sub-techniques
T1562.001Disable or Modify ToolsT1562.002Disable Windows Event LoggingT1562.003Impair Command History LoggingT1562.004Disable or Modify System FirewallT1562.006Indicator BlockingT1562.008Disable or Modify Cloud LogsT1562.009Safe Mode BootT1562.010Downgrade AttackT1562.011Spoof Security AlertingT1562.012Disable or Modify Linux Audit SystemT1562.013Disable or Modify Network Device Firewall