TLS Certificate Using Weak Cipher - Medium
| Id | 7bbe51fe-9c5f-4f54-a079-b84cc27737a1 |
| Rulename | TLS Certificate Using Weak Cipher - Medium |
| Description | TLS Certificate Using Weak Cipher |
| Severity | Medium |
| Tactics | CredentialAccess LateralMovement DefenseEvasion Persistence |
| Techniques | T1556 T1210 T1212 |
| Required data connectors | HVPollingIDAzureFunctions |
| Kind | Scheduled |
| Query frequency | 5h |
| Query period | 5h |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/TLSCertificateUsingWeakCipherMedium.yaml |
| Version | 1.0.3 |
| Arm template | 7bbe51fe-9c5f-4f54-a079-b84cc27737a1.json |
HackerViewLog_Azure_1_CL | where severity_s == "medium" | where progress_status_s == "New" | where status_s != "inactive" | where issue_name_s == "TLS Certificate Using Weak Cipher"
tactics:
- CredentialAccess
- LateralMovement
- DefenseEvasion
- Persistence
relevantTechniques:
- T1556
- T1210
- T1212
version: 1.0.3
triggerOperator: gt
name: TLS Certificate Using Weak Cipher - Medium
id: 7bbe51fe-9c5f-4f54-a079-b84cc27737a1
description: |
'TLS Certificate Using Weak Cipher'
incidentConfiguration:
groupingConfiguration:
enabled: false
matchingMethod: AllEntities
reopenClosedIncident: false
lookbackDuration: PT5H
createIncident: true
suppressionEnabled: false
suppressionDuration: 5h
queryFrequency: 5h
severity: Medium
eventGroupingSettings:
aggregationKind: SingleAlert
status: Available
query: HackerViewLog_Azure_1_CL | where severity_s == "medium" | where progress_status_s == "New" | where status_s != "inactive" | where issue_name_s == "TLS Certificate Using Weak Cipher"
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/TLSCertificateUsingWeakCipherMedium.yaml
queryPeriod: 5h
triggerThreshold: 0
kind: Scheduled
entityMappings:
- fieldMappings:
- identifier: Address
columnName: meta_resolved_ip_s
entityType: IP
- fieldMappings:
- identifier: Url
columnName: hackerview_link_s
entityType: URL
- fieldMappings:
- identifier: HostName
columnName: meta_host_s
entityType: Host
requiredDataConnectors:
- dataTypes:
- HackerViewLog_Azure_1_CL
connectorId: HVPollingIDAzureFunctions