Cyble Vision Alerts Bitbucket
| Id | f3c25011-4509-41c8-be27-35d891531c39 |
| Rulename | Cyble Vision Alerts Bitbucket |
| Description | Detects exposed secrets in Bitbucket repositories using the Alerts_bit_bucket parser. Creates one incident per matched secret. Includes decoder, detector, commit, file, and repository context for SOC triage. |
| Severity | Low |
| Tactics | CredentialAccess Exfiltration Discovery |
| Techniques | T1552 T1537 T1083 |
| Required data connectors | CybleVisionAlerts |
| Kind | Scheduled |
| Query frequency | 30m |
| Query period | 30m |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_BitBucket.yaml |
| Version | 1.0.0 |
| Arm template | f3c25011-4509-41c8-be27-35d891531c39.json |
Alerts_bit_bucket
| where Service == "bit_bucket"
| extend MappedSeverity = Severity
name: Cyble Vision Alerts Bitbucket
alertDetailsOverride:
alertDisplayNameFormat: Secret Exposure in Bitbucket {{BB_File}} ({{BB_DetectorName}})
alertDescriptionFormat: |
A sensitive secret was detected in Bitbucket repository {{BB_Repository}}. File {{BB_File}}:{{BB_Line}}. Investigator should verify exposure, rotate credentials and remediate impacted systems.
id: f3c25011-4509-41c8-be27-35d891531c39
enabled: true
entityMappings:
- fieldMappings:
- columnName: BB_Repository
identifier: Url
entityType: Url
- fieldMappings:
- columnName: BB_Link
identifier: Url
entityType: Url
- fieldMappings:
- columnName: BB_File
identifier: Name
- columnName: KeywordName
identifier: Directory
entityType: File
version: 1.0.0
triggerOperator: GreaterThan
query: |
Alerts_bit_bucket
| where Service == "bit_bucket"
| extend MappedSeverity = Severity
description: |
'Detects exposed secrets in Bitbucket repositories using the Alerts_bit_bucket parser. Creates one incident per matched secret. Includes decoder, detector, commit, file, and repository context for SOC triage.'
kind: Scheduled
queryFrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_BitBucket.yaml
severity: Low
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: PT5H
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
- CybleVisionAlerts_CL
connectorId: CybleVisionAlerts
status: Available
customDetails:
MappedSeverity: Severity
BB_File: BB_File
BB_DetectorName: BB_DetectorName
BB_Commit: BB_Commit
AlertID: AlertID
BB_Email: BB_Email
BB_Line: BB_Line
Service: Service
BB_Verified: BB_Verified
BB_RotationGuide: BB_RotationGuide
BB_Link: BB_Link
Status: Status
BB_Raw: BB_Raw
BB_Repository: BB_Repository
eventGroupingSettings:
aggregationKind: AlertPerResult
relevantTechniques:
- T1552
- T1537
- T1083
tactics:
- CredentialAccess
- Exfiltration
- Discovery