Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Theom - Financial data unencrypted

Back
Idb568d2fb-b73c-4e6a-88db-2093457712af
RulenameTheom - Financial data unencrypted
Description“Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0003 (Financial data has been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)”
SeverityHigh
TacticsCollection
TechniquesT1213
T1530
Required data connectorsTheom
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0003_Financial_data_unencrypted.yaml
Version1.0.2
Arm templateb568d2fb-b73c-4e6a-88db-2093457712af.json
Deploy To Azure
TheomAlerts_CL
  | where customProps_RuleId_s == "TRIS0003" and (priority_s == "P1" or priority_s == "P2")
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0003_Financial_data_unencrypted.yaml
query: |
  TheomAlerts_CL
    | where customProps_RuleId_s == "TRIS0003" and (priority_s == "P1" or priority_s == "P2")  
description: |
    "Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0003 (Financial data has been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)"
severity: High
requiredDataConnectors:
- dataTypes:
  - TheomAlerts_CL
  connectorId: Theom
eventGroupingSettings:
  aggregationKind: AlertPerResult
name: Theom - Financial data unencrypted
triggerThreshold: 0
version: 1.0.2
tactics:
- Collection
alertDetailsOverride:
  alertDescriptionFormat: |2

    Summary: {{summary_s}}  
    Additional info: {{details_s}}
    Please investigate further on Theom UI at {{deepLink_s}}
  alertDisplayNameFormat: 'Theom Alert ID: {{id_s}} '
relevantTechniques:
- T1213
- T1530
triggerOperator: gt
entityMappings:
- entityType: CloudApplication
  fieldMappings:
  - columnName: customProps_AssetName_s
    identifier: Name
- entityType: URL
  fieldMappings:
  - columnName: deepLink_s
    identifier: Url
id: b568d2fb-b73c-4e6a-88db-2093457712af
status: Available
kind: Scheduled
queryFrequency: 5m
queryPeriod: 5m
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/b568d2fb-b73c-4e6a-88db-2093457712af')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/b568d2fb-b73c-4e6a-88db-2093457712af')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "\nSummary: {{summary_s}}  \nAdditional info: {{details_s}}\nPlease investigate further on Theom UI at {{deepLink_s}}\n",
          "alertDisplayNameFormat": "Theom Alert ID: {{id_s}} "
        },
        "alertRuleTemplateName": "b568d2fb-b73c-4e6a-88db-2093457712af",
        "customDetails": null,
        "description": "\"Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0003 (Financial data has been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)\"\n",
        "displayName": "Theom - Financial data unencrypted",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "CloudApplication",
            "fieldMappings": [
              {
                "columnName": "customProps_AssetName_s",
                "identifier": "Name"
              }
            ]
          },
          {
            "entityType": "URL",
            "fieldMappings": [
              {
                "columnName": "deepLink_s",
                "identifier": "Url"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0003_Financial_data_unencrypted.yaml",
        "query": "TheomAlerts_CL\n  | where customProps_RuleId_s == \"TRIS0003\" and (priority_s == \"P1\" or priority_s == \"P2\")\n",
        "queryFrequency": "PT5M",
        "queryPeriod": "PT5M",
        "severity": "High",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [
          "Collection"
        ],
        "techniques": [
          "T1213",
          "T1530"
        ],
        "templateVersion": "1.0.2",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}