Skip to content

The Ultimate Guide to Sigma Rules

In cybersecurity as in sports, teamwork makes the dream work. In a world where security analysts can feel constantly bombarded by threat actors, banding together to share information and strategies is increasingly important. Over the last few years, security operations center (SOC) analysts started sharing open source Sigma rules to create and share detections that help them level the playing field.

By understanding what Sigma rules are and how to use them, you can leverage their capabilities, optimizing your centralized log management solution for security detection and response.

What are Sigma Rules?

Introduced in 2017 by detection engineer Florian Roth and open-source security tool developer Thomas Patzke, Sigma is a text-based, generic, open signature format that analysts can use to describe log events, making detections easier to write.  Since Sigma uses YAML, it has a human-readable syntax that means people can easily read and understand the detection rules.

As a generic detection rule format, Sigma creates a common shared language for defenders, overcoming the challenges that they face trying to write rules in proprietary Security Information and Event Management (SIEM) platforms. Security analysts can share rules using the Sigma format, then convert them into the SIEM-specific language.

Similar to how YARA rules use Indicators of Compromise (IoC) to help identify and classify malware files, Sigma rules match criteria to log events to help detect incidents. Sigma rules can contain any or all of the following fields:

  • Title
  • Status, like experimental or tested
  • Description of what it detects
  • Author name
  • Date
  • ID
  • License, assuming the author shares the rule
  • Level
  • Data or log source
  • Set of conditions
  • Tag, including MITRE ATT&CK mapping

 

Why use Sigma Rules?

With Sigma rules, security analysts can collaborate more effectively and efficiently.

Standardization

Sigma standardizes detection rule formats across all SIEM and log management platforms. Since each rule contains the same fields in the same order, security analysts can use a converter that translates the open-source detection into the format that their security system uses.

Collaboration

For defenders, collaboration is a fundamental benefit. Until Sigma rules, security analysts could only share detections with other people who use the same SIEM or log management system. With open-source Sigma rules, defenders can share tested and untested rules within GitHub to build stronger detections.

Further, by collaborating, defenders can share knowledge. With people across all experience levels sharing detections, security analysts can bridge the cybersecurity skills gap, enhancing everyone’s security.

Flexibility

From a business perspective, Sigma rules give companies a way to evolve their cybersecurity technology stack in a way that makes sense for them. The ability to convert the rules to a vendor’s format means that security teams can shift from one technology to another more easily, avoiding costly vendor lock-in or enabling them to mature their operations as necessary.

Sigma Rule Use Cases

With Sigma, you can uplevel your security in proactive and reactive ways.

Suspicious Activity Alerts

To improve your reactive security, you can build Sigma rules to detect suspicious activity. Using the activity that your log data captures, you can build rules that detect almost anything, including:

  • Unauthorized actions
  • Web/resource access
  • File modification
  • Process creation

 

As you get more comfortable building detection rules, you can correlate more log data for meaningful, high-fidelity alerts.

Threat Hunting

Once you have a set of robust alerts, you can start using Sigma rules to mature your proactive security monitoring, too. With a centralized log management solution aggregating old log data, you can build Sigma detections based on threat intelligence and proactively search for activity indicating attackers hiding in your systems.

The Anatomy of a Sigma Rule

Writing Sigma rules doesn’t need to be hard, but the more correlations you build into the rule, the more difficult writing it becomes.

An example of a short Sigma rule is the one that identifies potential brute force or credential theft attacks.


a sigma rule
Azure Account Lockout Sigma Rule

Identify Use Case

The first step to building a Sigma rule is deciding what activity you need to find.

In the example detection, the authors define the use case in the tags as an attack at the credential and access level.

They also map this activity to the MITRE ATT&CK Technique T1110 which covers:

  • Password guessing (T1110.001)
  • Password cracking (T1110.002)
  • Password spraying (T1110.003)
  • Credential stuffing (T1110.004)

Determine Log Source/Data Source

Since your Sigma rule relies on log data, you need to identify what sources apply. When writing the rule, you may want to include both the product and the service.

Breaking down the example detection, you can see that the logsource in this case is the Azure sign-in logs:


Define the Detection

As you continue to build your rule, you also dig deeper into the logsource data. When you define the detection, you look at the log fields that alert you to specific activity.

