Skip to content

Commit c795cda

Browse files
authored
Merge pull request #3337 from splunk/cisco_ai_defense
Cisco AI Defense Alerts
2 parents 0eb6830 + ec007d4 commit c795cda

File tree

4 files changed

+101
-2
lines changed

4 files changed

+101
-2
lines changed

contentctl.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,12 @@ apps:
4141
version: 3.0.0
4242
description: description of app
4343
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-okta-identity-cloud_300.tgz
44+
- uid: 7404
45+
title: Cisco Security Cloud
46+
appid: CiscoSecurityCloud
47+
version: 3.0.1
48+
description: description of app
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_301.tgz
4450
- uid: 6652
4551
title: Add-on for Linux Sysmon
4652
appid: Splunk_TA_linux_sysmon
@@ -77,9 +83,9 @@ apps:
7783
- uid: 5579
7884
title: Splunk Add-on for CrowdStrike FDR
7985
appid: Splunk_TA_CrowdStrike_FDR
80-
version: 2.0.4
86+
version: 2.0.3
8187
description: description of app
82-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_204.tgz
88+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_203.tgz
8389
- uid: 3185
8490
title: Splunk Add-on for Microsoft IIS
8591
appid: SPLUNK_TA_FOR_IIS
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
name: Cisco AI Defense Alerts
2+
id: cbb06880-9dd9-4542-ac60-bd6e1d3c3e4e
3+
version: 1
4+
date: '2024-07-18'
5+
author: Bhavin Patel
6+
description: Data source object for Cisco AI Defense Alerts
7+
source: cisco_ai_defense
8+
sourcetype: cisco:ai:defense
9+
separator:
10+
supported_TA:
11+
- name: Cisco Security Cloud
12+
url: https://splunkbase.splunk.com/app/7404
13+
version: 3.0.1
14+
fields:
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
name: Cisco AI Defense Security Alerts by Application Name
2+
id: 105e4a69-ec55-49fc-be1f-902467435ea8
3+
version: 1
4+
date: '2025-02-14'
5+
author: Bhavin Patel, Splunk
6+
status: experimental
7+
type: Anomaly
8+
description: The search surfaces alerts from the Cisco AI Defense product for potential attacks against the AI models running in your environment. This analytic identifies security events within Cisco AI Defense by examining event messages, actions, and policy names. It focuses on connections and applications associated with specific guardrail entities and ruleset types. By aggregating and analyzing these elements, the search helps detect potential policy violations and security threats, enabling proactive defense measures and ensuring network integrity.
9+
data_source:
10+
- Cisco AI Defense Alerts
11+
search: |-
12+
`cisco_ai_defense`
13+
| rename genai_application.application_name as application_name
14+
| rename connection.connection_name as connection_name
15+
```Aggregating data by model name, connection name, application name, application ID, and user ID```
16+
| stats count
17+
values(user_id) as user_id
18+
values(event_message_type) as event_message_type
19+
values(event_action) as event_action
20+
values(policy.policy_name) as policy_name
21+
values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_entity.guardrail_entity_name) as guardrail_entity_name
22+
values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_ruleset.guardrail_ruleset_type) as guardrail_ruleset_type
23+
by model.model_name connection_name application_name application_id
24+
```Evaluating severity based on policy name and guardrail ruleset type```
25+
| eval severity=case(
26+
policy_name IN ("AI Runtime Latency Testing - Prompt Injection"), "critical",
27+
policy_name IN ("AI Runtime Latency Testing - Code Detection"), "high",
28+
guardrail_ruleset_type IN ("Toxicity"), "medium",
29+
true(), "low"
30+
)
31+
```Calculating risk score based on severity level```
32+
| eval risk_score=case(
33+
severity="critical", 100,
34+
severity="high", 75,
35+
severity="medium", 50,
36+
severity="low", 25
37+
)
38+
| table model.model_name, user_id, event_action, application_id, application_name, severity, risk_score, policy_name, connection_name, guardrail_ruleset_type, guardrail_entity_name
39+
|`cisco_ai_defense_security_alerts_by_application_name_filter`'
40+
how_to_implement: To enable this detection, you need to ingest alerts from the Cisco AI Defense product. This can be done by using this app from splunkbase - Cisco Security Cloud and ingest alerts into the cisco:ai:defense sourcetype.
41+
known_false_positives: False positives may vary based on Cisco AI Defense configuration; monitor and filter out the alerts that are not relevant to your environment.
42+
references:
43+
- https://www.robustintelligence.com/blog-posts/prompt-injection-attack-on-gpt-4
44+
- https://docs.aws.amazon.com/prescriptive-guidance/latest/llm-prompt-engineering-best-practices/common-attacks.html
45+
drilldown_searches:
46+
- name: View risk events for the last 7 days for - "$application_id$"
47+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$application_id$" ) starthoursago=168 | stats count min(_time)
48+
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
49+
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
50+
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
51+
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
52+
earliest_offset: $info_min_time$
53+
latest_offset: $info_max_time$
54+
rba:
55+
message: Cisco AI Defense Security Alert has been action - [$event_action$] for the application name - [$application_name$]
56+
risk_objects:
57+
- field: application_name
58+
type: other
59+
score: 10
60+
threat_objects: []
61+
tags:
62+
analytic_story:
63+
- Critical Alerts
64+
asset_type: Web Application
65+
product:
66+
- Splunk Enterprise
67+
- Splunk Enterprise Security
68+
- Splunk Cloud
69+
security_domain: endpoint
70+
tests:
71+
- name: True Positive Test
72+
attack_data:
73+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/suspicious_behaviour/cisco_ai_defense_alerts/cisco_ai_defense.log
74+
source: cisco_ai_defense
75+
sourcetype: cisco:ai:defense

macros/cisco_ai_defense.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
definition: sourcetype=cisco:ai:defense
2+
description: customer specific splunk configurations(eg- index, source, sourcetype).
3+
Replace the macro definition with configurations for your Splunk Environment.
4+
name: cisco_ai_defense

0 commit comments

Comments
 (0)