Skip to content

[Enhancement] Clarify event.severity Description to Recommend Elastic Security Scale #2446

Open
@raqueltabuyo

Description

@raqueltabuyo

Clarify event.severity Description to Recommend Elastic Security Scale

Summary

The current description of event.severity does not clearly specify a recommended scale, leading to inconsistent mappings across third-party integrations. This issue proposes updating the event.severity description to explicitly recommend following Elastic Security’s standardized severity scale:

  • Low = 21
  • Medium = 47
  • High = 73
  • Critical = 99

Risk score

This clarification will help ensure consistency in severity representation across Elastic Security environments.


Motivation

Currently, the lack of a standardized reference in the event.severity description has led to inconsistent implementations across different integrations. Developers working on third-party data ingestion have mapped severity values based on their own interpretations, leading to misaligned severities across alerts.

For example, some integrations have been assigned a different numeric scale (e.g., Microsoft Defender for Endpoint currently has 1-4, while SentinelOne and CrowdStrike have assigned other different scales), which results in incorrect severity representations in Kibana.

By explicitly recommending the Elastic Security severity scale, developers will have a clear reference to correctly map third-party severities, ensuring a consistent experience across all sources.


Detailed Design

Proposed Changes to event.severity Description:

Current Description:

The numeric severity of the event according to your event source.

What the different severity values mean can be different between sources and use cases. It’s up to the implementer to make sure severities are consistent across events from the same source.

The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity.


Proposed Updated Description:

The numeric severity of the event according to your event source.

To ensure consistency across Elastic Security, it is recommended to map severity values to the Elastic Security severity scale:

  • Low = 21
  • Medium = 47
  • High = 73
  • Critical = 99

This ensures uniform severity representation across different event sources. Implementers should normalize third-party severities to this scale when possible.

The Syslog severity belongs in log.syslog.severity.code. event.severity is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy the log.syslog.severity.code to event.severity.


Example Values:

Third-Party Source Original Severity Recommended event.severity Mapping
Microsoft Defender for Endpoint Informational 21 (Low)
Microsoft Defender for Endpoint Low 21 (Low)
Microsoft Defender for Endpoint Medium 47 (Medium)
Microsoft Defender for Endpoint High 73 (High)
SentinelOne Low 21 (Low)
SentinelOne Medium 47 (Medium)
SentinelOne High 73 (High)
SentinelOne Critical 99 (Critical)

This update will provide clear guidance to developers, reducing mapping inconsistencies and ensuring a standardized severity approach across Elastic Security.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions