Skip to content

Commit e79629f

Browse files
[New Rule] Wiz Defend Promotion Alerts (#5410)
* [New Rule] Wiz Defend Promotion Alerts Fixes #5409 * Update rules/promotions/wiz_defend_alert_external_alerts.toml Co-authored-by: Samirbous <[email protected]> --------- Co-authored-by: Samirbous <[email protected]>
1 parent 8ddf8a8 commit e79629f

File tree

1 file changed

+114
-0
lines changed

1 file changed

+114
-0
lines changed
Lines changed: 114 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,114 @@
1+
[metadata]
2+
creation_date = "2025/12/04"
3+
integration = ["wiz"]
4+
maturity = "production"
5+
promotion = true
6+
updated_date = "2025/12/04"
7+
8+
[rule]
9+
author = ["Elastic"]
10+
description = """
11+
Generates a detection alert for each Wiz Defend alert written to the configured indices. Enabling this rule allows you
12+
to immediately begin investigating Wiz Defend alerts in the app.
13+
"""
14+
from = "now-2m"
15+
index = ["logs-wiz.defend-*"]
16+
interval = "1m"
17+
language = "kuery"
18+
license = "Elastic License v2"
19+
max_signals = 1000
20+
name = "Wiz Defend Alert External Alerts"
21+
note = """## Triage and analysis
22+
23+
### Investigating Wiz Defend Alert External Alerts
24+
25+
Wiz Defend is a cloud-native application protection platform (CNAPP) that provides real-time threat detection and response for cloud workloads, containers, and serverless applications. The rule identifies threats by monitoring specific alert events from Wiz Defend, enabling analysts to swiftly investigate and mitigate potential security incidents in cloud environments.
26+
27+
### Possible investigation steps
28+
29+
- Correlate the alert with recent activity on the affected cloud resource or workload to identify any unusual or suspicious behavior patterns.
30+
- Check for any additional alerts or logs related to the same resource, container, or cloud account to determine if this is part of a broader attack or isolated incident.
31+
- Investigate the source and destination IP addresses involved in the alert to assess if they are known to be malicious or associated with previous threats.
32+
- Analyze any processes, files, or network connections flagged in the alert to determine if they are legitimate or potentially malicious, using threat intelligence sources if necessary.
33+
- Review the Wiz Defend alert details including severity, affected resources, and recommended remediation actions.
34+
- Check the cloud resource configuration and security posture to identify any misconfigurations that may have contributed to the alert.
35+
36+
### False positive analysis
37+
38+
- Alerts triggered by routine cloud infrastructure changes or deployments can be false positives. Review the context of the alert to determine if it aligns with scheduled maintenance or deployment activities.
39+
- Legitimate administrative tools or automation scripts may trigger alerts. Identify and whitelist these tools if they are verified as non-threatening.
40+
- Development or testing environments may generate alerts for behaviors that are expected in non-production contexts. Consider creating exceptions for these environments if appropriate.
41+
- Security scanning or monitoring tools used by cloud operations teams might be flagged. Ensure these tools are documented and excluded from triggering alerts if they are part of regular operations.
42+
- Cloud-native application behaviors that are consistent with their design but trigger alerts should be reviewed. If deemed non-malicious, adjust the rule to exclude these specific behaviors.
43+
44+
### Response and remediation
45+
46+
- Isolate the affected cloud resource or workload immediately to prevent lateral movement and further compromise within the cloud environment.
47+
- Analyze the specific alert details to identify the nature of the threat and any associated indicators of compromise (IOCs).
48+
- Remove or quarantine any malicious processes, files, or containers identified by the Wiz Defend alert to neutralize the threat.
49+
- Apply relevant security patches or updates to address any exploited vulnerabilities on the affected resource.
50+
- Review and update cloud security group rules, network policies, and IAM permissions to prevent similar attacks.
51+
- Conduct a thorough scan of the cloud environment to identify any additional resources that may have been compromised or are exhibiting similar behavior.
52+
- Document the incident and escalate to the appropriate security team or management if the threat is part of a larger attack campaign or if additional resources are needed for remediation.
53+
- Review and update cloud security policies and configurations to enhance detection and prevention capabilities against similar threats in the future.
54+
"""
55+
references = ["https://www.wiz.io/platform/wiz-defend", "https://www.elastic.co/docs/reference/integrations/wiz"]
56+
risk_score = 47
57+
rule_id = "f8c9e3a1-4b2d-4e5f-9a1c-6d8b0e3f4a8e"
58+
rule_name_override = "rule.name"
59+
setup = """## Setup
60+
61+
### Wiz Defend Integration
62+
This rule is designed to capture alert events generated by the Wiz Defend integration and promote them as Elastic detection alerts.
63+
64+
To capture Wiz Defend alerts, install and configure the Wiz integration to ingest alert events into the `logs-wiz.defend-*` index pattern.
65+
66+
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same Wiz Defend events. Consider adding a rule exception for the External Alert rule to exclude event.dataset: wiz.defend to avoid receiving duplicate alerts.
67+
68+
### Additional notes
69+
70+
For information on troubleshooting the maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
71+
"""
72+
severity = "medium"
73+
tags = [
74+
"Data Source: Wiz",
75+
"Use Case: Threat Detection",
76+
"Resources: Investigation Guide",
77+
"Promotion: External Alerts",
78+
]
79+
timestamp_override = "event.ingested"
80+
type = "query"
81+
82+
query = '''
83+
event.kind: event and event.dataset: wiz.defend
84+
'''
85+
86+
87+
[[rule.risk_score_mapping]]
88+
field = "event.risk_score"
89+
operator = "equals"
90+
value = ""
91+
92+
[[rule.severity_mapping]]
93+
field = "event.severity"
94+
operator = "equals"
95+
severity = "low"
96+
value = "21"
97+
98+
[[rule.severity_mapping]]
99+
field = "event.severity"
100+
operator = "equals"
101+
severity = "medium"
102+
value = "47"
103+
104+
[[rule.severity_mapping]]
105+
field = "event.severity"
106+
operator = "equals"
107+
severity = "high"
108+
value = "73"
109+
110+
[[rule.severity_mapping]]
111+
field = "event.severity"
112+
operator = "equals"
113+
severity = "critical"
114+
value = "99"

0 commit comments

Comments
 (0)