Update the Security Finding class with attributes from the Splunk Detection Report extension class (Part 2) #491
Replies: 3 comments 7 replies
-
|
Beta Was this translation helpful? Give feedback.
-
Can I suggest instead of the field being called "rule", it be called "analytic" or perhaps "detection", as it makes this change more flexible to be able to encode references to detection methods that are not rule-based, such as behavioural detections or ML detections. |
Beta Was this translation helpful? Give feedback.
-
In this proposal, there are three enumerations, each with a different number of values. I worry that different vendors are going to have different concepts or buckets for these values that will not be compatible. Would it be better to produce a standardized mapping of what level a number between 0-100 is? |
Beta Was this translation helpful? Give feedback.
-
Refer to Discussion/Proposal #490 for Part 1 and set 1 of the attributes. This proposal considers set 2.
All attributes are Optional or Recommended (non-breaking additions).
Add the following attributes to the Security Finding class:
Set 2:
(Note:
confidence
is present as a Base Event attribute: "The confidence of the reported event severity as a percentage: 0%-100%." It is the sibling in this proposal for the newconfidence_id
with the same specific usage.)Additional New attributes:
confidence_id
enum [Unknown, Low, Medium, High, Other]impact
integer [0-100] -- integer sibling, ascending numeric range from Low to Fatalimpact_id
enum [Unknown, Low, Medium, High, Critical, Other]data_sources
array of Strings -- which products or sources contributed to the findingevidence
JSON -- the data the Finding exposes to the analystanalytic
Analytic -- the rule, statistic, behavioral or ML algorithm used (new object, subsumes Rule)Additional standard attributes:
risk_level_id
enum [Unknown, Low, Medium, High, Critical, Other]risk_level
String sibling ---
rule
Rule object subsumed by the new Analytic object based on RulePer further discussion below 2/28/2023, the following modifications to the proposal:
The
impact_id
enum in the Splunk extension included a Fatal value. Removed for this core class proposal to matchrisk_level_id
. (The Splunk extension can override to add Fatal). However, the cutoff points in the range cannot be standardized (i.e. some vendors may use probabilistic quantiles that are not equally spaced for the numeric range mappings).I will add a separate proposal to consider the addition of an Analytic object, and associated attribute for the class, in addition to Rule. Along with that, a discriminator enum that calls out whether the Finding was due to a rule or the analytic (e.g. anomaly detection, behavioral, ML etc.). The combination of the two in the class with a discriminator enum captures the Detection concept without adding another level (and is more compatible with the Splunk extension).
In this way, the current proposal does not need to be re-voted.
5 votes ·
Beta Was this translation helpful? Give feedback.
All reactions