-
Notifications
You must be signed in to change notification settings - Fork 430
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Enhancement] Clarify event.severity
Description to Recommend Elastic Security Scale
#2446
Comments
I think there is a confusion here between severity and risk score. Severity options: low, medium, high, critical. Risk score - scale from 1 to 100. In the prebuilt detection rules we use the following mapping:
|
Thanks @approksiu , sorry if it was not clear enough. The issue here is that severity is a numerical value so we are proposing adding a recommendation in the ECS documentation inside the |
Thanks team, I think a standard way to map the provided data source severity value to A few suggestions:
|
I see I looked at the alert severity. |
@MikePaquette great points, below my answers.
The breaking change is not for the description but the fact that some customers might use the current values of
Great point, definitely we need to transform those numeric values too. I think it would be more exceptional but it would be good to know the scale of that specific third party in advance, before any mapping. Usually if the scale is from 0-10, they would probably follow CVSS scale. Therefore, if we have numeric values as the original source, we can:
|
OK, so there is no breaking change to ECS, but each integration that changes its behavior may constitute a breaking change for the integration, right? |
Yes, that's exactly the issue. |
Clarify
event.severity
Description to Recommend Elastic Security ScaleSummary
The current description of
event.severity
does not clearly specify a recommended scale, leading to inconsistent mappings across third-party integrations. This issue proposes updating theevent.severity
description to explicitly recommend following Elastic Security’s standardized severity scale:21
47
73
99
Risk score
This clarification will help ensure consistency in severity representation across Elastic Security environments.
Motivation
Currently, the lack of a standardized reference in the
event.severity
description has led to inconsistent implementations across different integrations. Developers working on third-party data ingestion have mapped severity values based on their own interpretations, leading to misaligned severities across alerts.For example, some integrations have been assigned a different numeric scale (e.g., Microsoft Defender for Endpoint currently has
1-4
, while SentinelOne and CrowdStrike have assigned other different scales), which results in incorrect severity representations in Kibana.By explicitly recommending the Elastic Security severity scale, developers will have a clear reference to correctly map third-party severities, ensuring a consistent experience across all sources.
Detailed Design
Proposed Changes to
event.severity
Description:Current Description:
Proposed Updated Description:
Example Values:
event.severity
MappingThis update will provide clear guidance to developers, reducing mapping inconsistencies and ensuring a standardized severity approach across Elastic Security.
The text was updated successfully, but these errors were encountered: