Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Theom - Dev secrets unencrypted

Back
Idf2490f5b-269c-471d-9ff4-475f62ea498e
RulenameTheom - Dev secrets unencrypted
Description“Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0001 (Developer secrets have been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)”
SeverityHigh
TacticsCredentialAccess
TechniquesT1552
Required data connectorsTheom
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0001_Dev_secrets_unencrypted.yaml
Version1.0.2
Arm templatef2490f5b-269c-471d-9ff4-475f62ea498e.json
Deploy To Azure
TheomAlerts_CL
  | where customProps_RuleId_s == "TRIS0001" and (priority_s == "P1" or priority_s == "P2")
alertDetailsOverride:
  alertDisplayNameFormat: 'Theom Alert ID: {{id_s}} '
  alertDescriptionFormat: |2

    Summary: {{summary_s}}  
    Additional info: {{details_s}}
    Please investigate further on Theom UI at {{deepLink_s}}
requiredDataConnectors:
- connectorId: Theom
  dataTypes:
  - TheomAlerts_CL
tactics:
- CredentialAccess
description: |
    "Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0001 (Developer secrets have been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)"
query: |
  TheomAlerts_CL
    | where customProps_RuleId_s == "TRIS0001" and (priority_s == "P1" or priority_s == "P2")  
id: f2490f5b-269c-471d-9ff4-475f62ea498e
triggerOperator: gt
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1552
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0001_Dev_secrets_unencrypted.yaml
queryFrequency: 5m
severity: High
entityMappings:
- fieldMappings:
  - columnName: customProps_AssetName_s
    identifier: Name
  entityType: CloudApplication
- fieldMappings:
  - columnName: deepLink_s
    identifier: Url
  entityType: URL
name: Theom - Dev secrets unencrypted
queryPeriod: 5m
kind: Scheduled
triggerThreshold: 0
version: 1.0.2
status: Available
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/f2490f5b-269c-471d-9ff4-475f62ea498e')]",
      "kind": "Scheduled",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/f2490f5b-269c-471d-9ff4-475f62ea498e')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "\nSummary: {{summary_s}}  \nAdditional info: {{details_s}}\nPlease investigate further on Theom UI at {{deepLink_s}}\n",
          "alertDisplayNameFormat": "Theom Alert ID: {{id_s}} "
        },
        "alertRuleTemplateName": "f2490f5b-269c-471d-9ff4-475f62ea498e",
        "customDetails": null,
        "description": "\"Creates Sentinel incidents for critical/high Theom risks, associated with ruleId TRIS0001 (Developer secrets have been observed in unencrypted data stores. Encrypt data at rest to comply with this CIS requirement)\"\n",
        "displayName": "Theom - Dev secrets unencrypted",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "CloudApplication",
            "fieldMappings": [
              {
                "columnName": "customProps_AssetName_s",
                "identifier": "Name"
              }
            ]
          },
          {
            "entityType": "URL",
            "fieldMappings": [
              {
                "columnName": "deepLink_s",
                "identifier": "Url"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Theom/Analytic Rules/TRIS0001_Dev_secrets_unencrypted.yaml",
        "query": "TheomAlerts_CL\n  | where customProps_RuleId_s == \"TRIS0001\" and (priority_s == \"P1\" or priority_s == \"P2\")\n",
        "queryFrequency": "PT5M",
        "queryPeriod": "PT5M",
        "severity": "High",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT1H",
        "suppressionEnabled": false,
        "tactics": [
          "CredentialAccess"
        ],
        "techniques": [
          "T1552"
        ],
        "templateVersion": "1.0.2",
        "triggerOperator": "GreaterThan",
        "triggerThreshold": 0
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}