You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently in the V2 specification for Sigma Meta Filters, there is a requirement to specify rule names or IDs to which the filter will apply as per the example below:
Being able to scope filters to specific rules is really useful for some use cases, but at Grafana and presumably in other SecOps teams, we'd like to be able to apply filters as a more generic transform. A real world example, is that we want to be able to exclude one of our machine-identities from triggering AWS rules, because it will trigger all of them. Rather than specifying each rule individually, I'd like to be able to write a filter more like the below and then apply it at convert time:
---
title: Filter out machine identityid: 94b03457-03bb-4f10-9a34-eda129608bddstatus: testlogsource:
category: cloudproduct: awsfilter:
rules:
- logsource:
product: awsselection:
userIdentity.arn: arn:aws:iam::ACCOUNT:/user/machine-identitycondition: not selection
I think this will extend the usage of filters and make it easier to create exclusions for rules that are in a similar category.
The text was updated successfully, but these errors were encountered:
Hey, thanks for the response, I believe internally we were hoping to achieve this without having to add in processing pipelines as well. The idea being that we wanted to be able to create filter rules for some exclusions that would apply across all rules in a category. We can also achieve this with pipelines, but we were thinking it would be nice to be able to do this with filter rules too as another route for adding conditions to a rule.
That's the intention here to integrate it to the filters. That are just the conditions from the processing pipelines that works be reused here because they are already there and do exactly what is needed here.
Currently in the V2 specification for Sigma Meta Filters, there is a requirement to specify rule names or IDs to which the filter will apply as per the example below:
Being able to scope filters to specific rules is really useful for some use cases, but at Grafana and presumably in other SecOps teams, we'd like to be able to apply filters as a more generic transform. A real world example, is that we want to be able to exclude one of our machine-identities from triggering AWS rules, because it will trigger all of them. Rather than specifying each rule individually, I'd like to be able to write a filter more like the below and then apply it at convert time:
I think this will extend the usage of filters and make it easier to create exclusions for rules that are in a similar category.
The text was updated successfully, but these errors were encountered: