Cloud SIEM Normalized Classification
This topic describes how Cloud SIEM applies normalized classification to records.
In Cloud SIEM records can be classified at two levels. First, all records are classified at a high level by record type. At a more detailed level, you can classify more specifically using normalized classification fields alongside the mapped attributes within a record.
Record types
Every Cloud SIEM record has a record type. A record type classifies the nature of the event that the record describes. Cloud SIEM record types include Authentication, Endpoint, NetworkHTTP and so on.
A record’s type is set by the log mapping that processes it. For more information, see Cloud SIEM Record Types.
Normalized classification fields
For more granular classification of a record, Cloud SIEM uses normalized classification fields. These are special normalized schema fields that have an enforced output defined by Cloud SIEM. These fields provide a taxonomy that can be used to tie records from multiple vendors and products together in a standard way. Rather than holistically trying to describe a record as record type does, these fields exist alongside commonly used normalization schema fields which most often contain the what, where, and why of a particular record. This allows for far more dynamic and specific classification of a record than record type alone.
Normalized classification fields are completely optional when creating a log mapping. When using normalized classification fields, it is best to consider whether a parallel normalized schema field exists for the record and whether there is an analogous enforced output available in the desired normalized classification field. These fields will most typically utilize the lookup unless the vendor log output exactly matches the enforced outputs or a constant value is assigned.
- When creating a log mapping, if the output value used for a given normalized classification field is not listed in the Enforced Output Values for that field, it will not be populated.
- Normalized classification fields are a new feature and will be backfilled to existing out-of-the-box mappings over time.
normalizedAction
Complementary to the action field, the normalizedAction
field describes the initiation of an activity in a
standard way across records. normalizedAction
is meant to describe an attempt to perform an action, using the success boolean as a modifier to indicate whether or not the action was successful. Note that normalizedAction
should be used with normalizedResource to indicate where an action was attempted, or the resource or entity upon which the action was attempted.
Enforced Output Value | Description |
---|---|
abort | Use for actions synonymous with "abort". For instance, in an event describing the attempt, successful or not, to interrupt an ongoing task. |
allow | Use for actions synonymous with "allow”. For instance, in an event describing the attempt, successful or not, to permit an object or the occurrence of an activity. This is common in actions pertaining to network traffic. |
change | Use for actions synonymous with "change". For instance, in an event describing the attempt, successful or not, to modify a resource. |
clean | Use for actions synonymous with "clean". For instance, in an event describing the attempt, successful or not, of the sanitization of a resource. Common in actions pertaining to anti-malware. |
create | Use for actions synonymous with "create". For instance, in an event describing the attempt, successful or not, to create a resource. |
decrypt | Use for actions synonymous with "decrypt". For instance, in an event describing the attempt, successful or not, of the decryption of a resource |
delete | Use for actions synonymous with "delete". For instance, in an event describing the attempt, successful or not, to create a resource. |
deny | Use for actions synonymous with "deny". For instance, in an event describing the attempt, successful or not, to reject an object or the occurrence of an activity. Common in actions pertaining to network traffic. |
domainLogon | Use for events describing the attempt, successful or not, to leverage domain resources to attempt credential validation. |
disable | Use for actions synonymous with "disable". For instance, in an event describing the attempt, successful or not, to render a resource inactive and/or unable. Common in actions pertaining to identity and access management. |
enable | Use for actions synonymous with "enable". For instance, in an event describing the attempt, successful or not, to render a resource active and/or able. Common in actions pertaining to identity and access management. |
execute | Use for actions synonymous with "execute". For instance, in an event describing the attempt, successful or not, to initiate the performance of a task. |
ignore | Use for actions synonymous with "ignore". For instance, in an event describing the attempt, successful or not, to disregard a resource or the occurrence of an activity. |
inspect | Use for actions synonymous with "inspect". For instance, in an event describing the attempt, successful or not, to submit a resource to further scrutiny. |
install | Use for actions synonymous with "install". For instance, in an event describing the attempt, successful or not, of the installation of a piece of software or hardware. |
lock | Use for actions synonymous with "lock". For instance, in an event describing the attempt, successful or not, to make a resource secure or inaccessible. Common in actions pertaining to identity and access management. |
logoff | Use for actions synonymous with "logoff". For instance, in an event describing the attempt, successful or not, of a computer, service, or user account logging off. |
logon | Use for actions synonymous with "logon". For instance, in an event describing the attempt, successful or not, of a computer, service, or user account logging in. |
quarantine | Use for actions synonymous with "quarantine". For instance, in an event describing the attempt, successful or not, of isolating a resource. Common in actions pertaining to anti-malware. |
receive | Use for actions synonymous with "receive". For instance, in an event describing the attempt, successful or not, to accept the arrival of a resource. Common in actions pertaining to email. |
reset | Use for actions synonymous with "reset". For instance, in an event describing the attempt, successful or not, to discard the current state of a resource. Common in actions pertaining to network network traffic and identity access management, depending on context. |
restore | Use for actions synonymous with "restore". For instance, in an event describing the attempt, successful or not, to re-establish the prior state of a resource. Common in actions pertaining to backups. |
scan | Use for actions synonymous with "scan". For instance, in an event describing the attempt, successful or not, to initiate a scan of a resource. Common in actions pertaining to anti-malware. |
send | Use for actions synonymous with "send". For instance, in an event describing the attempt, successful or not, to dispatch a resource. Common in actions pertaining to email. |
start | Use for actions synonymous with "start". For instance, in an event describing the attempt, successful or not, to initiate an activity. |
stop | Use for actions synonymous with "stop". For instance, in an event describing the attempt, successful or not, to cease an activity. |
uninstall | Use for actions synonymous with "uninstall". For instance, in an event describing the attempt, successful or not, to remove a piece of software or hardware. |
normalizedResource
Complementary to the resource field, this field describes the resource being acted upon or otherwise referenced within a record in a standard way across records. Intended to be used to provide further normalized context to a record, particularly in tandem with normalizedAction.
