- Introduced AGENTS.md, README.md, TASKS.md, and implementation_plan.md for Vexer, detailing mission, responsibilities, key components, and operational notes. - Established similar documentation structure for Vulnerability Explorer and Zastava modules, including their respective workflows, integrations, and observability notes. - Created risk scoring profiles documentation outlining the core workflow, factor model, governance, and deliverables. - Ensured all modules adhere to the Aggregation-Only Contract and maintain determinism and provenance in outputs.
64 lines
1.4 KiB
JSON
64 lines
1.4 KiB
JSON
{
|
|
"schemaVersion": "notify.rule@1",
|
|
"ruleId": "rule-secops-critical",
|
|
"tenantId": "tenant-01",
|
|
"name": "Critical digests to SecOps",
|
|
"description": "Escalate KEV-tagged findings to on-call feeds.",
|
|
"enabled": true,
|
|
"match": {
|
|
"eventKinds": [
|
|
"scanner.report.ready",
|
|
"scheduler.rescan.delta"
|
|
],
|
|
"namespaces": [
|
|
"prod-*"
|
|
],
|
|
"repositories": [],
|
|
"digests": [],
|
|
"labels": [],
|
|
"componentPurls": [],
|
|
"minSeverity": "high",
|
|
"verdicts": [],
|
|
"kevOnly": true,
|
|
"vex": {
|
|
"includeAcceptedJustifications": false,
|
|
"includeRejectedJustifications": false,
|
|
"includeUnknownJustifications": false,
|
|
"justificationKinds": [
|
|
"component-remediated",
|
|
"not-affected"
|
|
]
|
|
}
|
|
},
|
|
"actions": [
|
|
{
|
|
"actionId": "email-digest",
|
|
"channel": "email:soc",
|
|
"digest": "hourly",
|
|
"template": "digest",
|
|
"enabled": true,
|
|
"metadata": {
|
|
"locale": "en-us"
|
|
}
|
|
},
|
|
{
|
|
"actionId": "slack-oncall",
|
|
"channel": "slack:sec-ops",
|
|
"template": "concise",
|
|
"throttle": "PT5M",
|
|
"metadata": {},
|
|
"enabled": true
|
|
}
|
|
],
|
|
"labels": {
|
|
"team": "secops"
|
|
},
|
|
"metadata": {
|
|
"source": "sprint-15"
|
|
},
|
|
"createdBy": "ops:zoya",
|
|
"createdAt": "2025-10-19T04:12:27+00:00",
|
|
"updatedBy": "ops:zoya",
|
|
"updatedAt": "2025-10-19T04:45:03+00:00"
|
|
}
|