Once a SIEM integration (for example, Microsoft Sentinel, Splunk, Sumo Logic or Webhook) is configured in the ARMO Platform, the following events are automatically streamed in real time.
This integration provides full observability, audit trail, and incident correlation across your runtime, compliance, and policy changes, helping SOC and SecOps teams respond faster and with context.
SIEM Streaming Trigger Events
The ARMO Platform streams events whenever key system, policy, or runtime actions occur.
Incident Lifecycle Events
Event
Description
Incident Created
A new runtime incident is detected and opened.
Incident Updated
The incident status or details are updated (for example, status change or new alert added).
Policy & Rule Changes
Event
Description
Runtime Policy Created
A new threat detection policy is created.
Runtime Policy Updated
An existing policy is modified (for example, rule conditions, scope, criteria, or response).
Runtime Policy Deleted
A threat detection policy is deleted.
Response Action Events
Event
Description
Response Action Triggered
A response (for example, container kill, pause, network policy, or seccomp profile) is executed.
Risk Acceptance Events
Event
Description
Risk Acceptance Created
A new risk acceptance rule is defined to suppress specific incidents.
Risk Acceptance Updated
An existing risk acceptance is modified (for example, scope, justification, or expiration date).
Risk Acceptance Deleted
A risk acceptance rule is removed.
Data Schema: Fields Streamed to SIEM
Each event type includes structured fields that can be mapped to your SIEM data model for search, correlation, and reporting.
Incident Created / Updated
Category
Field
Description
Example
Core Metadata
event_type
Fixed value
incident_created
first_seen
Time the incident was generated (UTC)
2025-09-08T12:30:15Z
last_seen
Time the incident was last updated (UTC)
2025-09-08T12:30:15Z
armo_account_id
Customer account identifier
f1d2d2f924e986ac86fdf7b36c94bcdf
armo_account_name
Customer account name
ACME Corp
incident_id
Unique identifier for the incident
INC-10382
status
Current status
open
Incident Details
incident_name
Short title
Suspicious process execution detected
rule_id
ID of the triggering rule
rule_name
Name of the triggering rule
description
Detailed description of the incident
A process attempted to connect to a known malicious domain