Summary
In this final chapter, we covered the many persistence options that are available within Azure. For the attackers reading, hopefully, this has provided you with some options for maintaining your access within an Azure tenant. For the defenders reading, good luck with finding any persistence methods that have made their way into your environment. On the plus side, many of the techniques mentioned in this chapter can be logged and alerted on in Azure with Sentinel rules. We highly recommend checking out the detection options within Azure Sentinel for the defenders reading this book.
As a final note for this chapter and this book, we wanted to remind you to clean up and secure your test tenant. Since you probably created your tenant and subscriptions in an account that is tied to your credit card, we don't want you to accidentally run up a huge Azure bill as part of following along with this book. Although accidentally running up a massive cloud bill is a rite of passage...