eG Monitoring
 

Measures reported by AzrADAppRgstrtnTest

To delegate identity and access management functions to Azure AD, an application must be registered with an Azure AD tenant. When you register your application with Azure AD,you are creating an identity configuration for your application that allows it to integrate with Azure AD. For this purpose, registration automatically assigns a globally unique ID (application ID) to your app. Besides giving your app an identity, you also need to be mindful of the security requirements of your app during registration. To protect your application and user interactions with it from harm, you should authenticate accesses to the application using secrets and/or certificates. A client secret is the application password, which is auto-generated by Azure during application registration. A more secure authentication option would be certificates. Azure AD certificate-based authentication (CBA) enables customers to allow or require users to authenticate with X.509 certificates against their Azure Active Directory (Azure AD) for applications and browser sign-in. You can create a self-signed certificate for your application, export it to a file, and upload this certificate file when registering your application using the Azure portal.

You can authenticate applications using secrets or certificates or both. However, be it a secret or a certificate, their validity is determined by their expiry date. You can set when the client secret should expire, during application registration. For a certificate on the other hand, the expiry date is set when generating that certificate. An application stays secure only as long as the certificate/secret associated with it is valid/active.

If an application uses an invalid/expired certificate/secret, the security framework of that application will be severely compromised. This may not only impact application functionality, but can also have far-reaching, organization-wide effects (depending upon the permissions granted to that application). If this is to be avoided, administrators will need to be be informed about the expiry of a certificate/secret, and should also be able to quickly identify the application that is tied to expired certificates/secrets. Better still, if an administrator receives a heads up before a certificate/secret expires, it will help him/her take pre-emptive actions and avert potential security disasters. The AzrADAppRgstrtnTest helps with all of the above!

This test monitors application registrations on Azure AD, and reports the count and details of applications with invalid or expired secrets/certificates. With this information, administrators can rapidly identify applications with a high security risk quotient, and initiate measures to mitigate those risks. The test also alerts administrators to secrets and certificates that are about to expire, and thus enables administrators take proactive action against impending expiry. Additionally, the test also points administrators to ‘unprotected’ applications - i.e., applications without certificates or secrets. This way, the test urges administrators to employ either or both of the authentication options that Azure AD provides and secure their critical applications.

Outputs of the test : One set of results for the Azure AD tenant being monitored

The measures made by this test are as follows:

Measurement Description Measurement Unit Interpretation
total_apps Indicates the number of applications that are registered with Azure AD. Number  
vld_crtfct_clnt Indicates the number of app registrations with valid certificates/secrets. Number Use the detailed diagnosis of this measure to know which app registrations have valid certificates/secrets. The details of these valid certificates/secrets are also provided as part of detailed metrics.
no_crtfct_clnt Indicates the number of app registrations without any certificates/client-secrets. Number Use the detailed diagnosis of this measure to identify those applications that are not authenticated by any secrets/certificates. The permissions these applications have are also displayed as part of detailed metrics. From the scope of these permissions, you can infer if such applications may be a flight risk to the security ofthe Azure cloud organization and its resources. You may want to consider authenticating accesses to such applications using certificates/secrets, so that the security risks are eliminated.
exprd_crtfct_clnt Indicates the number of app registrations having certificates/client-secrets that have expired. Number Using the detailed diagnosis of this measure, you can identify those app registrations that are having expired certificates/secrets. You may want to renew the certificates or change the expiry date of the secrets to ensure that the applications stay protected.
total_crtfcts Indicates the total number of certificates uploaded to Azure AD. Number  
vld_crtfcts Indicates the number of certificates on Azure AD that are currently valid. Number  
exprd_crtfcts Indicates the number of app registration certificates that have expired. Number Use the detailed diagnosis of this measure to know which certificates have expired, when, which apps use them, and what permissions the apps have. This will tell you whether the applications left unprotected by expired certificates will expose your Azure organization to malicious attacks.
crtfcts_abt_expr Indicates the number of certificates that will be expiring within the duration specified against the Expiry Days Limit parameter. Number Ideally, the value of this measure should be 0. A non-zero value is a cause for concern.

Use the detailed diagnosis of this measure to know which certificates are about to expire, when, which apps use them, and what permissions the apps have. With the help of this information, you can initiate measures to avert security disasters that may occur in the event that the certificates do expire.
ttl_ClntScrts Indicates the total number of client secrets assigned to app registrations on Azure AD. Number  
vld_ClntScrts Indicates the number of client secrets that are currently valid. Number  
exprd_Clnt Indicates the number of app registration client secrets that have expired. Number Use the detailed diagnosis of this measure to know which client secrets have expired, when, which apps use them, and what permissions the apps have. This will tell you whether the applications left unprotected by expired clien certificates will expose your Azure organization to malicious attacks.
clnt_Scrts_abt_exp Indicates the number of client secrets that will be expiring within the duration specified against the Expiry Days Limit parameter. Number Ideally, the value of this measure should be 0. A non-zero value is a cause for concern.

Use the detailed diagnosis of this measure to know which client secrets are about to expire, when, which apps use them, and what permissions the apps have. With the help of this information, you can initiate measures to avert security disasters that may occur in the event that the secrets do expire.
bth_Crtfct_Clnt Indicates the number of app registrations authenticated using both certificates and client secrets. Number  
AppregCrtdWtnRcntDs Indicates the number of apps that were registered during the last measurement period. Number The detailed diagnosis of this measure reveals the names of the recently registered apps, their IDs, when they were created, and what permissions were granted to them.
CrtfctCrtdWtnRcntDs Indicates the number of certificates that were created during the last measurement period. Number UThe detailed diagnosis of this measure reveals the ID and expiry date of the certificates that were created recently, and which applications are currently using these certificates.
ClntScrtCrtdWtnRcntDs Indicates the number of client secrets that were created during the last measurement period. Number The detailed diagnosis of this measure reveals name the and expiry date of the client secrets that were created recently, and which applications are currently using these secrets.