In this example, the sign-in logs for “Azure AD authentication error 50053”:

Set the Condition

When you set the condition, you define what the rule “looks for” in the defined log.

In this case, since the log needs to have the required error, you set it as follows:

Additional Fields and Complexity

Although valuable, this example is a fairly simple rule. As you try to reduce noise across your monitoring environment, you may incorporate additional information, like:

  • More than one log source
  • More than one detection
  • Filters
  • Multiple conditions
  • Indicators of false positives

 

A good example of a more complex Sigma rule is the Sign-In Failure for Bad Password Threshold:


A Sigma Rule
Azure Sign-In Failure Bad Password Threshold

Graylog Security: Sigma Rule Event Processor for Advanced Detection Capabilities

With Graylog Security, you get the security functionality of SIEM and the intuitive user interface that makes managing security faster. With our Sigma Rule Event Processor, you can import rules you want to use directly from GitHub, and we automatically associate it with an event definition or customize the definition, giving you a way to rapidly mature your detection capabilities.


By combining Sigma rules with Graylog’s lightning-fast speed, you can create the high-fidelity alerts you need and investigate them rapidly, improving key metrics like Mean Time To Detect (MTTD) and Mean Time To Resolve (MTTR).

About Graylog  
At Graylog, our vision is a secure digital world where organizations of all sizes can effectively guard against cyber threats. We’re committed to turning this vision into reality by providing Threat Detection & Response that sets the standard for excellence. Our cloud-native architecture delivers SIEM, API Security, and Enterprise Log Management solutions that are not just efficient and effective—whether hosted by us, on-premises, or in your cloud—but also deliver a fantastic Analyst Experience at the lowest total cost of ownership. We aim to equip security analysts with the best tools for the job, empowering every organization to stand resilient in the ever-evolving cybersecurity landscape.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit webinar series: An intelligent approach to cyber resilience through data governance strategies

Webinar to offer practical approaches to optimize data management, communicate strategies to leadership, and enhance organizational resilience

COPENHAGEN, DENMARK, February 14, 2025 Keepit, a global provider of a comprehensive cloud backup and recovery platform, today announced that it will be hosting a webinar titled, “Data Governance meets Recovery: An Intelligent Approach to Resilience”, on Thursday, February 20, 2025.

 

Keepit’s Kim Larsen, Chief Information Security Officer (CISO) will be joined by Ulf Feger, CISO Advisory Services, vCISO, and NIS2 Directive Senior Lead Implementer[1] , a cybersecurity leader with extensive global experience across IT and OT security. In the session, they will cover governance strategies, aligning disaster recovery strategies with executive priorities, and integrating artificial intelligence (AI) into recovery plans.

 

“Business leaders today must manage rapid data growth while countering sophisticated cyberthreats, making effective data governance crucial for a robust business continuity strategy,” said Larsen. “This informative and practical webinar will help audiences understand how robust data governance, extending beyond the CISO’s office, underpins a resilient disaster recovery strategy.”

 

Key takeaways from the webinar will include:

 

●     Effective data governance models and approaches

●     Disaster recovery planning considering the impact of AI

●     Techniques for data prioritization and classification

●     Structuring recovery plans and conducting incident investigation.

 

WHAT: Webinar: Data Governance meets Recovery: An Intelligent Approach to Resilience

 

WHEN: Thursday, February 20, 2025 at 10:00 a.m. EST/4 p.m. CET

 

WHO:  Kim Larsen, CISO, Keepit

Ulf Feger, CISO Advisory Services, vCISO, and NIS2 Directive Senior Lead Implementer

 

REGISTRATION: Sign up here

 

Participants that cannot attend live will receive a recording of the webinar. And all registrants will receive exclusive access to the latest report from Kim Larsen: “Intelligent data governance

Why taking control of your data is key for operational continuity and innovation.”

