Skip to content

Commit b48a088

Browse files
committed
Add query for indentifying old TLS version
1 parent 32f6f9b commit b48a088

File tree

2 files changed

+12
-1
lines changed

2 files changed

+12
-1
lines changed

articles/key-vault/general/monitor-key-vault.md

+11
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,17 @@ For a list of the tables used by Azure Monitor Logs and queryable by Log Analyti
8383
8484
Here are some queries that you can enter into the **Log search** bar to help you monitor your Key Vault resources. These queries work with the [new language](../../azure-monitor/logs/log-query-overview.md).
8585

86+
* Are there any clients using old TLS version (<1.2)?
87+
88+
```kusto
89+
AzureDiagnostics
90+
| where TimeGenerated > ago(90d)
91+
| where ResourceProvider =="MICROSOFT.KEYVAULT"
92+
| where isnotempty(tlsVersion_s) and strcmp(tlsVersion_s,"TLS1_2") <0
93+
| project TimeGenerated,Resource, OperationName, requestUri_s, CallerIPAddress, OperationVersion,clientInfo_s,tlsVersion_s,todouble(tlsVersion_s)
94+
| sort by TimeGenerated desc
95+
```
96+
8697
* Are there any slow requests?
8798
8899
```Kusto

articles/key-vault/general/security-features.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Azure Private Link Service enables you to access Azure Key Vault and Azure hoste
3838
- Despite known vulnerabilities in TLS protocol, there is no known attack that would allow a malicious agent to extract any information from your key vault when the attacker initiates a connection with a TLS version that has vulnerabilities. The attacker would still need to authenticate and authorize itself, and as long as legitimate clients always connect with recent TLS versions, there is no way that credentials could have been leaked from vulnerabilities at old TLS versions.
3939

4040
> [!NOTE]
41-
> For Azure Key Vault, ensure that the application accessing the Keyvault service should be running on a platform that supports TLS 1.2 or recent version. If the application is dependent on .Net framework, it should be updated as well. You can also make the registry changes mentioned in [this article](/troubleshoot/azure/active-directory/enable-support-tls-environment) to explicitly enable the use of TLS 1.2 at OS level and for .Net framework. To meet with compliance obligations and to improve security posture, Key Vault connections via TLS 1.0 & 1.1 are considered a security risk, and any connections using old TLS protocols will be disallowed in 2023.
41+
> For Azure Key Vault, ensure that the application accessing the Keyvault service should be running on a platform that supports TLS 1.2 or recent version. If the application is dependent on .Net framework, it should be updated as well. You can also make the registry changes mentioned in [this article](/troubleshoot/azure/active-directory/enable-support-tls-environment) to explicitly enable the use of TLS 1.2 at OS level and for .Net framework. To meet with compliance obligations and to improve security posture, Key Vault connections via TLS 1.0 & 1.1 are considered a security risk, and any connections using old TLS protocols will be disallowed in 2023. You can monitor TLS version used by clients by monitoring Key Vault logs with sample Kusto query [here](monitor-key-vault.md#sample-kusto-queries).
4242
4343
## Key Vault authentication options
4444

0 commit comments

Comments
 (0)