Replies: 5 comments 5 replies
-
This idea reminds me of the endpoint dual to the Community ID. |
Beta Was this translation helpful? Give feedback.
-
The way this was done in STIX was by prescribing which object attributes were to be included when the RFC 4122 v5 UUID was generated. For example, for a process, you could say that one should include the process ID, the creation timestamp, and the machine host. That should be sufficient to create a globally unique process ID that is common among products. That is really all that needs to be perscribed. You don't need to describe how to make a UUID, this is defined in the RFC. |
Beta Was this translation helpful? Give feedback.
-
Suggestions from the community call today were to:
The schema PR might not turn out great due to some timestamp resolution differences as well as the identifier hash inputs being different on Windows/MacOS/Linux. I'll still make a draft PR so these issues can be highlighted at the very least. |
Beta Was this translation helpful? Give feedback.
-
Docs PR: ocsf/ocsf-docs#45 |
Beta Was this translation helpful? Give feedback.
-
Shema PR: #1246 |
Beta Was this translation helpful? Give feedback.
-
In Cisco's Endpoint Security organization, we've developed and implemented a specification for deterministically calculating an identifier that uniquely identifies an endpoint process across an organisation.
This writeup proposes open-sourcing this technology under OCSF.
Endpoint security products supplement operating system process identifiers (PIDs) with unique process identifiers.
This is necessary as operating system PIDs are frequently reused, making them poor identifiers across time.
The need for unique process identification is also realized within OCSF by the
process.uid
field that exists in addition to theprocess.pid
field.Unfortunately, each endpoint product uses its own scheme for unique process identification.
These schemes are opaque/proprietary or a random identifier is generated by the product.
This means that unique process identifiers do not match when a security practitioner looks across multiple endpoint datasets.
We encountered this problem within Cisco when trying to analyze dataset from two different products that use endpoint data.
Instead of having these products communicate on the endpoint, we decided to pursue a rigorous specification for creating a unique identifier from operating system provided information.
This enables the different products to deterministically arrive at the same unique identifier without implementing any synchronization.
We realized this approach would generalize well to any endpoint security tooling.
OCSF is a good fit for this technology given that it seeks to enable working with "... a common language for threat detection and investigation".
Our identifier specification can extend this common language to include effective identification of endpoint processes.
If this proposal is friendly to the community, we propose the following plan of action:
https://github.com/ocsf
that can host the specification and platform-specific reference implementations.process
object. We would likely need to represent both the new identifier and the existing proprietary identifiers implemented by endpoint software.0 votes ·
Beta Was this translation helpful? Give feedback.
All reactions