certtools / intelmq

IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.

Home Page:https://docs.intelmq.org/latest/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Needed in the IDF (intelmq data format): severity

aaronkaplan opened this issue · comments

commented
  • need a "severity" field. Shadowserver is going to add that soon.
  • Should have documentation on what this means for the end-user / recipient (for example: severity:critical => RCE)
  • Have a guide on how to use the values and how to act on it for shadowserver feeds in particular

Cross check with @elsif2

The criticality of an event depends not only on the type of event defined by the feed provider but also on criteria known to the IntelMQ operator, such as which network the device is in.

How much will the criticality be used? Is it worth a new field (involves adapting all outputs on all instances), or is it for extra?

P.S.: We normally follow semantic versioning, so 3.1.1 (the milestone you selected for this issue) is a patch/bugfix release. IMHO a newly added field is not a patch.

commented

I think we should get some feedback from users (mailinglist?) as this change has an impact on their setups.

commented

Shadowserver plans to add a severity field to every event after the https://github.com/certtools/intelmq/tree/shadowserver-dynamic-config branch is integrated into the next release. I plan to submit the PR next week.

Severity levels:

  • critical (typically for highly critical vulnerabilities that are being actively exploited, where failure to remediate poses a very high likelyhood of compromise. typically for RCE or changing or extracting sensitive data)

  • high (end of life systems, internal systems that you can log into with authentication that are meant to be internal (SMB, RDP), some data can be leaked. Drones/sinkhole events end up in this category)

  • medium (risk of participating in DDoS, unencrypted services requiring login, vulnerabilities requiring MITM to exploit, attacker will need to know internal systems/infrastructure in order to exploit it)

  • low (deviation from best practice - little to no practical way to exploit, but setup is not ideal)

  • info (Informational only, no concerns whatsoever)

commented

I think it does not impact their setups to have an additional field in the IDF format

When an output bot writes data to a database, it does. I think writing data to a database is not uncommon.

commented

Yes, but having a bot write all fields (without specifically selecting which fields it needs ) to some output DB sounds like a bug at that part, no? Anyways, I got your point. We'll make an IEP008 for that...

Yes, but having a bot write all fields (without specifically selecting which fields it needs ) to some output DB sounds like a bug at that part, no?

All output bots except the SMTP Output bot write all fields to their destination. Complete list is at https://intelmq.readthedocs.io/en/latest/user/bots.html#output-bots

There are some expert bots to remove fields though. The simplest is the Field Reducer Bot.

commented