Creating Threat Intelligence Rule Types

Threat Stack's Threat Intelligence rule types will alert you to suspicious connections using a curated list of IP addresses from various sources. Threat Stack monitors your environment with the Agent installed, alerting you to problem package installs. For additional information about Threat Stack's Threat Intelligence feature, please review the Threat Intelligence Feature Overview article.

You can create a Threat Intelligence rule in the Threat Stack Cloud Security PlatformⓇ (CSP).

  1. Navigate to the Rules tab and select a ruleset from the list.
  2. Click the + New Rule button.



    You can create a rule in any ruleset to suit your organization's needs. In this example, the new rule is added to the Threat Intelligence Rule Set.

  3. The Add Host Rule dialog displays.


  4. Select Threat Intelligence Rule from the list and click Next: Details to proceed.


  5. The Add Threat Intelligence Rule dialog displays. You will be able to specify the rule details.
    1. Severity of alerts: There are three levels of behaviors to indicate the severity of an alert.
      • Severity 1 alerts are the highest elevation of behaviors.
      • Severity 2 alerts are the second highest elevation of behaviors.
      • Severity 3 alerts are the third highest elevation of behaviors.
    2. Rule Name (Required): It indicates the name of the ruleset.
    3. Alert Title (Required): It indicates the name and substitutions (dynamic content) which add context to the alert.
    4. Alert Description: It indicates a brief summary of the alert.
    5. Aggregate Fields: It helps define the uniqueness of an alert. Please review the Rule Aggregation article for additional information about aggregate options.
    6. Trigger an alert if an event matching this rule occurs at least: It indicates the frequency for generating an alert. You can specify how often to display an alert within a certain time frame. For additional information, please review the Life Cycle of an Alert article.


  6. After making your selection, click Next: Filter.


  7. The Threat Intelligence Rule Filter pane displays.



    If you have integrated your Amazon Web Services (AWS) account into Threat Stack, the Deployment Options pane appears next. You can specify AWS EC2 tags for this rule and automatically assign the rule to all associated hosts. For additional information, please review the AWS EC2 Tags article.

    However, if you do not see the Deployment interface, then your Threat Stack AWS EC2 Agent correlation is not enabled. Follow the steps in Automatically Integrate with AWS using CloudFormation to enable this integration.

  8. After specifying a rule filter, click Create Rule.


  9. The rule creates and displays on the Rules page.
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request