Skip to content

Commit 13800a7

Browse files
authored
Merge pull request #3412 from splunk/cisco_ai_defense
Cisco AI defense - Move to prod
2 parents eaf9ad8 + ea0b365 commit 13800a7

File tree

1 file changed

+11
-6
lines changed

1 file changed

+11
-6
lines changed

detections/application/cisco_ai_defense_security_alerts_by_application_name.yml

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
name: Cisco AI Defense Security Alerts by Application Name
22
id: 105e4a69-ec55-49fc-be1f-902467435ea8
3-
version: 1
4-
date: '2025-02-14'
3+
version: 2
4+
date: '2025-03-21'
55
author: Bhavin Patel, Splunk
6-
status: experimental
6+
status: production
77
type: Anomaly
88
description: The search surfaces alerts from the Cisco AI Defense product for potential attacks against the AI models running in your environment. This analytic identifies security events within Cisco AI Defense by examining event messages, actions, and policy names. It focuses on connections and applications associated with specific guardrail entities and ruleset types. By aggregating and analyzing these elements, the search helps detect potential policy violations and security threats, enabling proactive defense measures and ensuring network integrity.
99
data_source:
@@ -43,8 +43,12 @@ references:
4343
- https://www.robustintelligence.com/blog-posts/prompt-injection-attack-on-gpt-4
4444
- https://docs.aws.amazon.com/prescriptive-guidance/latest/llm-prompt-engineering-best-practices/common-attacks.html
4545
drilldown_searches:
46-
- name: View risk events for the last 7 days for - "$application_id$"
47-
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$application_id$" ) starthoursago=168 | stats count min(_time)
46+
- name: View the detection results for - "$application_name$"
47+
search: '%original_detection_search% | search application_name = "$application_name$"'
48+
earliest_offset: $info_min_time$
49+
latest_offset: $info_max_time$
50+
- name: View risk events for the last 7 days for - "$application_name$"
51+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$application_name$") starthoursago=168 | stats count min(_time)
4852
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
4953
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
5054
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
@@ -67,9 +71,10 @@ tags:
6771
- Splunk Enterprise Security
6872
- Splunk Cloud
6973
security_domain: endpoint
74+
manual_test: We are dynamically creating the risk_score field based on the severity of the alert in the SPL and that supersedes the risk score set in the detection.
7075
tests:
7176
- name: True Positive Test
7277
attack_data:
73-
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/suspicious_behaviour/cisco_ai_defense_alerts/cisco_ai_defense.log
78+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/suspicious_behaviour/cisco_ai_defense_alerts/cisco_ai_defense_alerts.json
7479
source: cisco_ai_defense
7580
sourcetype: cisco:ai:defense

0 commit comments

Comments
 (0)