Sigma Detection Rules bring a flexible and standardized way to define detection logic using YAML-based structures. Inspired by the open Sigma format but adapted to Inopli’s internal data model, these rules allow analysts to describe correlations and matching conditions in a clear, human-readable form that abstracts away backend query language dependencies.
This rule type is especially useful for analysts familiar with SOC practices or SIEM rule writing, enabling fast onboarding and reusable logic across clients and use cases.
Rule Structure
Each Sigma rule is written in YAML format and includes:
Metadata
Descriptive fields like title, id, description, status, level, tags, and author
Detection Logic
Conditions are expressed using field-value maps, lists, and logical operators. Inopli supports selection, filter, condition blocks.
Trigger Definition
Conditions evaluate the presence of fields or values in the DRP dataset. When a rule is matched, it is escalated following the defined severity level.
Detect exposure of internal identifiers or keywords
Alert on findings linked to specific attack techniques
Build reusable rules for sector-specific monitoring
Incident Triggering
Once matched, Sigma rules follow the same workflow as other rule types: they enrich the finding and, if not filtered as false positive, trigger an incident in the Response module.