CYFIRMA - Social and Public Exposure - Confidential Files Information Exposure Rule
| Id | a2984be5-8d69-4139-b98f-e89c9c421c27 |
| Rulename | CYFIRMA - Social and Public Exposure - Confidential Files Information Exposure Rule |
| Description | “This rule detects Medium-severity alerts from CYFIRMA regarding exposure of confidential files or forms linked to internal or client-related information, publicly accessible on platforms. These exposures could lead to data leakage, compliance violations, or targeted attacks.” |
| Severity | Medium |
| Tactics | InitialAccess Exfiltration Collection Reconnaissance |
| Techniques | T1189 T1213 T1593 T1567.002 |
| Required data connectors | CyfirmaDigitalRiskAlertsConnector |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Digital Risk/Analytic Rules/SPEConfidentialFilesMediumRule.yaml |
| Version | 1.0.1 |
| Arm template | a2984be5-8d69-4139-b98f-e89c9c421c27.json |
// Medium severity - Social and Public Exposure - Confidential Files Information Exposure
let timeFrame = 5m;
CyfirmaSPEConfidentialFilesAlerts_CL
| where severity == 'High' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=signature,
Impact=impact,
Recommendation=recommendation,
ProviderName='CYFIRMA',
ProductName='DeCYFIR/DeTCT',
AlertTitle=Alert_title
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
ProductName,
ProviderName,
AlertTitle
name: CYFIRMA - Social and Public Exposure - Confidential Files Information Exposure Rule
alertDetailsOverride:
alertDynamicProperties:
- value: ProductName
alertProperty: ProductName
- value: ProviderName
alertProperty: ProviderName
alertDisplayNameFormat: 'Cyfirma - Medium Severity Alert: Confidential Files Information Exposure on Public Platforms - {{AlertTitle}} '
alertDescriptionFormat: '{{Description}} '
version: 1.0.1
triggerThreshold: 0
id: a2984be5-8d69-4139-b98f-e89c9c421c27
triggerOperator: gt
query: |
// Medium severity - Social and Public Exposure - Confidential Files Information Exposure
let timeFrame = 5m;
CyfirmaSPEConfidentialFilesAlerts_CL
| where severity == 'High' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=signature,
Impact=impact,
Recommendation=recommendation,
ProviderName='CYFIRMA',
ProductName='DeCYFIR/DeTCT',
AlertTitle=Alert_title
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
ProductName,
ProviderName,
AlertTitle
description: |
"This rule detects Medium-severity alerts from CYFIRMA regarding exposure of confidential files or forms linked to internal or client-related information, publicly accessible on platforms.
These exposures could lead to data leakage, compliance violations, or targeted attacks."
kind: Scheduled
queryFrequency: 5m
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Digital Risk/Analytic Rules/SPEConfidentialFilesMediumRule.yaml
severity: Medium
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: PT5H
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
queryPeriod: 5m
requiredDataConnectors:
- dataTypes:
- CyfirmaSPEConfidentialFilesAlerts_CL
connectorId: CyfirmaDigitalRiskAlertsConnector
status: Available
customDetails:
UID: UID
TimeGenerated: TimeGenerated
AlertUID: AlertUID
FirstSeen: FirstSeen
LastSeen: LastSeen
Description: Description
Impact: Impact
AssetType: AssetType
AssetValue: AssetValue
RiskScore: RiskScore
Recommendation: Recommendation
eventGroupingSettings:
aggregationKind: AlertPerResult
relevantTechniques:
- T1189
- T1213
- T1593
- T1567.002
tactics:
- InitialAccess
- Exfiltration
- Collection
- Reconnaissance