Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Theom - Dev secrets exposed

Back
Id65200844-e161-47a7-a103-f61f7e3afe30
RulenameTheom - Dev secrets exposed
Description“Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0012 (Theom has observed developer secrets in a data store that is publicly exposed. As per this requirement, use this information to apply data access control lists or access permissions to secure your data)”
SeverityHigh
Required data connectorsTheom
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0012_Dev_secrets_exposed.yaml
Version1.0.1
Arm template65200844-e161-47a7-a103-f61f7e3afe30.json
Deploy To Azure
TheomAlerts_CL
  | where customProps_RuleId_s == "TRIS0012" and (priority_s == "P1" or priority_s == "P2")
status: Available
id: 65200844-e161-47a7-a103-f61f7e3afe30
name: Theom - Dev secrets exposed
kind: Scheduled
requiredDataConnectors:
- connectorId: Theom
  dataTypes:
  - TheomAlerts_CL
triggerOperator: gt
severity: High
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0012_Dev_secrets_exposed.yaml
eventGroupingSettings:
  aggregationKind: AlertPerResult
description: |
    "Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0012 (Theom has observed developer secrets in a data store that is publicly exposed. As per this requirement, use this information to apply data access control lists or access permissions to secure your data)"
queryPeriod: 5m
alertDetailsOverride:
  alertDisplayNameFormat: 'Theom Alert ID: {{id_s}} '
  alertDescriptionFormat: |2

    Summary: {{summary_s}}  
    Additional info: {{details_s}}
    Please investigate further on Theom UI at {{deepLink_s}}
queryFrequency: 5m
query: |
  TheomAlerts_CL
    | where customProps_RuleId_s == "TRIS0012" and (priority_s == "P1" or priority_s == "P2")  
version: 1.0.1
entityMappings:
- fieldMappings:
  - identifier: Name
    columnName: customProps_AssetName_s
  entityType: CloudApplication
- fieldMappings:
  - identifier: Url
    columnName: deepLink_s
  entityType: URL
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2023-02-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/65200844-e161-47a7-a103-f61f7e3afe30')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/65200844-e161-47a7-a103-f61f7e3afe30')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "\nSummary: {{summary_s}}  \nAdditional info: {{details_s}}\nPlease investigate further on Theom UI at {{deepLink_s}}\n",
          "alertDisplayNameFormat": "Theom Alert ID: {{id_s}} "
        },
        "alertRuleTemplateName": "65200844-e161-47a7-a103-f61f7e3afe30",
        "customDetails": null,
        "description": "\"Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0012 (Theom has observed developer secrets in a data store that is publicly exposed. As per this requirement, use this information to apply data access control lists or access permissions to secure your data)\"\n",
        "displayName": "Theom - Dev secrets exposed",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "CloudApplication",
            "fieldMappings": [
              {
                "columnName": "customProps_AssetName_s",
                "identifier": "Name"
              }
            ]
          },
          {
            "entityType": "URL",
            "fieldMappings": [
              {
                "columnName": "deepLink_s",
                "identifier": "Url"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0012_Dev_secrets_exposed.yaml",
        "query": "TheomAlerts_CL\n  | where customProps_RuleId_s == \"TRIS0012\" and (priority_s == \"P1\" or priority_s == \"P2\")\n",
        "queryFrequency": "PT5M",
        "queryPeriod": "PT5M",
        "severity": "High",
        "status": "Available",
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "templateVersion": "1.0.1",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}