Description
Clarify event.severity
Description to Recommend Elastic Security Scale
Summary
The current description of event.severity
does not clearly specify a recommended scale, leading to inconsistent mappings across third-party integrations. This issue proposes updating the event.severity
description to explicitly recommend following Elastic Security’s standardized severity scale:
- Low =
21
- Medium =
47
- High =
73
- Critical =
99
This clarification will help ensure consistency in severity representation across Elastic Security environments.
Motivation
Currently, the lack of a standardized reference in the event.severity
description has led to inconsistent implementations across different integrations. Developers working on third-party data ingestion have mapped severity values based on their own interpretations, leading to misaligned severities across alerts.
For example, some integrations have been assigned a different numeric scale (e.g., Microsoft Defender for Endpoint currently has 1-4
, while SentinelOne and CrowdStrike have assigned other different scales), which results in incorrect severity representations in Kibana.
By explicitly recommending the Elastic Security severity scale, developers will have a clear reference to correctly map third-party severities, ensuring a consistent experience across all sources.
Detailed Design
Proposed Changes to event.severity
Description:
Current Description:
The numeric severity of the event according to your event source.
What the different severity values mean can be different between sources and use cases. It’s up to the implementer to make sure severities are consistent across events from the same source.
The Syslog severity belongs in
log.syslog.severity.code
.event.severity
is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy thelog.syslog.severity.code
toevent.severity
.
Proposed Updated Description:
The numeric severity of the event according to your event source.
To ensure consistency across Elastic Security, it is recommended to map severity values to the Elastic Security severity scale:
- Low =
21
- Medium =
47
- High =
73
- Critical =
99
This ensures uniform severity representation across different event sources. Implementers should normalize third-party severities to this scale when possible.
The Syslog severity belongs in
log.syslog.severity.code
.event.severity
is meant to represent the severity according to the event source (e.g. firewall, IDS). If the event source does not publish its own severity, you may optionally copy thelog.syslog.severity.code
toevent.severity
.
Example Values:
Third-Party Source | Original Severity | Recommended event.severity Mapping |
---|---|---|
Microsoft Defender for Endpoint | Informational | 21 (Low) |
Microsoft Defender for Endpoint | Low | 21 (Low) |
Microsoft Defender for Endpoint | Medium | 47 (Medium) |
Microsoft Defender for Endpoint | High | 73 (High) |
SentinelOne | Low | 21 (Low) |
SentinelOne | Medium | 47 (Medium) |
SentinelOne | High | 73 (High) |
SentinelOne | Critical | 99 (Critical) |
This update will provide clear guidance to developers, reducing mapping inconsistencies and ensuring a standardized severity approach across Elastic Security.