Enforced Output Value | Description |
---|---|
account | Use where the resource being acted upon or referenced in a record pertains to an account. |
application | Use where the resource being acted upon or referenced in a record pertains to an application. |
backup | Use where the resource being acted upon or referenced in a record pertains to a backup. |
bucket | Use where the resource being acted upon or referenced in a record pertains to a specific bucket. Common in cloud computing. |
database | Use where the resource being acted upon or referenced in a record pertains to a database. |
directory | Use where the resource being acted upon or referenced in a record pertains to a directory or similar hierarchical organizational unit. |
Use where the resource being acted upon or referenced in a record pertains to email or email delivery. | |
file | Use where the resource being acted upon or referenced in a record pertains to a file. |
group | Use where the resource being acted upon or referenced in a record pertains to a group, for example, an organizational unit, security group, user group, computer group, access control list, and so on. |
instance | Use where the resource being acted upon or referenced in a record pertains to a specific machine instance, typically virtual. Common in cloud computing. |
key | Use where the resource being acted upon or referenced in a record pertains to a cryptographic key. |
malware | Use where the resource being acted upon or referenced in a record pertains to malware itself or the prevention, detection, or removal of malware. |
network | Use where the resource being acted upon or referenced in a record is or pertains to network traffic. |
operating system | Use where the resource being acted upon or referenced in a record pertains to an operating system component. |
process | Use where the resource being acted upon or referenced in a record pertains to a process |
role | Use where the resource being acted upon or referenced in a record pertains to a role. Common in cloud computing. |
scheduled task | Use where the resource being acted upon or referenced in a record pertains to a scheduled task or analogous functionality. |
service | Use where the resource being acted upon or referenced in a record pertains to a service. |
normalizedCause
Complementary to the cause field, this field describes the reason for any particular outcome in a record in a standard way.
Enforced Output Value | Description |
---|---|
incorrect password | For a record describing an authentication failure where the cause of the failure was an incorrect password. |
incorrect username | For a record describing an authentication failure where the cause of the failure was an incorrect username. |
failed challenge | For a record describing an authentication failure where the cause of the failure was a failed multi-factor authentication challenge or other secondary authentication challenge, such as a security question. |
system error | For a record describing a failed operation where the cause of the failure was a system error. |
allow list | For a record describing the successful outcome of an operation based on the presence of an object on an allow list. For instance, an Allow ACL. |
deny list | For a record describing the failed outcome of an operation based on the presence of an object on a deny list. For instance, a Deny ACL. |
success
True or false showing whether or not an action or event recorded in a log was successful. This field is either defined as a constant or based on a lookup in a mapping.
normalizedSeverity
Severity score on a scale of 0 to 10 with 0 being informational and 10 being critical. This is defined either explicitly per mapping or by a lookup to normalize a vendor specific severity level. Certain normalized threat rules will use normalizedSeverity to pass a dynamic severity into the signal.
Examples
Failed User Logon
Record Type | Authentication |
normalizedAction | logon |
normalizedResource | account |
normalizedCause | incorrect password |
success | false |
Firewall Denied Traffic
Record Type | Network |
normalizedResource | network |
normalizedAction | deny |
normalizedCause | deny list |
success | false |
normalizedSeverity | 2 |
Successful Process Execution
Record Type | EndpointProcess |
normalizedResource | process |
normalizedAction | execute |
success | true |
Successful Account Management
Record Type | Audit |
normalizedAction | change |
normalizedResource | account |
success | true |