Event Streaming Details

Once a SIEM integration (for example, Microsoft Sentinel, Splunk, Sumo Logic or Webhook) is configured in the ARMO Platform, the following events are automatically streamed in real time.

This integration provides full observability, audit trail, and incident correlation across your runtime, compliance, and policy changes, helping SOC and SecOps teams respond faster and with context.


SIEM Streaming Trigger Events

The ARMO Platform streams events whenever key system, policy, or runtime actions occur.

Incident Lifecycle Events

EventDescription
Incident CreatedA new runtime incident is detected and opened.
Incident UpdatedThe incident status or details are updated (for example, status change or new alert added).

Policy & Rule Changes

EventDescription
Runtime Policy CreatedA new threat detection policy is created.
Runtime Policy UpdatedAn existing policy is modified (for example, rule conditions, scope, criteria, or response).
Runtime Policy DeletedA threat detection policy is deleted.

Response Action Events

EventDescription
Response Action TriggeredA response (for example, container kill, pause, network policy, or seccomp profile) is executed.

Risk Acceptance Events

EventDescription
Risk Acceptance CreatedA new risk acceptance rule is defined to suppress specific incidents.
Risk Acceptance UpdatedAn existing risk acceptance is modified (for example, scope, justification, or expiration date).
Risk Acceptance DeletedA risk acceptance rule is removed.

Data Schema: Fields Streamed to SIEM

Each event type includes structured fields that can be mapped to your SIEM data model for search, correlation, and reporting.


Incident Created / Updated

CategoryFieldDescriptionExample
Core Metadataevent_typeFixed valueincident_created
first_seenTime the incident was generated (UTC)2025-09-08T12:30:15Z
last_seenTime the incident was last updated (UTC)2025-09-08T12:30:15Z
armo_account_idCustomer account identifierf1d2d2f924e986ac86fdf7b36c94bcdf
armo_account_nameCustomer account nameACME Corp
incident_idUnique identifier for the incidentINC-10382
statusCurrent statusopen
Incident Detailsincident_nameShort titleSuspicious process execution detected
rule_idID of the triggering rule
rule_nameName of the triggering rule
descriptionDetailed description of the incidentA process attempted to connect to a known malicious domain
severityIncident severitycritical
detection_typeDetection method (policy, anomaly, malware signature)anomaly
Policy Contextpolicy_idID of triggered policyPOL-3421
policy_namePolicy nameOutbound Connection to Known Malicious Domain
MITRE ATT&CK Contextmitre_tacticATT&CK tacticCommand and Control
mitre_techniqueATT&CK technique IDT1071.001
Environment Contextcloud_providerCloud providerAWS
cloud_account_idCloud account ID123456789012
cloud_regionCloud regionus-east-1
clusterCluster nameprod-cluster-1
namespaceNamespacepayments
workloadWorkload namebilling-service
workload_kindWorkload kindDeployment
containerContainer namebilling-api
container_imageContainer imagedocker.io/nginx:latest
nodeNode hostnameip-10-0-12-45.ec2.internal
node_instance_idInstance IDi-0e74577cae6f9cccd
node_instance_typeInstance typem5a.large
node_instance_zoneAvailability zoneeu-west-3a
podPod name

Alert Added

CategoryFieldDescriptionExample
Core Metadataevent_typeFixed valuealert_added
rule_idRule ID linked to alert
rule_nameRule name linked to alert
descriptionDescription of the alertA process attempted to connect to a known malicious domain
severityAlert severitycritical
timestampTime the alert was generated (UTC)2025-09-08T12:30:15Z
armo_account_idCustomer identifier
armo_account_nameCustomer name
incident_guidRelated incident ID
alert_raw_objectComplete alert JSON{...}

Policy Created / Updated / Deleted

FieldDescription
event_typeType of event (policy_created, policy_updated, policy_deleted)
timestampTime of the change
policy_idUnique policy ID
policy_namePolicy name
policy_descriptionPolicy description
policy_typemanaged or custom
created_by / updated_by / deleted_byUser responsible for the change
scopePolicy scope (cluster, namespace, workload, label)
criteriaRisk factors, CVEs
response_actionsResponse actions (report, kill, pause, etc.)
response_quarantineApplied controls (network policy, seccomp profile)
notificationsAlerting channels (Slack, SIEM, email, etc.)
rulesList of rule IDs/names included
enabledBoolean flag indicating if the policy is active

Incident Response Triggered

CategoryFieldDescriptionExample
Core Metadataevent_typeFixed valueresponse_action_triggered
timestampTime executed (UTC)2025-09-08T12:45:30Z
incident_idRelated incident IDINC-99821
incident_nameIncident name
incident_severitySeveritycritical
mitre_tacticATT&CK tacticExecution
mitre_techniqueATT&CK techniqueT1059.004
response_idUnique response IDRESP-77651
Response Action Detailsaction_typeResponse typekill_process, pause_container, etc.
statusResponse outcomesuccess
executed_byActorsystem, [email protected]
policy_idTriggering policy ID
policy_namePolicy nameDetect CryptoMiner Execution
Target ContextclusterCluster nameprod-cluster-1
namespaceNamespacepayments
workloadWorkload namebilling-service
podPod namefrontend-5556f5b46b-qfp
container_nameContainer namebilling-api
container_idContainer runtime ID9a23bc445dfe
nodeNode namenode-7
imageImage nameregistry.company.com/billing:1.2

Risk Acceptance Created / Updated / Deleted

CategoryFieldDescriptionExample
Core Metadataevent_typeEvent type (risk_acceptance_created, risk_acceptance_updated, risk_acceptance_deleted)
timestampTime the event occurred (UTC)2025-09-08T14:12:10Z
risk_acceptance_idUnique record IDRA-4567
rule_idRule ID linked to riskrule-99821
rule_nameRule nameUnexpected process
rule_severitySeverity of the rulecritical
created_by / updated_by / deleted_byUser who made the change[email protected]
scopeAffected scope (cluster, namespace, workload, entity)
reasonJustificationFalse positive - benign process
expiration_dateOptional expiration date2025-10-31T00:00:00Z