362 lines
7.3 KiB
Markdown
362 lines
7.3 KiB
Markdown
# Compliance Framework Mappings for Sigma Detection Rules
|
|
|
|
## PCI-DSS v3.2.1
|
|
|
|
### Requirement 10.2 - Implement automated audit trails
|
|
|
|
#### 10.2.1 - Access to cardholder data
|
|
|
|
**Detection Requirements**: Monitor all access to cardholder data environments
|
|
|
|
**Sigma Tags**: `pci-dss.10.2.1`
|
|
|
|
**Example Rules**:
|
|
- File access to cardholder data locations
|
|
- Database queries accessing payment card fields
|
|
- Application logs showing cardholder data retrieval
|
|
|
|
```yaml
|
|
tags:
|
|
- pci-dss.10.2.1
|
|
logsource:
|
|
category: file_event
|
|
detection:
|
|
selection:
|
|
TargetFilename|contains: '\cardholder-data\'
|
|
```
|
|
|
|
#### 10.2.2 - All actions taken by any individual with root or administrative privileges
|
|
|
|
**Sigma Tags**: `pci-dss.10.2.2`
|
|
|
|
**Example Rules**:
|
|
- Privileged account usage
|
|
- sudo/runas commands
|
|
- Administrative actions on critical systems
|
|
|
|
```yaml
|
|
tags:
|
|
- pci-dss.10.2.2
|
|
logsource:
|
|
category: process_creation
|
|
detection:
|
|
selection:
|
|
User|contains: 'admin'
|
|
```
|
|
|
|
#### 10.2.4 - Invalid logical access attempts
|
|
|
|
**Sigma Tags**: `pci-dss.10.2.4`
|
|
|
|
**Example Rules**:
|
|
- Failed authentication attempts
|
|
- Account lockouts
|
|
- Access denied events
|
|
|
|
```yaml
|
|
tags:
|
|
- pci-dss.10.2.4
|
|
logsource:
|
|
category: authentication
|
|
detection:
|
|
selection:
|
|
EventID: 4625 # Failed logon
|
|
```
|
|
|
|
#### 10.2.5 - Use of identification and authentication mechanisms
|
|
|
|
**Sigma Tags**: `pci-dss.10.2.5`
|
|
|
|
**Example Rules**:
|
|
- Account creation/deletion/modification
|
|
- Password changes
|
|
- Multi-factor authentication events
|
|
|
|
```yaml
|
|
tags:
|
|
- pci-dss.10.2.5
|
|
logsource:
|
|
category: authentication
|
|
detection:
|
|
selection:
|
|
EventID:
|
|
- 4720 # Account created
|
|
- 4724 # Password reset
|
|
```
|
|
|
|
#### 10.2.7 - Creation and deletion of system-level objects
|
|
|
|
**Sigma Tags**: `pci-dss.10.2.7`
|
|
|
|
**Example Rules**:
|
|
- System service creation
|
|
- Scheduled task creation
|
|
- New user account creation
|
|
|
|
```yaml
|
|
tags:
|
|
- pci-dss.10.2.7
|
|
logsource:
|
|
category: process_creation
|
|
detection:
|
|
selection:
|
|
Image|endswith: '\sc.exe'
|
|
CommandLine|contains: 'create'
|
|
```
|
|
|
|
## NIST SP 800-53 Rev. 5
|
|
|
|
### AU-2 - Event Logging
|
|
|
|
**Controls**: Organization defines auditable events
|
|
|
|
**Sigma Tags**: `nist-800-53.au-2`
|
|
|
|
**Coverage**:
|
|
- Security-relevant events
|
|
- Success and failure of events
|
|
- Actions by privileged users
|
|
|
|
### AU-3 - Content of Audit Records
|
|
|
|
**Controls**: Audit records contain sufficient information
|
|
|
|
**Sigma Tags**: `nist-800-53.au-3`
|
|
|
|
**Required Fields**:
|
|
- Event type, date/time, outcome
|
|
- Subject identity, object identity
|
|
- Data source
|
|
|
|
### AU-6 - Audit Review, Analysis, and Reporting
|
|
|
|
**Controls**: Review and analyze audit records
|
|
|
|
**Sigma Tags**: `nist-800-53.au-6`
|
|
|
|
**Detection Focus**:
|
|
- Automated scanning for anomalies
|
|
- Correlation of audit records
|
|
- Investigation and reporting
|
|
|
|
### AU-12 - Audit Generation
|
|
|
|
**Controls**: System provides audit record generation
|
|
|
|
**Sigma Tags**: `nist-800-53.au-12`
|
|
|
|
**Coverage**:
|
|
- Generate audit records for defined events
|
|
- Allow authorized users to select auditable events
|
|
- Privileged commands
|
|
|
|
### SI-4 - System Monitoring
|
|
|
|
**Controls**: Monitor the system to detect attacks and indicators
|
|
|
|
**Sigma Tags**: `nist-800-53.si-4`
|
|
|
|
**Detection Coverage**:
|
|
- Unauthorized access attempts
|
|
- Unauthorized use of privileges
|
|
- Malicious code detection
|
|
|
|
```yaml
|
|
tags:
|
|
- nist-800-53.si-4
|
|
- nist-800-53.au-12
|
|
logsource:
|
|
category: process_creation
|
|
detection:
|
|
selection:
|
|
CommandLine|contains: 'mimikatz'
|
|
```
|
|
|
|
### AC-2 - Account Management
|
|
|
|
**Controls**: Account creation, modification, removal
|
|
|
|
**Sigma Tags**: `nist-800-53.ac-2`
|
|
|
|
**Example Rules**:
|
|
- Account lifecycle events
|
|
- Privileged account monitoring
|
|
