Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Postman API Exposure Detection

Back
Id99ca8956-5aad-4542-9fbc-8254182b424d
RulenameCyble Vision Alerts Postman API Exposure Detection
DescriptionDetects exposed Postman requests, collections or endpoints referencing monitored entities. Alerts analysts to possible API enumeration, leaked endpoints, or unintended exposure.
SeverityLow
TacticsReconnaissance
CredentialAccess
Exfiltration
TechniquesT1595
T1552
T1041
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Postman.yaml
Version1.0.0
Arm template99ca8956-5aad-4542-9fbc-8254182b424d.json
Deploy To Azure
Alerts_postman  
| where Service == "postman"
| extend MappedSeverity = Severity
status: Available
enabled: true
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Postman.yaml
version: 1.0.0
queryPeriod: 30m
query: |
  Alerts_postman  
  | where Service == "postman"
  | extend MappedSeverity = Severity  
kind: Scheduled
name: Cyble Vision Alerts Postman API Exposure Detection
triggerOperator: GreaterThan
severity: Low
eventGroupingSettings:
  aggregationKind: AlertPerResult
id: 99ca8956-5aad-4542-9fbc-8254182b424d
triggerThreshold: 0
entityMappings:
- entityType: Url
  fieldMappings:
  - identifier: Url
    columnName: PM_Url
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: KeywordName
queryfrequency: 30m
description: |
    'Detects exposed Postman requests, collections or endpoints referencing monitored entities. Alerts analysts to possible API enumeration, leaked endpoints, or unintended exposure.'
requiredDataConnectors:
- connectorId: CybleVisionAlerts
  dataTypes:
  - CybleVisionAlerts_CL
incidentConfiguration:
  alertDetailsOverride: 
  createIncident: true
  groupingConfiguration:
    enabled: false
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
  alertDisplayNameFormat: Exposed Postman API Request {{PM_Title}}
  alertDescriptionFormat: |
        A Postman API request referencing monitored entity {{KeywordName}} was discovered. Public Workspace {{PM_IsPublic}}. Developer {{PM_DevelopedBy}}. This may indicate exposed API endpoints, leaked request parameters or sensitive testing data.
customDetails:
  PM_DevelopedBy: PM_DevelopedBy
  Service: Service
  MappedSeverity: Severity
  PM_Category: PM_Category
  PM_DevelopedByUrl: PM_DevelopedByUrl
  Status: Status
  PM_PostmanKey: PM_PostmanKey
  AlertID: AlertID
  PM_Title: PM_Title
  PM_Url: PM_Url
relevantTechniques:
- T1595
- T1552
- T1041
tactics:
- Reconnaissance
- CredentialAccess
- Exfiltration