A digital document, which highlights information such as the owner's identity, used to instill trust in public keys used while encrypting network communications
Certificate Registration refers to the collection and analysis of information about digital certificates, including current, revoked, and expired certificates. Sources such as Certificate Transparency logs and other public resources provide visibility into certificates issued for specific domains or organizations. Monitoring certificate registrations can help identify potential misuse, such as unauthorized certificates or signs of adversary reconnaissance. Examples:
This data component can be collected through the following measures:
Use Certificate Transparency Monitors
Analyze Certificate Revocation Sources
Leverage Public Scanning Tools
Automate Certificate Monitoring
Integrate with Threat Intelligence
Certificate Registration refers to the collection and analysis of information about digital certificates, including current, revoked, and expired certificates. Sources such as Certificate Transparency logs and other public resources provide visibility into certificates issued for specific domains or organizations. Monitoring certificate registrations can help identify potential misuse, such as unauthorized certificates or signs of adversary reconnaissance. Examples:
This data component can be collected through the following measures:
Use Certificate Transparency Monitors
Analyze Certificate Revocation Sources
Leverage Public Scanning Tools
Automate Certificate Monitoring
Integrate with Threat Intelligence
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1588 | Obtain Capabilities |
Consider use of services that may aid in the tracking of newly issued certificates and/or certificates in use on sites across the Internet. In some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure.[1] Some server-side components of adversary tools may have default values set for SSL/TLS certificates.[2] Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Defense Evasion or Command and Control. |
|
.004 | Digital Certificates |
Consider use of services that may aid in the tracking of newly issued certificates and/or certificates in use on sites across the Internet. In some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure.[1] Some server-side components of adversary tools may have default values set for SSL/TLS certificates.[2] |