Normalize Third-Party EDR Alert Severity to Elastic’s Severity Scale #12662
Labels
impact:high
Short-term priority; add to current release, or definitely next.
Integration:crowdstrike
CrowdStrike
Integration:m365_defender
Microsoft M365 Defender
Integration:microsoft_defender_endpoint
Microsoft Defender for Endpoint
Integration:sentinel_one
SentinelOne
Team:Security-Service Integrations
Security Service Integrations Team [elastic/security-service-integrations]
Normalize Third-Party EDR Alert Severity to Elastic’s Severity Scale
Summary
Currently, third-party EDR integrations (e.g., Microsoft Defender for Endpoint, SentinelOne, CrowdStrike) use different severity scales. However, when their data is ingested into Elastic Security, there have been inconsistencies in how severity values are mapped, leading to incorrect severity assignments instead of aligning with Elastic's predefined scale.
This issue proposes applying a standardized transformation to normalize severity values before parsing data into ECS, ensuring consistency across all alerts.
Problem Statement
Elastic Security assigns fixed numeric values for
event.severity
, as defined in the official Elastic Security detection rules:21
= Low47
= Medium73
= High99
= CriticalRisk Score
However, each third-party EDR uses its own severity scale, and there is no uniform approach to parsing these values into ECS. In some cases, severity has been incorrectly assigned or inconsistently mapped instead of following Elastic’s standardized scale.
For example:
Informational
,Low
,Medium
,High
scale. MDE SeverityLow
,Medium
,High
, andCritical
.CrowdStrike: uses
Info
,Low
,Medium
,High
, andCritical
. Crowdstrike Severity mappingThese integrations have assigned default values or mapped severities in a way that does not align with Elastic’s scale.
As a result, alerts from these sources may not reflect their actual severity, impacting prioritization and response workflows.
Proposed Solution
Apply severity transformation rules to normalize third-party severity values before parsing them into ECS, ensuring they align with Elastic’s official severity scale.
Implementation Steps
event.severity
scale.Example Mapping for SentinelOne
event.severity
event.severity=21
event.severity=47
event.severity=73
event.severity=99
Similar mappings will be created for Microsoft Defender for Endpoint (MDE) and CrowdStrike once their scales are validated. In the case there are
Informational
andLow
severity levels, use the same value (21) for both.Acceptance Criteria
event.severity
scale, as referenced in Elastic Detection Rules.Future actions
Examples
The text was updated successfully, but these errors were encountered: