Skip to content

Commit b43a188

Browse files
DET-1139: Added the correct example
1 parent 63c47ee commit b43a188

File tree

1 file changed

+56
-21
lines changed

1 file changed

+56
-21
lines changed

website/docs/r/cse_outlier_rule.html.markdown

Lines changed: 56 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
___
1+
---
22
layout: "sumologic"
33
page_title: "SumoLogic: sumologic_cse_outlier_rule"
44
description: |-
@@ -10,31 +10,66 @@ Provides a Sumo Logic CSE [Outlier Rule](https://help.sumologic.com/docs/cse/rul
1010

1111
## Example Usage
1212
```hcl
13-
resource "sumologic_cse_first_seen_rule" "first_seen_rule" {
13+
resource "sumologic_cse_outlier_rule" "sample_outlier_rule_1" {
14+
name = "(Sample) Azure DevOps - Outlier in Pools Deleted Rapidly"
15+
name_expression = "Azure DevOps - Outlier in Agent Pools Deleted in an Hour"
16+
17+
description_expression = <<-EOT
18+
Context:
19+
An Attacker with sufficient administrative access to Azure DevOps (ADO) may abuse this access to destroy existing resources by deleting pools.
20+
21+
Detection:
22+
This detection identifies statistical outliers in user behavior for the number of pools deleted in an hourly window.
23+
24+
Recommended Actions:
25+
If an alert occurs, investigate the actions taken by the account to determine if this is normal operation of deleting pools or if this suspicious activity.
26+
27+
Tuning Recommendations:
28+
Determine if the baseline basis should be hourly or daily based on normal activity in your organization.
29+
If the detection is proving to be too sensitive to the number of pools deleted, adjust the floor value (currently 3) to a number that is less sensitive but within reason. Use Sumo Search using a count and the _timeslice function to aggregate on the number of pools deleted within the hourly (or daily) periods to find what is an acceptable level of activity to not alert on.
30+
EOT
31+
32+
enabled = true
33+
34+
baseline_window_size = "2592000000"
35+
floor_value = 3
36+
deviation_threshold = 3
37+
38+
group_by_fields = [
39+
"user_username",
40+
]
41+
42+
is_prototype = false
43+
match_expression = <<-EOT
44+
metadata_vendor = "Microsoft"
45+
AND metadata_product = "Azure DevOps Auditing"
46+
AND metadata_deviceEventId = "AzureDevOpsAuditEvent"
47+
AND action = "Library.AgentPoolDeleted"
48+
EOT
49+
50+
retention_window_size = "7776000000"
51+
window_size = "T60M"
52+
53+
severity = 3
54+
summary_expression = "User: {{user_username}} has deleted an abnormal amount of Agent Pools within an hour"
55+
1456
aggregation_functions {
15-
name = "total"
16-
function = "count"
17-
arguments = ["true"]
57+
arguments = [
58+
"true",
59+
]
60+
function = "count"
61+
name = "current"
1862
}
19-
baseline_window_size = "1209600000" // 14 days
20-
description_expression = "Spike in Login Failures - {{ user_username }}"
21-
enabled = true
63+
2264
entity_selectors {
2365
entity_type = "_username"
24-
expression = "user_username"
66+
expression = "user_username"
2567
}
26-
floor_value = 0
27-
deviation_threshold = 3
28-
group_by_fields = ["user_username"]
29-
is_prototype = false
30-
match_expression = "objectType=\"Authentication\" AND success=false"
31-
name = "Spike in Login Failures"
32-
name_expression = "Spike in Login Failures - {{ user_username }}"
33-
retention_window_size = "7776000000" // 90 days
34-
severity = 1
35-
summary_expression = "Spike in Login Failures - {{ user_username }}"
36-
window_size = "T24H"
37-
suppression_window_size = 90000000
68+
69+
tags = [
70+
"_mitreAttackTechnique:T1578.002",
71+
"_mitreAttackTactic:TA0005",
72+
]
3873
}
3974
```
4075
## Argument Reference

0 commit comments

Comments
 (0)