EZCA enables your security team to monitor critical user actions by pushing the information to your SIEM. If your SIEM provider is not currently supported email your Keytos contact and request a connector for that specific provider.
Event ID | Event Summary | Description | Potential Criticality |
---|---|---|---|
4882 | The security permissions for Certificate Services changed | A change in CA settings that might give or remove critical permissions | High |
92 | CA change denied due to insufficient permissions | A user attempted to change CA settings without the proper permissions | High |
19 | CA deleted | This indicates that a CA was deleted | High |
28 | Intermediate CA was imported | A new Intermediate CA has been created chaining to an external CA | Medium |
22 | Intermediate CA created with EZCA Root | A new Intermediate CA has been created chaining to an EZCA CA | Medium |
12 | CA was renewed | A CA has been renewed | Low |
Event ID | Event Summary | Description | Potential Criticality |
---|---|---|---|
4888 | Certificate request denied due to insufficient permissions | A user attempted to request a certificate without the proper permissions | High |
4870 | A certificate has been revoked | This can cause an outage if was done by mistake or the new certificate is not added to all the endpoints that use the certificate | Medium |
4887 | Certificate was created | This event indicates a certificate was created successfully | Low |
Using Azure Sentinel enables you to create alerts for critical operations or abnormal behavior. We recommend setting up alerts for any high criticality event, and closely monitor medium and low events. Below are sample queries that can be used to create alerts.
Certificate request denied is an event that is created when a user requests a certificate that they do not have permission to request. It is important to alert on this event since it can be an attacker attempting to escalate privileges by requesting a certificate. Below is a sample query to retrieve this specific event:
EZCA_Certificates_CL | where EventID_d == 4888
CA Permission Changed is an event that is created when a user changes the security permissions for a CA. This event should be monitored since it is a low frequency high impact action that could indicate a compromise to your PKI administrator’s accounts. Below is a sample query to retrieve this specific event:
EZCA_CAs_CL | where EventID_d == 4882
CA Permission Denied is an event that is created when a user attempts to change the security permissions for a CA without having the proper security permissions. It is important to alert on this event since it can be an attacker attempting to escalate privileges by changing the security configuration of your certificate authority. Below is a sample query to retrieve this specific event:
EZCA_CAs_CL | where EventID_d == 92
CA Deleted is an event that is created when a user deletes a CA. This event should be monitored since it is a low frequency high impact action that could indicate a compromise to your PKI administrator’s accounts. Below is a sample query to retrieve this specific event:
EZCA_CAs_CL | where EventID_d == 19