- Account attribute changes
|
|
|
|
### IA-2 - Identification and Authentication
|
|
|
|
**Controls**: Uniquely identify and authenticate users
|
|
|
|
**Sigma Tags**: `nist-800-53.ia-2`
|
|
|
|
**Example Rules**:
|
|
- Multi-factor authentication
|
|
- Authentication failures
|
|
- Session management
|
|
|
|
## ISO/IEC 27001:2013
|
|
|
|
### A.12.4.1 - Event logging
|
|
|
|
**Control**: Event logs recording user activities, exceptions, and security events
|
|
|
|
**Sigma Tags**: `iso27001.a.12.4.1`
|
|
|
|
**Requirements**:
|
|
- User IDs
|
|
- System activities
|
|
- Date, time, and details of key events
|
|
- Device identity or location
|
|
- Records of successful and rejected system access attempts
|
|
|
|
```yaml
|
|
tags:
|
|
- iso27001.a.12.4.1
|
|
logsource:
|
|
category: authentication
|
|
detection:
|
|
selection:
|
|
EventID:
|
|
- 4624 # Successful logon
|
|
- 4625 # Failed logon
|
|
```
|
|
|
|
### A.12.4.2 - Protection of log information
|
|
|
|
**Control**: Logging facilities and log information protected
|
|
|
|
**Sigma Tags**: `iso27001.a.12.4.2`
|
|
|
|
**Detection Focus**:
|
|
- Unauthorized access to logs
|
|
- Log deletion or modification
|
|
- Log integrity violations
|
|
|
|
### A.12.4.3 - Administrator and operator logs
|
|
|
|
**Control**: System administrator and operator activities logged
|
|
|
|
**Sigma Tags**: `iso27001.a.12.4.3`
|
|
|
|
**Example Rules**:
|
|
- Privileged command execution
|
|
- System configuration changes
|
|
- Administrative access
|
|
|
|
```yaml
|
|
tags:
|
|
- iso27001.a.12.4.3
|
|
logsource:
|
|
category: process_creation
|
|
detection:
|
|
selection:
|
|
User|contains:
|
|
- 'admin'
|
|
- 'root'
|
|
```
|
|
|
|
### A.9.2.1 - User registration and de-registration
|
|
|
|
**Control**: Account management processes
|
|
|
|
**Sigma Tags**: `iso27001.a.9.2.1`
|
|
|
|
**Example Rules**:
|
|
- Account creation
|
|
- Account deletion
|
|
- Account modification
|
|
|
|
### A.9.4.1 - Information access restriction
|
|
|
|
**Control**: Access to information and systems restricted
|
|
|
|
**Sigma Tags**: `iso27001.a.9.4.1`
|
|
|
|
**Detection Focus**:
|
|
- Unauthorized access attempts
|
|
- Privilege escalation
|
|
- Access control violations
|
|
|
|
## SOC 2 Trust Service Criteria
|
|
|
|
### CC6.1 - Logical and Physical Access Controls
|
|
|
|
**Criteria**: Restrict access to authorized users
|
|
|
|
**Detection Coverage**:
|
|
- Authentication monitoring
|
|
- Authorization violations
|
|
- Privileged access usage
|
|
|
|
### CC7.2 - System Monitoring
|
|
|
|
**Criteria**: Monitor system components
|
|
|
|
**Detection Coverage**:
|
|
- Security event monitoring
|
|
- Anomaly detection
|
|
- Threat detection
|
|
|
|
### CC7.3 - Evaluation and Response
|
|
|
|
**Criteria**: Evaluate events and respond
|
|
|
|
**Detection Focus**:
|
|
- Security incident detection
|
|
- Alert generation and escalation
|
|
- Response actions
|
|
|
|
## Tag Format
|
|
|
|
Use this format for compliance tags:
|
|
|
|
```yaml
|
|
tags:
|
|
- {framework}.{control-id}
|
|
```
|
|
|
|
**Examples**:
|
|
```yaml
|
|
tags:
|
|
- pci-dss.10.2.5
|
|
- nist-800-53.au-2
|
|
- iso27001.a.12.4.1
|
|
```
|
|
|
|
## Multi-Framework Mapping
|
|
|
|
Rules can map to multiple frameworks:
|
|
|
|
```yaml
|
|
title: Failed Authentication Monitoring
|
|
tags:
|
|
- attack.credential_access
|
|
- attack.t1110
|
|
- pci-dss.10.2.4
|
|
- pci-dss.10.2.5
|
|
- nist-800-53.au-2
|
|
- nist-800-53.au-12
|
|
- nist-800-53.ia-2
|
|
- iso27001.a.12.4.1
|
|
- iso27001.a.9.2.1
|
|
```
|
|
|
|
## Compliance Coverage Analysis
|
|
|
|
Use `compliance_coverage.py` script to analyze rule coverage:
|
|
|
|
```bash
|
|
# Analyze PCI-DSS coverage
|
|
python scripts/compliance_coverage.py --directory rules/ --framework pci-dss
|
|
|
|
# Generate coverage report
|
|
python scripts/compliance_coverage.py --directory rules/ --framework nist-800-53 --report coverage.md
|
|
```
|
|
|
|
## Resources
|
|
|
|
- [PCI DSS v3.2.1](https://www.pcisecuritystandards.org/)
|
|
- [NIST SP 800-53 Rev. 5](https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final)
|
|
- [ISO/IEC 27001:2013](https://www.iso.org/standard/54534.html)
|
|
- [SOC 2 Trust Service Criteria](https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/trust-services-criteria)
|