SIEM Integration

MITRITY forwards governance events to your existing security information and event management (SIEM) infrastructure. Every policy decision, behavioral anomaly, and drift alert can be delivered to your SIEM in real-time, giving your security team a single pane of glass across agent governance and traditional security operations.

Supported Destinations

Splunk HTTP Event Collector (HEC)

MITRITY sends events to Splunk via the HTTP Event Collector. Events are formatted as structured JSON and indexed into the source type you configure.

Configuration:

FieldValue
Destination URLhttps://your-splunk-instance:8088/services/collector/event
Auth tokenYour Splunk HEC token
Source typemitrity:governance (recommended)
IndexYour designated security index

Events include all governance context: agent ID, action type, policy decision, drift score, behavioral hash delta, and timestamps. Splunk dashboards and saved searches can correlate MITRITY events with your existing security data.

Syslog CEF (QRadar, ArcSight)

For SIEM platforms that consume Common Event Format (CEF) over syslog, MITRITY formats events as CEF messages and delivers them via TCP or UDP syslog.

Configuration:

FieldValue
Destinationsyslog://your-siem:514 (TCP) or syslog+udp://your-siem:514 (UDP)
FormatCEF (Common Event Format)
Facilitylocal0 - local7 (configurable)
Severity mappingDeny/Block = High, Alert = Medium, Allow = Low

CEF field mapping:

CEF FieldMITRITY Value
deviceVendorMITRITY
deviceProductMITRITY Platform
namePolicy name or behavioral_anomaly
severityMapped from policy type
srcAgent ID
actAction type
outcomeallow, deny, alert, hold
cs1Drift score
cs2Behavioral hash

Generic Webhook

For any SIEM or log aggregation platform that accepts HTTP webhooks, MITRITY can POST events as structured JSON to a URL you configure.

Configuration:

FieldValue
Destination URLhttps://your-endpoint/webhook
AuthBearer token, API key header, or no auth
MethodPOST
Content-Typeapplication/json

The webhook payload includes the full event object with all governance context. You can configure retry behavior (up to 3 retries with exponential backoff) and filter which event types are forwarded.

Event Types

You can configure which event types are forwarded to each SIEM destination:

Event TypeDescription
policy.denyAn action was blocked by a deny policy
policy.alertAn action triggered an alert policy
policy.holdAn action was held for human approval
policy.allowAn action was permitted (opt-in, high volume)
drift.warningDrift score exceeded the warning threshold
drift.criticalDrift score exceeded the critical threshold
agent.connectedAn agent connected to the control plane
agent.disconnectedAn agent lost connection to the control plane
hold.approvedA held action was approved by a human
hold.deniedA held action was denied by a human
hold.expiredA held action expired without a decision

By default, all event types except policy.allow are forwarded. Enable policy.allow forwarding only if you need complete audit coverage — it can generate significant volume.

Setup

Configure SIEM integration in the dashboard at Settings > Integrations or via the API:

# Create a Splunk HEC integration
curl -X POST https://api.mitrity.com/api/v1/integrations/siem \
  -H "Authorization: Bearer your-api-key" \
  -H "Content-Type: application/json" \
  -d '{
    "type": "splunk_hec",
    "url": "https://your-splunk:8088/services/collector/event",
    "token": "your-hec-token",
    "source_type": "mitrity:governance",
    "event_types": ["policy.deny", "policy.alert", "policy.hold", "drift.warning", "drift.critical"]
  }'

You can configure multiple SIEM destinations. For example, send high-severity events to your primary SIEM and all events to a long-term log archive.

Troubleshooting

  • Events not arriving: Verify the destination URL is reachable from the MITRITY control plane. Check the integration status in Settings > Integrations — failed deliveries show error details.
  • Duplicate events: MITRITY uses at-least-once delivery. Your SIEM should deduplicate on the event id field.
  • High volume: Filter event types to reduce volume. Disable policy.allow forwarding unless required for compliance.
SIEM Integration — Documentation | MITRITY