From ed8e8ce16efbfac740233b6d716afa5a74228204 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?R=C3=B4mulo=20Farias?= Date: Fri, 20 Sep 2024 11:09:21 +0200 Subject: [PATCH 1/3] Create the event entities RFC on stage 0 --- rfcs/text/0000-event-entities.md | 107 +++++++++++++++++++++++++++++++ 1 file changed, 107 insertions(+) create mode 100644 rfcs/text/0000-event-entities.md diff --git a/rfcs/text/0000-event-entities.md b/rfcs/text/0000-event-entities.md new file mode 100644 index 0000000000..167dd340f5 --- /dev/null +++ b/rfcs/text/0000-event-entities.md @@ -0,0 +1,107 @@ +# 0000: Event Entities + +- Stage: **0 (strawperson)** +- Date: **TBD** + + +Elastic Cloud Security Team has been focusing on Cloud Detection and Response (CDR). One of the first steps towards the CDR vision is to enhance investigation workflows for the Cloud Security use-case in SIEM. + +As part of enhancing incidents and attacks investigation workflows, it's of great value to identify, represent and index which entities took part in an event and what is their role - which entity has triggered the action and which one was affected by the action? + +The set of changes proposed in this RFC enables better and easier data exploration, as well graphical representations of events through graphs - one of the desired CDR features. + + + + + +## Fields + + + + + +## Usage + + + +## Source data + + + + + + + +## Scope of impact + + + +## Concerns + + + + + + + +## People + +The following are the people that consulted on the contents of this RFC. + +* @romulets | author +* @tinnytintin10 | sponsor, subject matter expert +* @terrancedejesus | subject matter expert + + + + +## References + + + +### RFC Pull Requests + + + +* Stage 0: https://github.com/elastic/ecs/pull/2384 + + \ No newline at end of file From 554bdb663646bbd8390f42411743041e35bca5e7 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?R=C3=B4mulo=20Farias?= Date: Fri, 20 Sep 2024 11:13:36 +0200 Subject: [PATCH 2/3] Add draft fields --- rfcs/text/0000-event-entities.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/rfcs/text/0000-event-entities.md b/rfcs/text/0000-event-entities.md index 167dd340f5..b1c7be2c46 100644 --- a/rfcs/text/0000-event-entities.md +++ b/rfcs/text/0000-event-entities.md @@ -20,6 +20,11 @@ Stage X: Provide a brief explanation of why the proposal is being marked as aban ## Fields +Field | Type | Description /Usage +-- | -- | -- +source.entity.id | keyword | All the entity identifiers that triggered the event. If the document contains multiple source entities, identifiers belonging to different entities will be present. Example identifiers include cloud resource IDs, ARNs, email addresses, or hostnames. +target.entity.id | keyword | All the entity identifiers that were affected by the event. If the document contains multiple target entities, identifiers belonging to different entities will be present. Example identifiers include cloud resource IDs, ARNs, email addresses, or hostnames. + From bdc6680e6bc995f8a3dd015e41a5cc8afcea9d59 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?R=C3=B4mulo=20Farias?= Date: Fri, 20 Sep 2024 14:37:28 +0200 Subject: [PATCH 3/3] Improve RFC --- rfcs/text/0000-event-entities.md | 32 +++++++++++++++++++++++++++----- 1 file changed, 27 insertions(+), 5 deletions(-) diff --git a/rfcs/text/0000-event-entities.md b/rfcs/text/0000-event-entities.md index b1c7be2c46..a751199ec4 100644 --- a/rfcs/text/0000-event-entities.md +++ b/rfcs/text/0000-event-entities.md @@ -4,11 +4,7 @@ - Date: **TBD** -Elastic Cloud Security Team has been focusing on Cloud Detection and Response (CDR). One of the first steps towards the CDR vision is to enhance investigation workflows for the Cloud Security use-case in SIEM. - -As part of enhancing incidents and attacks investigation workflows, it's of great value to identify, represent and index which entities took part in an event and what is their role - which entity has triggered the action and which one was affected by the action? - -The set of changes proposed in this RFC enables better and easier data exploration, as well graphical representations of events through graphs - one of the desired CDR features. +This RFC proposes enhancements to the Elastic Common Schema (ECS) to improve how we capture actor and target information in events, particularly for security use cases. The proposal aims to address current limitations in representing and querying this information, especially for cloud-based events (but this is broadly applicable). @@ -35,6 +37,24 @@ Stage 2: Add or update all remaining field definitions. The list should now be e ## Usage +Currently, ECS lacks a standardized way to explicitly capture/distinguish between the actor (entity performing an action) and the target (entity being acted upon) in events. This limitation makes it challenging to represent certain security events accurately and consistently across different data sources and cloud providers. Specific issues include: + +1. Difficulty in querying nested JSON objects containing critical information. +2. Inconsistent data structures across different services and API calls. +3. Field length limitations preventing effective searching and filtering. +4. Challenges in correlating related events involving the same actors or targets. + +These issues are exemplified in the AWS CloudTrail integration (see [Issue #9586](https://github.com/elastic/integrations/issues/9586) and [Issue #10818](https://github.com/elastic/integrations/issues/10818)), but are not limited to AWS and likely affect other cloud providers and services. + +What we expect to gain with this proposal: + +- Improved clarity and consistency in representing security events across different platforms and data sources. +- Enhanced ability to query and analyze events without relying on complex string parsing or wildcard searches. +- Better correlation of related events, particularly in cloud environments with complex identity and access management scenarios. +- Avoidance of field length limitations by extracting key information into separate fields. +- Improved capability for creating effective detection rules and performing security analysis. +- Maintains compatibility with existing ECS structure while expanding capabilities. + @@ -65,6 +85,8 @@ The goal here is to research and understand the impact of these changes on users ## Concerns +- Asymmetry between using source.* for actor and target.* for target +