You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: detections/application/cisco_ai_defense_security_alerts.yml
+10-8Lines changed: 10 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,12 @@ type: Anomaly
8
8
description: The search surfaces alerts from the Cisco AI Defense product for potential attacks agaisnt the AI models running in your environment. This analytic identifies security events within Cisco AI Defense by examining event messages, actions, and policy names. It focuses on connections and applications associated with specific guardrail entities and ruleset types. By aggregating and analyzing these elements, the search helps detect potential policy violations and security threats, enabling proactive defense measures and ensuring network integrity.
9
9
data_source:
10
10
- Cisco AI Defense Alerts
11
-
search: '`cisco_ai_defense ` | stats count values(event_message_type) values(event_action) values(policy.policy_name) as policy_name values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_entity.guardrail_entity_name) as guardrail_entity_name values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_ruleset.guardrail_ruleset_type) as guardrail_ruleset_type by connection.connection_name genai_application.application_name application_id| `cisco_ai_defense_security_alerts_filter`'
11
+
search: '`cisco_ai_defense ` | rename genai_application.application_name as application_name | rename connection.connection_name as connection_name | stats count values(event_message_type) values(event_action) values(policy.policy_name) as policy_name values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_entity.guardrail_entity_name) as guardrail_entity_name values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_ruleset.guardrail_ruleset_type) as guardrail_ruleset_type by connection_name application_name
how_to_implement: To enable this detection, you need to ingest alerts from the Cisco AI Defense product. This can be done by using this app from splunkbase - Cisco Security Cloud and ingest alerts into the cisco:ai:defense sourcetype.
13
18
known_false_positives: False positives may vary based on Cisco AI Defense configuration; monitor and filter out the alerts that are not relevant to your environment.
14
19
references:
@@ -29,9 +34,6 @@ rba:
29
34
- field: application_id
30
35
type: other
31
36
score: 10
32
-
threat_objects:
33
-
- field: user_id
34
-
type: user
35
37
tags:
36
38
analytic_story:
37
39
- Critical Alerts
@@ -44,7 +46,7 @@ tags:
44
46
tests:
45
47
- name: True Positive Test
46
48
attack_data:
47
-
- data: __UPDATE__ the data file to replay. Go to https://github.com/splunk/contentctl/wiki
48
-
for information about the format of this field
49
-
sourcetype: __UPDATE__ the sourcetype of your data file.
0 commit comments