Skip to content

Commit 84f6f9b

Browse files
committed
Added KV alerts to the Service Layer page
These should have been there for Ignite
1 parent 8f28cae commit 84f6f9b

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed

articles/security-center/security-center-alerts-service-layer.md

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ This topic presents the Azure Security Center alerts available when monitoring t
1818

1919
* [Azure network layer](#network-layer)
2020
* [Azure management layer (Azure Resource Manager) (Preview)](#management-layer)
21+
* [Azure Key Vault](#azure-keyvault)
2122

2223
>[!NOTE]
2324
>The following analytics are applicable to all resource types. They use the telemetry that Security Center provides by tapping into Azure internal feeds.
@@ -74,3 +75,28 @@ Security Center offers an additional layer of protection by using Azure Resource
7475
7576
>[!NOTE]
7677
>Security Center stores security-related customer data in the same geo as its resource. If Microsoft hasn't yet deployed Security Center in the resource's geo, then it stores the data in the United States. When Cloud App Security is enabled, this information is stored in accordance with the geo location rules of Cloud App Security. For more information, see [Data storage for non-regional services](https://azuredatacentermap.azurewebsites.net/).
78+
79+
## Azure Key Vault <a name="azure-keyvault"></a>
80+
81+
Azure Key Vault is a cloud service that safeguards encryption keys and secrets like certificates, connection strings, and passwords.
82+
83+
Azure Security Center includes Azure-native, advanced threat protection for Azure Key Vault, providing an additional layer of security intelligence. Security Center detects unusual and potentially harmful attempts to access or exploit Key Vault accounts. This layer of protection allows you to address threats without being a security expert, and without the need to manage third-party security monitoring systems.
84+
85+
When anomalous activities occur, Security Center shows alerts and optionally sends them via email to subscription administrators. These alerts include the details of the suspicious activity and recommendations on how to investigate and remediate threats.
86+
87+
> [!NOTE]
88+
> This service is not currently available in Azure government and sovereign cloud regions.
89+
90+
> [!div class="mx-tableFixed"]
91+
92+
|Alert|Description|
93+
|---|---|
94+
|**Access from a TOR exit node to a Key Vault**|The Key Vault has been accessed by someone using the TOR IP anonymization system to hide their location. Malicious actors often try to hide their location when attempting to gain unauthorized access to internet-connected resources.|
95+
|**Suspicious policy change and secret query in a Key Vault**|A Key Vault policy change has been made and then operations to list and/or get secrets occurred. In addition, this operation pattern is not normally performed by the user on this vault. This is highly indicative that the Key Vault is compromised and the secrets within have been stolen by a malicious actor.|
96+
|**Suspicious secret listing and query in a Key Vault**|A Secret List operation was followed by many Secret Get operations. In addition, this operation pattern is not normally performed by the user on this vault. This indicates that someone could be dumping the secrets stored in the Key Vault for potentially malicious purposes.|
97+
|**Unusual user-application pair accessed a Key Vault**|The Key Vault has been accessed by a User-Application pairing that does not normally access it. This may be a legitimate access attempt (for example, following an infrastructure or code update). Or, it may indicate that your infrastructure is compromised and a malicious actor is attempting to access the secrets stored within.|
98+
|**Unusual application accessed a Key Vault**|The Key Vault has been accessed by an Application that does not normally access it. This may be a legitimate access attempt (for example, following an infrastructure or code update). Or, it may indicate that your infrastructure is compromised and a malicious actor is attempting to access the secrets stored within.|
99+
|**Unusual user accessed a Key Vault**|The Key Vault has been accessed by a User that does not normally access it. This may be a legitimate access attempt (for example, a new user needing access has joined the organization). Or, it may indicate that your infrastructure is compromised and a malicious actor is attempting to access the secrets stored within.|
100+
|**Unusual operation pattern in a Key Vault**|An unusual set of Key Vault operations has been performed compared with historical data. Key Vaults typical exhibit the same behavior over time. This may be a legitimate change in activity. Or, it may indicate that your infrastructure is compromised warranting further investigation.|
101+
|**High volume of operations in a Key Vault**|A larger volume of Key Vault operations has been performed compared with historical data. Key Vaults typical exhibit the same behavior over time. This may be a legitimate change in activity. Or, it may indicate that your infrastructure is compromised warranting further investigation.|
102+
|**User accessed high volume of Key Vaults**|The number of vaults that a user or application accesses has changed compared with historical data. Key Vault activity is typically the same over time. This may be a legitimate change in activity. Or, it may indicate that your infrastructure is compromised warranting further investigation.|

0 commit comments

Comments
 (0)