Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Theom - National IDs unencrypted

Back
Ida655f6d1-4ffa-4bc9-8b5d-2ec31cad09d4
RulenameTheom - National IDs unencrypted
Description“Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0002 (National IDs have been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)”
SeverityHigh
TacticsCollection
TechniquesT1213
T1530
Required data connectorsTheom
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0002_National_IDs_unencrypted.yaml
Version1.0.2
Arm templatea655f6d1-4ffa-4bc9-8b5d-2ec31cad09d4.json
Deploy To Azure
TheomAlerts_CL
  | where customProps_RuleId_s == "TRIS0002" and (priority_s == "P1" or priority_s == "P2")
requiredDataConnectors:
- connectorId: Theom
  dataTypes:
  - TheomAlerts_CL
severity: High
queryPeriod: 5m
name: Theom - National IDs unencrypted
tactics:
- Collection
status: Available
kind: Scheduled
id: a655f6d1-4ffa-4bc9-8b5d-2ec31cad09d4
entityMappings:
- fieldMappings:
  - columnName: customProps_AssetName_s
    identifier: Name
  entityType: CloudApplication
- fieldMappings:
  - columnName: deepLink_s
    identifier: Url
  entityType: URL
triggerOperator: gt
alertDetailsOverride:
  alertDisplayNameFormat: 'Theom Alert ID: {{id_s}} '
  alertDescriptionFormat: |2

    Summary: {{summary_s}}  
    Additional info: {{details_s}}
    Please investigate further on Theom UI at {{deepLink_s}}
version: 1.0.2
queryFrequency: 5m
eventGroupingSettings:
  aggregationKind: AlertPerResult
triggerThreshold: 0
description: |
    "Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0002 (National IDs have been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)"
relevantTechniques:
- T1213
- T1530
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0002_National_IDs_unencrypted.yaml
query: |
  TheomAlerts_CL
    | where customProps_RuleId_s == "TRIS0002" and (priority_s == "P1" or priority_s == "P2")  
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/a655f6d1-4ffa-4bc9-8b5d-2ec31cad09d4')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/a655f6d1-4ffa-4bc9-8b5d-2ec31cad09d4')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "\nSummary: {{summary_s}}  \nAdditional info: {{details_s}}\nPlease investigate further on Theom UI at {{deepLink_s}}\n",
          "alertDisplayNameFormat": "Theom Alert ID: {{id_s}} "
        },
        "alertRuleTemplateName": "a655f6d1-4ffa-4bc9-8b5d-2ec31cad09d4",
        "customDetails": null,
        "description": "\"Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0002 (National IDs have been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)\"\n",
        "displayName": "Theom - National IDs unencrypted",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "CloudApplication",
            "fieldMappings": [
              {
                "columnName": "customProps_AssetName_s",
                "identifier": "Name"
              }
            ]
          },
          {
            "entityType": "URL",
            "fieldMappings": [
              {
                "columnName": "deepLink_s",
                "identifier": "Url"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0002_National_IDs_unencrypted.yaml",
        "query": "TheomAlerts_CL\n  | where customProps_RuleId_s == \"TRIS0002\" and (priority_s == \"P1\" or priority_s == \"P2\")\n",
        "queryFrequency": "PT5M",
        "queryPeriod": "PT5M",
        "severity": "High",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [
          "Collection"
        ],
        "techniques": [
          "T1213",
          "T1530"
        ],
        "templateVersion": "1.0.2",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}