Podcast
Root Causes 291: CLM and SIEM


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 3, 2023
We discuss how Certificate Lifecycle Management (CLM) interacts with Security Incident and Event Management (SIEM). The certificate world is chock full of events such as renewals, revocations, admin logins, and provisioning and removal of employee access. We talk about expected behaviors in the CLM and monitoring them.
Podcast Transcript
Lightly edited for flow and brevity.
And think about what are some of the important events that happen that you might want to cross-reference within your SIEM. There’s a lot of things you can do once you have those events logs within a SIEM.
We were just talking very recently with one of our developer managers about the fact that we keep those logs for customers for an awfully long time. And then the question is, should we? Because what happens if even at the customer side there’s some kind of a breach of logs and people can start getting insight about timings of issuance and things like this and processes. So, that’s one side but I think the most important side right now - because that’s the esoteric thing that we could go down the rabbit hole. We are gonna go down in the future. Right now, let’s keep it real simple and talk about just issuance itself.
So, in other words, events such publicly trusted issuance trigger points. So, in other words, if your company knows that they are on 90-day certificates or one-year certificates and you have a policy of renewing those slightly less than a year, slightly less than 90 days, geez.
For other types of things, if you have administrators logging into your certificate lifecycle management system, then logging those log in events because whoever is logging into that CLM, that’s a sensitive event and you want to know, hey, just simple questions. Is that time of day it happened correct? I'm certainly way, way oversimplifying what’s capable from a statement and event log and those of you who are tracking these kinds of things, I’m just bringing up the simple administration logging event, is a very, very key event.
And so, therefore, let’s actually see what happens, log what’s going on. I would even go so far as to say various kinds of the typical things in a certificate lifecycle management system such as changing administrators, you know, provisioning somebody new. At the administrator level, that’s all human level stuff that’s pretty basic. But I’ll say to you that in good certificate lifecycle management systems, if you know that your Microsoft CA system really should never be logged into except for extreme disaster recovery events, because you have a certificate lifecycle management system that’s augmenting it and then all of the sudden you start to see administrator activity, well, there’s your red flag.
So, what’s the worst – not just the worst practice because sometimes it could be a legitimate practice – but if it doesn’t have to be this way, then change your habits. And that is, the less random your events are, if they are kind of planned out then, for example, you only log into your CLM at certain times. You only do your provisioning of laptops that invokes private certificates at a certain time. That may not be possible. It might have to be random. But, even if you had to do it throughout the day, plan on doing it on the half hour. And then all of the sudden, if anything else happens beyond those kinds of times maybe your SIEM can help you to determine, hey, this is not a qualified time for this to be happening. There must be an exception that we can log.
So the most complex things and where SIEM kind of doesn’t help as much is when you have kind of random events happening probably in working hours that are normal practice. It becomes difficult. There are other contexts. For example, if a CLM administrator that happens to be logging in from a known HR location, maybe the HR doesn’t do this kind of work and so you can find that. Hopefully you don’t have as flat of a network as that but keep in mind there’s a lot of other IT things to be done here to help to get those kinds of things locked down. But the less random your CLM and PKI events are – because they are so darn critical, Tim – then SIEM can help you and help you from those event logs, from those systems to be able to create a higher contrast of legitimate to illegitimate activity.

