Wiz Defend Alert External Alerts
Generates a detection alert for each Wiz Defend alert written to the configured indices. Enabling this rule allows you to immediately begin investigating Wiz Defend alerts in the app.
Rule type: query
Rule indices:
- logs-wiz.defend-*
Rule Severity: medium
Risk Score: 47
Runs every: 1m
Searches indices from: now-2m
Maximum alerts per execution: ?
References:
Tags:
- Data Source: Wiz
- Use Case: Threat Detection
- Resources: Investigation Guide
- Promotion: External Alerts
Version: ?
Rule authors:
- Elastic
Rule license: Elastic License v2
This rule is designed to capture alert events generated by the Wiz Defend integration and promote them as Elastic detection alerts.
To capture Wiz Defend alerts, install and configure the Wiz integration to ingest alert events into the logs-wiz.defend-* index pattern.
If this rule is enabled alongside the External Alerts promotion rule (UUID: eb079c62-4481-4d6e-9643-3ca499df7aaa), you may receive duplicate alerts for the same Wiz Defend events. Consider adding a rule exception for the External Alert rule to exclude event.dataset: wiz.defend to avoid receiving duplicate alerts.
For information on troubleshooting the maximum alerts warning please refer to this guide.
Wiz Defend is a cloud-native application protection platform (CNAPP) that provides real-time threat detection and response for cloud workloads, containers, and serverless applications. The rule identifies threats by monitoring specific alert events from Wiz Defend, enabling analysts to swiftly investigate and mitigate potential security incidents in cloud environments.
- Correlate the alert with recent activity on the affected cloud resource or workload to identify any unusual or suspicious behavior patterns.
- Check for any additional alerts or logs related to the same resource, container, or cloud account to determine if this is part of a broader attack or isolated incident.
- Investigate the source and destination IP addresses involved in the alert to assess if they are known to be malicious or associated with previous threats.
- Analyze any processes, files, or network connections flagged in the alert to determine if they are legitimate or potentially malicious, using threat intelligence sources if necessary.
- Review the Wiz Defend alert details including severity, affected resources, and recommended remediation actions.
- Check the cloud resource configuration and security posture to identify any misconfigurations that may have contributed to the alert.
- Alerts triggered by routine cloud infrastructure changes or deployments can be false positives. Review the context of the alert to determine if it aligns with scheduled maintenance or deployment activities.
- Legitimate administrative tools or automation scripts may trigger alerts. Identify and whitelist these tools if they are verified as non-threatening.
- Development or testing environments may generate alerts for behaviors that are expected in non-production contexts. Consider creating exceptions for these environments if appropriate.
- Security scanning or monitoring tools used by cloud operations teams might be flagged. Ensure these tools are documented and excluded from triggering alerts if they are part of regular operations.
- Cloud-native application behaviors that are consistent with their design but trigger alerts should be reviewed. If deemed non-malicious, adjust the rule to exclude these specific behaviors.
- Isolate the affected cloud resource or workload immediately to prevent lateral movement and further compromise within the cloud environment.
- Analyze the specific alert details to identify the nature of the threat and any associated indicators of compromise (IOCs).
- Remove or quarantine any malicious processes, files, or containers identified by the Wiz Defend alert to neutralize the threat.
- Apply relevant security patches or updates to address any exploited vulnerabilities on the affected resource.
- Review and update cloud security group rules, network policies, and IAM permissions to prevent similar attacks.
- Conduct a thorough scan of the cloud environment to identify any additional resources that may have been compromised or are exhibiting similar behavior.
- Document the incident and escalate to the appropriate security team or management if the threat is part of a larger attack campaign or if additional resources are needed for remediation.
- Review and update cloud security policies and configurations to enhance detection and prevention capabilities against similar threats in the future.
event.kind: event and event.dataset: wiz.defend