Open pladamgregory opened 1 day ago
It appears there's a lot of scope to create duplication and conflict with the existing attributes in the Authentication event class. I would recommend, taking a deeper at the existing class and all it's attributes and only add missing pieces. The core reasoning it to be more prescriptive for the users of OCSF.
Quick observations:
radius
appropriate as an auth_factor
type? It's better suited for auth type, check out auth_protocol access_control
being nested inside auth_factors
? Don't see a clear value of this nesting.access_control
it appears you are duplicating attributes that are already a part of the class elsewhere in the structure. auth_result -> status
, auth_method -> auth_protocol
, auth_type -> logon_typepolicy
object be used with augementations to represent all the policy attributes that you have?
Proposal: Extend Security Control Profile for Authentication Class in OCSF
Summary
This proposal aims to extend the OCSF (Open Cybersecurity Schema Framework) security control profile to support the authentication class. Specifically, it introduces an
access_control
object within theauth_factors
structure, which includes various attributes related to access restrictions, policy rule matching, identity stores, and authentication results.Motivation
Currently, the OCSF schema lacks detailed coverage of authentication-related attributes within the security control profile, limiting its use in monitoring, auditing, and managing authentication flows and policy application in a granular way. This extension will enable better tracking of authentication attempts, associated policies, and the effectiveness of access restrictions, enhancing overall security visibility.
Proposal Details
New Structure
Within the authentication class, we will add an
access_control
object underauth_factors
, which will contain the following attributes:Example JSON
An example JSON structure illustrating the new
auth_factors
object withaccess_control
: