Azure Resource Diagnostic Logs
Cloud & SaaSCloud InfrastructureCloud Control PlaneSIEM / Log Aggregator
Location
Azure Portal > Resource > Diagnostic settings > Log Analytics workspaceDescription
Data-plane logs for individual Azure resources (Key Vault access, Storage Blob read/write, SQL audit, App Service HTTP logs) when diagnostic settings are configured to route to Log Analytics, Storage, or Event Hub.
Forensic Value
Resource logs provide data-plane visibility that Activity Logs lack. Key Vault access logs reveal which secrets, keys, and certificates were read or modified during a breach. Storage account logs show exact blob names accessed and by which identity. These logs are critical for understanding what data the attacker actually accessed versus what they merely had permissions to access.
Tools Required
Azure PortalLog Analytics (KQL)Azure CLIPowerShell (Az module)
Collection Commands
KQL
AzureDiagnostics | where TimeGenerated > ago(30d) | where ResourceType == "VAULTS" | where OperationName == "SecretGet" | project TimeGenerated, CallerIPAddress, identity_claim_upn_s, OperationName, id_s
az CLI
az monitor diagnostic-settings list --resource <resource-id> --output json > diagnostic_settings.json
PowerShell
Get-AzDiagnosticSetting -ResourceId <resource-id> | ConvertTo-Json -Depth 10 > diagnostic_config.json
MITRE ATT&CK Techniques
T1530T1580T1578T1213.002T1098