AZ_IN_GROUP

Summary

FSProtect ACL Alias

AZ_IN_GROUP

Entra ID (Azure AD) Alias

Group Member

Affected Object Types

Users, Service Principals, Groups

Exploitation Certainty

Certain

Description

AZ_IN_GROUP represents that a principal (user, service principal, or another group) is a member of a Microsoft Entra (Azure AD) group. Group membership in Entra ID is fundamental to identity management and access control, as groups are used to assign:

  • Azure RBAC permissions on subscriptions, resource groups, and resources.

  • Directory roles when the group is role-assignable (isAssignableToRole = true).

  • Application access through Conditional Access policies and app assignments.

  • License assignments for Microsoft 365 and other services.

By being a member of a group, a principal inherits all the permissions and privileges assigned to that group. This transitive relationship means that if an attacker compromises an account that is a member of a privileged group, they gain access to all resources and capabilities granted to that group.

Identification

PowerShell

To check membership for a specific user:

To enumerate transitive group memberships (including nested groups):

Azure CLI

Azure GUI

  • Open Microsoft Entra admin center -> Users → select the target user.

  • Go to Groups in the left menu to see all group memberships.

  • Alternatively, go to Groups → select a target groupMembers to see all members.

Exploitation

circle-info

There is no direct exploit path for this edge. AZ_IN_GROUP indicates that a principal is a member of a group, representing a relationship rather than an exploitable permission. The privileges inherited through group membership depend on what permissions are assigned to that group (Azure RBAC roles, directory roles, application access, etc.).

Mitigation

No specific mitigation is required for this edge, as it represents a membership relationship. However, organizations should regularly audit group memberships to ensure only authorized principals are members of sensitive groups.

Detection

Detect group membership changes in Audit logs.

1

Audit logs — filter for GroupManagement

  • Go to Microsoft Entra ID -> Audit logs.

  • Click Category: All -> select GroupManagement -> Apply.

  • Look for activities:

    • Add member to group

    • Remove member from group

2

Monitor for suspicious patterns

Monitor for suspicious membership patterns:

  • Users added to multiple privileged groups in a short timeframe.

  • Service principals added to groups with Azure RBAC permissions.

  • Membership changes outside of business hours.

References

  • https://learn.microsoft.com/en-us/entra/fundamentals/how-to-manage-groups

  • https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azadgroup

  • https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azadgroupmember

  • https://learn.microsoft.com/en-us/powershell/module/az.resources/get-azaduser

  • https://learn.microsoft.com/en-us/cli/azure/ad/group/member

  • https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/groups-concept

Last updated

Was this helpful?