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET 榮獲 AV-Comparatives 「2024 年度產品大獎」殊榮

全球網絡安全解決方案領導品牌 ESET 宣布,其 ESET HOME Security Essential 榮膺 AV-Comparatives 「2024 年度產品大獎」。這項備受推崇的獎項,表彰了 ESET HOME Security Essential 在 Windows 平台上的卓越效能與可靠性,致力於保護消費者免受多元網絡威脅的侵害。

2024 年,AV-Comparatives 對 16 款 Windows 消費級安全產品進行了嚴苛評測,檢驗它們在抵禦真實網絡威脅、識別最新惡意軟件、防禦進階針對性攻擊,以及在不影響電腦運作速度的前提下提供保護的能力。ESET HOME Security Essential 以出色的表現脫穎而出,在全年七項測試中均榮獲最高等級的 Advanced+ 獎項,穩坐最佳產品寶座。

AV-Comparatives 2024 年總結報告指出:「評審團對其簡潔直觀、專為非專業用戶設計的介面讚譽有加,同時也肯定其為進階用戶提供的豐富自訂功能與掃描選項,令人印象深刻。」

儘管多數供應商將自動續訂設為強制條件,報告特別讚揚 ESET 是少數不強迫用戶接受自動續訂的廠商,令人稱道。報告進一步強調,ESET HOME Security Essential 是一款設計精良且操作友善的安全產品,提供安全的預設設定,並確保所有用戶都能輕鬆掌握其核心功能。

AV-Comparatives 創辦人暨行政總裁 Andreas Clementi 評論說:「ESET 在 2024 年測試中展現了一貫的優異表現,在多項評比中均獲得高分肯定。這項殊榮充分體現產品在惡意軟件防護、易用性與系統效能上的可靠性。ESET HOME Security Essential 以平衡的設計,提供高效保護同時不拖累系統效能,這無疑是許多用戶所期待的優勢。」

ESET 消費者與物聯網部門副總裁 Viktória Ivanová 表示:「能獲 AV-Comparatives 評選為 2024 年度產品,我們深感榮幸。」

 

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

為何零信任驗證與條件式存取成為安全新標準 Scalefusion OneIdP 助您構建一個彈性、面向未來的安全基礎設施

過去十年,31% 的資料外洩皆源於身分識別資訊薄弱、被盜或外洩有關(註一),身分盜竊已非戲謔,而是真實且嚴峻的威脅。網絡犯罪者伺機利用身分管理系統的漏洞,對企業造成嚴重衝擊。隨著攻擊手法日益精進,我們必須正視並積極應對此威脅。零信任驗證持續驗證每個身分,無論是使用者、裝置或應用程式,確保未經授權者無法存取,構建起抵禦身分型威脅的堅固防線。結合條件式存取管理,精細控制存取權限,企業得以建立無縫且強大的防禦體系。拋棄對信任的假設,從驗證每個存取點做起,方能有效保護企業免於身分盜竊的威脅。

 

企業採用零信任驗證的主要原因

  • 影子存取:隱藏的威脅
    影子存取指未經授權的使用者或裝置繞過傳統安全措施,存取公司系統與資料。這可能包括員工使用未經批准的應用程式、未經授權的裝置連接網絡,或第三方供應商在未經監督下存取資源。

    零信任是解決影子存取的關鍵,它摒棄對網絡內部的信任假設,持續驗證所有使用者和裝置的身份與安全狀態。無論位置為何,皆確保存取經過嚴格驗證,並將安全防護擴展至傳統網絡邊界之外。

  • 資料爆炸:精確管理存取

     

    隨著資料來源、使用方式及價值不斷演變,資料創建正從消費者驅動轉向企業驅動。IDC(註二)預測,至 2025 年,資料量將達 175 zettabytes。在當今商業環境中,資料量持續激增,企業在有效監控與保護敏感資訊方面面臨嚴峻挑戰。

    資料爆炸加劇了資料私隱、合規性及安全性的挑戰。缺乏適當保護,資料將成為網絡犯罪者的目標,資料外洩將導致財務與聲譽損失。零信任應用程式存取透過確保敏感資料僅供必要人員存取,並執行最小權限原則,有效解決此問題。透過在各層級強化資料安全,零信任提高了攻擊者利用有價資訊的難度。

  • 內部威脅:來自內部的日益增長風險

     

    網絡安全多針對外部威脅,但內部威脅同樣危險,甚至更甚。2019 年 Ponemon Institute 的報告(註三)指出,內部攻擊的平均成本每年達 1,145 萬美元。內部威脅源於員工、承包商或受信任合作夥伴濫用存取權限。

