-
Notifications
You must be signed in to change notification settings - Fork 135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added the security_control profile entries. #894
Conversation
Signed-off-by: Paul Agbabian <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The only issue I see here is, attacks
being added at multiple levels in the class. Attacks is already baked in all the findings classes via finding_info.attacks
. Which attacks should one populate?
I suggest we move |
|
Yes, no problem with |
There is an additional problem I discovered: because Not so with Therefore, we need to decide whether any of the other profile attributes (e.g. |
Right, but as I mentioned earlier -
There's way to overcome this. If you add
I think we either have to accept the redundancy for attacks (perhaps with a better description in the sec control profile) or not have sec control profile in the detections class. I would most definitely vote for having the said redundancy. |
I see - I don't have visibility into how the findings group envisioned the transition to Incident, but now I understand that |
…rity_control suppressing the built-in attribute. Signed-off-by: Paul Agbabian <[email protected]>
I will create a new PR that moves |
On second thought, I see a concern with this approach - if we add malware to finding_info object then why not other "crucial" attributes in the detection finding class? Why not evidences, vulnerability etc? I think adding malware to finding_info leads to an anti-pattern when compared to the rest of the class. Also, what are we to benefit by moving malware from base to the finding_info? Further, do we want to have even more redundancy in the class when the security_control profile is applied to the class? (only attacks vs both malware, attacks being duplicated in finding_info)? |
True but we already have Attacks there in finding_info so that an array of findings can be held by an incident and attacks available without referencing to the finding events. Why wouldn't I want to see the malware from those findings as well. On the contrary for me this would be more rather than less consistent. Found malware is as important as MITRE tags. |
As noted earlier, this holds true for other attributes as well. |
Yes, I think we should do an analysis and make sure we have the right rationale for where things sit. Given the reuse of the same We have Given the sharing of I agree we don't want everything in the object, but Therefore, I would either move One more point on this: we have two perspectives here: one from the security control detection, where a verdict of some kind (disposition here) but also action was done. The other is the analyst (SIEM let's say) that is NOT a control, does NOT Allow or Deny the action. Hence, when I bring this in for the rationale that we need dispositions, or verdicts to use UDM terminology, without having to apply the |
Closing this PR in favor of #906 |
Closing this PR in favor of #906 |
Related Issue:
Description of changes:
Added the
security_control
profile to the class.