Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Theom - Unencrypted public data stores

Back
Id6b93d8b1-40cf-4973-adaa-6f240df21ff1
RulenameTheom - Unencrypted public data stores
Description“Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0005 (Theom has observed data stores that are both unencrypted and publicly accessible. Review if the data store and the data within should be publicly accessible. Additionally, encrypt the data at rest to comply with these CIS requirements)”
SeverityHigh
TacticsCollection
TechniquesT1213
T1530
Required data connectorsTheom
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0005_Unencrypted_public_data_stores.yaml
Version1.0.2
Arm template6b93d8b1-40cf-4973-adaa-6f240df21ff1.json
Deploy To Azure
TheomAlerts_CL
  | where customProps_RuleId_s == "TRIS0005" and (priority_s == "P1" or priority_s == "P2")
entityMappings:
- entityType: CloudApplication
  fieldMappings:
  - columnName: customProps_AssetName_s
    identifier: Name
- entityType: URL
  fieldMappings:
  - columnName: deepLink_s
    identifier: Url
tactics:
- Collection
triggerOperator: gt
description: |
    "Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0005 (Theom has observed data stores that are both unencrypted and publicly accessible. Review if the data store and the data within should be publicly accessible. Additionally, encrypt the data at rest to comply with these CIS requirements)"
requiredDataConnectors:
- connectorId: Theom
  dataTypes:
  - TheomAlerts_CL
relevantTechniques:
- T1213
- T1530
version: 1.0.2
id: 6b93d8b1-40cf-4973-adaa-6f240df21ff1
alertDetailsOverride:
  alertDisplayNameFormat: 'Theom Alert ID: {{id_s}} '
  alertDescriptionFormat: |2

    Summary: {{summary_s}}  
    Additional info: {{details_s}}
    Please investigate further on Theom UI at {{deepLink_s}}
kind: Scheduled
query: |
  TheomAlerts_CL
    | where customProps_RuleId_s == "TRIS0005" and (priority_s == "P1" or priority_s == "P2")  
status: Available
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0005_Unencrypted_public_data_stores.yaml
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryFrequency: 5m
severity: High
name: Theom - Unencrypted public data stores
queryPeriod: 5m
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/6b93d8b1-40cf-4973-adaa-6f240df21ff1')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/6b93d8b1-40cf-4973-adaa-6f240df21ff1')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "\nSummary: {{summary_s}}  \nAdditional info: {{details_s}}\nPlease investigate further on Theom UI at {{deepLink_s}}\n",
          "alertDisplayNameFormat": "Theom Alert ID: {{id_s}} "
        },
        "alertRuleTemplateName": "6b93d8b1-40cf-4973-adaa-6f240df21ff1",
        "customDetails": null,
        "description": "\"Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0005 (Theom has observed data stores that are both unencrypted and publicly accessible. Review if the data store and the data within should be publicly accessible. Additionally, encrypt the data at rest to comply with these CIS requirements)\"\n",
        "displayName": "Theom - Unencrypted public data stores",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "CloudApplication",
            "fieldMappings": [
              {
                "columnName": "customProps_AssetName_s",
                "identifier": "Name"
              }
            ]
          },
          {
            "entityType": "URL",
            "fieldMappings": [
              {
                "columnName": "deepLink_s",
                "identifier": "Url"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0005_Unencrypted_public_data_stores.yaml",
        "query": "TheomAlerts_CL\n  | where customProps_RuleId_s == \"TRIS0005\" and (priority_s == \"P1\" or priority_s == \"P2\")\n",
        "queryFrequency": "PT5M",
        "queryPeriod": "PT5M",
        "severity": "High",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [
          "Collection"
        ],
        "techniques": [
          "T1213",
          "T1530"
        ],
        "templateVersion": "1.0.2",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}