TheomAlerts_CL
| where customProps_RuleId_s == "TRIS0005" and (priority_s == "P1" or priority_s == "P2")
triggerThreshold: 0
name: Theom - Unencrypted public data stores
status: Available
eventGroupingSettings:
aggregationKind: AlertPerResult
severity: High
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0005_Unencrypted_public_data_stores.yaml
entityMappings:
- entityType: CloudApplication
fieldMappings:
- columnName: customProps_AssetName_s
identifier: Name
- entityType: URL
fieldMappings:
- columnName: deepLink_s
identifier: Url
queryPeriod: 5m
queryFrequency: 5m
version: 1.0.1
triggerOperator: gt
description: |
"Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0005 (Theom has observed data stores that are both unencrypted and publicly accessible. Review if the data store and the data within should be publicly accessible. Additionally, encrypt the data at rest to comply with these CIS requirements)"
query: |
TheomAlerts_CL
| where customProps_RuleId_s == "TRIS0005" and (priority_s == "P1" or priority_s == "P2")
id: 6b93d8b1-40cf-4973-adaa-6f240df21ff1
requiredDataConnectors:
- dataTypes:
- TheomAlerts_CL
connectorId: Theom
alertDetailsOverride:
alertDisplayNameFormat: 'Theom Alert ID: {{id_s}} '
alertDescriptionFormat: |2
Summary: {{summary_s}}
Additional info: {{details_s}}
Please investigate further on Theom UI at {{deepLink_s}}
kind: Scheduled
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"workspace": {
"type": "String"
}
},
"resources": [
{
"apiVersion": "2023-02-01-preview",
"id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/6b93d8b1-40cf-4973-adaa-6f240df21ff1')]",
"kind": "Scheduled",
"name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/6b93d8b1-40cf-4973-adaa-6f240df21ff1')]",
"properties": {
"alertDetailsOverride": {
"alertDescriptionFormat": "\nSummary: {{summary_s}} \nAdditional info: {{details_s}}\nPlease investigate further on Theom UI at {{deepLink_s}}\n",
"alertDisplayNameFormat": "Theom Alert ID: {{id_s}} "
},
"alertRuleTemplateName": "6b93d8b1-40cf-4973-adaa-6f240df21ff1",
"customDetails": null,
"description": "\"Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0005 (Theom has observed data stores that are both unencrypted and publicly accessible. Review if the data store and the data within should be publicly accessible. Additionally, encrypt the data at rest to comply with these CIS requirements)\"\n",
"displayName": "Theom - Unencrypted public data stores",
"enabled": true,
"entityMappings": [
{
"entityType": "CloudApplication",
"fieldMappings": [
{
"columnName": "customProps_AssetName_s",
"identifier": "Name"
}
]
},
{
"entityType": "URL",
"fieldMappings": [
{
"columnName": "deepLink_s",
"identifier": "Url"
}
]
}
],
"eventGroupingSettings": {
"aggregationKind": "AlertPerResult"
},
"OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0005_Unencrypted_public_data_stores.yaml",
"query": "TheomAlerts_CL\n | where customProps_RuleId_s == \"TRIS0005\" and (priority_s == \"P1\" or priority_s == \"P2\")\n",
"queryFrequency": "PT5M",
"queryPeriod": "PT5M",
"severity": "High",
"status": "Available",
"suppressionDuration": "PT1H",
"suppressionEnabled": false,
"templateVersion": "1.0.1",
"triggerOperator": "GreaterThan",
"triggerThreshold": 0
},
"type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
}
]
}