    零信任驗證持續監控使用者行為,標記可疑或異常活動。透過執行嚴格的存取控制與即時異常偵測,零信任降低了內部威脅的風險,並有助於迅速減輕潛在危害。

  • 橫向攻擊:來自外部的無聲移動

     

    內部威脅源於受信任的個人,而橫向攻擊則是由已入侵網絡的外部攻擊者發動。這些攻擊者策略性地移動,利用漏洞或被盜憑證。2020 年 IBM 的報告(註四)顯示,60% 的資料外洩涉及橫向移動。

    零信任驗證持續監控攻擊者移動,執行嚴格的存取控制並驗證每個請求。這可防止橫向攻擊者存取敏感資料,並隔離受損帳戶,使攻擊者難以升級權限或在網絡中隱匿移動。

 

使用 OneIdP 實施零信任存取管理

保護企業的資料與系統至關重要。隨著遙距工作與雲端服務模糊邊界,採用零信任與存取管理勢在必行。OneIdP 透過以下關鍵功能,助您保護企業中的每個存取點:

  • 全面驗證:OneIdP 使用上下文感知訊號執行嚴格的多因素驗證(MFA),持續驗證使用者,確保在所有存取點都貫徹「永不信任,始終驗證」的零信任原則。
  • 細緻存取控制:實施最小權限存取,使用基於角色的存取控制(RBAC)僅授予使用者必要的權限。這透過最小化不必要的存取,確保安全性。
  • 持續監控與驗證:OneIdP 即時持續追蹤裝置驗證,偵測可疑活動,並在必要時撤銷存取。
  • 風險適應性安全性:根據位置、時間與裝置健康狀況等上下文資料,動態調整存取,實現根據風險等級靈活應變的安全性。
  • 流暢的使用者體驗:使用單一登入(SSO)與多因素驗證(MFA)簡化跨多個應用程式的存取,減少密碼疲勞,同時保持強大的安全性。

將零信任驗證與存取管理(如 OneIdP 的條件式存取系統)整合,為您的企業提供針對日益增長的網絡威脅的智慧、適應性防禦。無論是解決影子存取、內部威脅或橫向攻擊,此方法皆確保每個存取請求都經過驗證。在加強安全性的同時,使用者體驗亦保持流暢。

使用 Scalefusion OneIdP,您正在構建一個彈性、面向未來的安全基礎設施。

 

註一:https://www.verizon.com/business/resources/infographics/2024-dbir-infographic.pdf?utm_source=blog&utm_medium=Zero%20Trust%20Authentication%20and%20Conditional%20Access%20Explained&utm_campaign=Scalefusion%20Blog

註二:https://www.seagate.com/files/www-content/our-story/trends/files/Seagate-WP-DataAge2025-March-2017.pdf?utm_source=blog&utm_medium=Zero%20Trust%20Authentication%20and%20Conditional%20Access%20Explained&utm_campaign=Scalefusion%20Blog

註三:https://www.cisco.com/c/dam/en/us/products/collateral/security/ponemon-report-smb.pdf?utm_source=blog&utm_medium=Zero%20Trust%20Authentication%20and%20Conditional%20Access%20Explained&utm_campaign=Scalefusion%20Blog

註四:https://www.ibm.com/security/digital-assets/cost-data-breach-report/1Cost%20of%20a%20Data%20Breach%20Report%202020.pdf?utm_source=blog&utm_medium=Zero%20Trust%20Authentication%20and%20Conditional%20Access%20Explained&utm_campaign=Scalefusion%20Blog

 

關於 Scalefusion
Scalefusion 是領先的統一端點管理解決方案,可幫助企業安全管理各類裝置,包括智能手機、平 板電腦、手提電腦、堅固型設備、POS 機、數位標牌,以及應用和內容。Scalefusion 支援 Android、iOS、macOS、Windows 和 Linux 裝置的管理,並透過遙距故障排除功能,實現高效 的設備管理流程。全球超過 8000 家企業依賴 Scalefusion 釋放業務潛力,廣泛應用於運輸與物流 、零售、教育、醫療保健、製造、建築與房地產、酒店業、軟件與電信、金融服務等行業。

關於 Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×