Skip to Content
Overview

CloudSigma Documentation

CloudSigma transforms cyber threat intelligence — blog posts, CVE advisories, or raw text — into validated Sigma  detection rules ready for your SIEM.

How It Works

  1. Submit a threat intel URL, CVE ID, or raw text via the API or web UI
  2. Extract MITRE ATT&CK TTPs automatically using AI
  3. Generate Sigma rules grounded against a curated gold corpus of 475+ rules
  4. Validate rules with pySigma and convert to your SIEM’s native query language
  5. Deploy rules to Splunk, Sentinel, Elasticsearch, Chronicle, OpenSearch, or Google SecOps

Supported Platforms

PlanePlatforms
Cloud Audit LogAWS CloudTrail, GCP Audit Log, Azure Activity Log
EndpointWindows/Sysmon, Windows Security, Windows PowerShell, Linux/auditd
KubernetesKubernetes Audit
Identity ProviderOkta System Log, Entra ID Sign-in, Entra ID Audit
WAFModSecurity, AWS WAF

SIEM Backends

Rules are converted to native queries for Splunk SPL, Microsoft Sentinel KQL, Elasticsearch Lucene, Google Chronicle UDM, OpenSearch DQL, and Google SecOps YARA-L.

Last updated on