New Data Categorization
In the Data Lake categorization structure, data is classified either by exa_category
or on the basis of the following three components: exa_activity_type
, exa_device_type
, exa_outcome
. By contrast, in the Exabeam Security Operations Platform, data is categorized according to a hierarchy of contextual elements that are defined in the common information model, including subject, activity type, outcome, vendor, product, product category, platform, and landscape. This layered approach allows all of the contextual granularity in your data to be retained.
For more information about these elements, see Common Information Model Context Elements in the Security Content Guide. To view lists of these elements, you can explore the Common Information Model Library (a GitHub repository).
Mapping specific Data Lake categorization components to their common information model counterparts is not a direct one-to-one exercise. The following sections provide some guidelines and examples.
Exa_Categories
This table details how certain Data Lake exa_categories
can be mapped to specific common information model context elements.
Data Lake Category | Common Information Model Context Element |
---|---|
Account Management |
|
Account Switch |
NoteActivity_type is represented by the combination of subject + activity. |
Active Directory |
|
Application |
NoteThe |
Audit Change |
|
Authentication |
|
Badge |
|
Configuration Change |
|
DHCP |
|
DLP |
|
Database |
|
Endpoint |
|
Failed Logons and Lockouts |
|
File |
|
Logout |
|
Network |
|
Network Alert | Deprecated |
Print Activity |
|
Privileged Access | Deprecated |
Security Alerts |
NoteActivity_type is represented by the combination of subject + activity. |
System Event | Activity included in this category is represented by a range of Examples: |
VPN |
NoteLandscape VPN captures a broad scope of activities that happen on a VPN platform, whether or not the activity concerns the VPN itself. In contrast, Subject VPN is reserved for more granular activities that involve interaction with a VPN itself, such as logging in or out. |
Web |
|
Windows Authentication |
|
Exa_Activity_Type, Exa_Device_Type, Exa_Outcome
As previously noted, there is not a direct one-to-one mapping of Data Lake components to the elements of the common information model. However, this table shows a high-level view of how the elements of the common information model correspond to the Data Lake categorization components.
Common Information Model Context Element | Description | Data LakeComponent |
---|---|---|
Subject | Identifies the entity being targeted by an event. Examples include Use to query a type of entity. Examples:
|
|
Activity Type | Identifies the type of operation represented in the event. Examples include Use to query events of a similar activity and subject. Examples:
|
|
Outcome | Identifies the result status of the event. Outcome options are Use to query whether an activity had its intended effect. |
|
Vendor | Identifies the owner of the product that recorded the event. |
|
Product | Identifies the service or application that recorded the event. Examples include Use to query what was monitored or triggered by a product. Examples:
|
|
Product Category | Identifies an umbrella category for the product. Examples include Use to query what was monitored or triggered by a general type of product. Examples:
|
|
Platform | Identifies the virtual environment or application in which the event occurred. Examples include Use to query activity in specific environments. Examples:
|
|
Landscape | Identifies an umbrella category for the platform. Examples include Use to query activity in general types of environments. Examples:
|
|