Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Postman API Exposure Detection

Back
Id99ca8956-5aad-4542-9fbc-8254182b424d
RulenameCyble Vision Alerts Postman API Exposure Detection
DescriptionDetects exposed Postman requests, collections or endpoints referencing monitored entities. Alerts analysts to possible API enumeration, leaked endpoints, or unintended exposure.
SeverityLow
TacticsReconnaissance
CredentialAccess
Exfiltration
TechniquesT1595
T1552
T1041
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Postman.yaml
Version1.0.0
Arm template99ca8956-5aad-4542-9fbc-8254182b424d.json
Deploy To Azure
Alerts_postman  
| where Service == "postman"
| extend MappedSeverity = Severity
name: Cyble Vision Alerts Postman API Exposure Detection
id: 99ca8956-5aad-4542-9fbc-8254182b424d
enabled: true
entityMappings:
- fieldMappings:
  - columnName: PM_Url
    identifier: Url
  entityType: Url
- fieldMappings:
  - columnName: KeywordName
    identifier: HostName
  entityType: Host
version: 1.0.0
triggerOperator: GreaterThan
query: |
  Alerts_postman  
  | where Service == "postman"
  | extend MappedSeverity = Severity  
description: |
    'Detects exposed Postman requests, collections or endpoints referencing monitored entities. Alerts analysts to possible API enumeration, leaked endpoints, or unintended exposure.'
kind: Scheduled
queryfrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Postman.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  alertDisplayNameFormat: Exposed Postman API Request {{PM_Title}}
  alertDetailsOverride: 
  alertDescriptionFormat: |
        A Postman API request referencing monitored entity {{KeywordName}} was discovered. Public Workspace {{PM_IsPublic}}. Developer {{PM_DevelopedBy}}. This may indicate exposed API endpoints, leaked request parameters or sensitive testing data.
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  AlertID: AlertID
  PM_Category: PM_Category
  PM_Url: PM_Url
  PM_Title: PM_Title
  Service: Service
  PM_PostmanKey: PM_PostmanKey
  Status: Status
  PM_DevelopedByUrl: PM_DevelopedByUrl
  MappedSeverity: Severity
  PM_DevelopedBy: PM_DevelopedBy
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1595
- T1552
- T1041
tactics:
- Reconnaissance
- CredentialAccess
- Exfiltration