You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
name: Cisco AI Defense Security Alerts by Application Name
2
+
id: 105e4a69-ec55-49fc-be1f-902467435ea8
3
+
version: 1
4
+
date: '2025-02-14'
5
+
author: Bhavin Patel, Splunk
6
+
status: experimental
7
+
type: Anomaly
8
+
description: The search surfaces alerts from the Cisco AI Defense product for potential attacks against the AI models running in your environment. This analytic identifies security events within Cisco AI Defense by examining event messages, actions, and policy names. It focuses on connections and applications associated with specific guardrail entities and ruleset types. By aggregating and analyzing these elements, the search helps detect potential policy violations and security threats, enabling proactive defense measures and ensuring network integrity.
9
+
data_source:
10
+
- Cisco AI Defense Alerts
11
+
search: |-
12
+
`cisco_ai_defense`
13
+
| rename genai_application.application_name as application_name
14
+
| rename connection.connection_name as connection_name
15
+
```Aggregating data by model name, connection name, application name, application ID, and user ID```
16
+
| stats count
17
+
values(user_id) as user_id
18
+
values(event_message_type) as event_message_type
19
+
values(event_action) as event_action
20
+
values(policy.policy_name) as policy_name
21
+
values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_entity.guardrail_entity_name) as guardrail_entity_name
22
+
values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_ruleset.guardrail_ruleset_type) as guardrail_ruleset_type
23
+
by model.model_name connection_name application_name application_id
24
+
```Evaluating severity based on policy name and guardrail ruleset type```
25
+
| eval severity=case(
26
+
policy_name IN ("AI Runtime Latency Testing - Prompt Injection"), "critical",
27
+
policy_name IN ("AI Runtime Latency Testing - Code Detection"), "high",
28
+
guardrail_ruleset_type IN ("Toxicity"), "medium",
29
+
true(), "low"
30
+
)
31
+
```Calculating risk score based on severity level```
how_to_implement: To enable this detection, you need to ingest alerts from the Cisco AI Defense product. This can be done by using this app from splunkbase - Cisco Security Cloud and ingest alerts into the cisco:ai:defense sourcetype.
41
+
known_false_positives: False positives may vary based on Cisco AI Defense configuration; monitor and filter out the alerts that are not relevant to your environment.
0 commit comments