Zum Inhalt springen
Prototyp pruefen

Telemetry Schema

This specification defines the telemetry schema: event types, PII classification per field, redaction rules, retention defaults, and export pathways.

Audience: Backend/security engineers, SIEM integrators.


In-ScopeOut-of-Scope
Telemetry event types and their schemasDetection logic
Field-level PII classificationPolicy evaluation
Redaction and hashing rulesCloud infrastructure security
Export pathways (API, webhooks)Dashboard UI

Emitted by the Policy Engine for every detection decision.

{
"event_id": "evt_7f2a9c",
"type": "risk.event.created",
"timestamp": "2026-03-14T14:32:08Z",
"tenant_id": "tenant-acme",
"device_id": "dev_3c8a1f",
"threat_category": "phishing",
"confidence": 0.94,
"action_taken": "block",
"policy_id": "pol_default",
"severity": "high",
"description": "Gefälschte Login-Seite erkannt und blockiert.",
"indicators": ["sha256:a1b2c3d4e5f6..."],
"metadata": {
"agent_version": "0.1.0",
"model_version": "detect-v3.2",
"device_platform": "android"
}
}

Current workspace note: the running prototype uses top-level type and top-level tenant_id for detection events. The broader event taxonomy described below remains a target-state specification.

Emitted when a user takes a security-relevant action.

{
"event_id": "evt_8a3b2c",
"event_type": "user_action",
"timestamp": "2026-03-14T14:33:00Z",
"device_id": "dev_3c8a1f",
"action": "dismiss_warning",
"related_event_id": "evt_7f2a9c",
"metadata": {
"agent_version": "0.1.0",
"device_platform": "android",
"tenant_id": "org_5e9d2a"
}
}

User action types:

ActionDescription
dismiss_warningUser dismissed a warn-level alert
unblock_urlUser overrode a URL block
ignore_threatUser dismissed a threat notification
manual_scanUser initiated a manual scan
approve_appGuardian approved an app installation
deny_appGuardian denied an app installation

Emitted when configuration is modified.

{
"event_id": "evt_9c4d3e",
"event_type": "policy_change",
"timestamp": "2026-03-14T15:00:00Z",
"actor": "user:admin@example.com",
"action": "update_policy",
"target": "pol_family_child",
"old_state": { "action": "warn", "confidence_threshold": 0.5 },
"new_state": { "action": "block", "confidence_threshold": 0.3 },
"metadata": {
"tenant_id": "org_5e9d2a"
}
}

Audit action types:

ActionDescription
update_policyPolicy modified
create_policyNew policy created
delete_policyPolicy removed
rotate_api_keyAPI key rotated
revoke_api_keyAPI key revoked
add_team_memberTeam member added
remove_team_memberTeam member removed
change_roleUser role changed
register_deviceNew device registered
update_alert_ruleAlert rule modified

FieldPII?CategoryExternal Delivery
event_idNoOperationalTransmitted
timestampNoOperationalTransmitted
device_idPseudonymousDevice identifierTransmitted (opaque ID)
threat_categoryNoOperationalTransmitted
confidenceNoOperationalTransmitted
action_takenNoOperationalTransmitted
policy_idNoOperationalTransmitted
severityNoOperationalTransmitted
descriptionPotentiallyMay contain redacted contextTransmitted (redacted)
indicatorsNoSHA-256 hashes onlyTransmitted
metadata.agent_versionNoOperationalTransmitted
metadata.model_versionNoOperationalTransmitted
metadata.device_platformNoOperationalTransmitted
tenant_idPseudonymousOrganization identifierTransmitted (opaque ID)
Data TypeReason
Message content (email, chat)Privacy: never leaves device
Audio contentPrivacy: processed in RAM only
Phone numbers (plaintext)Privacy: only SHA-256 hashes
URLs (full)Privacy: only SHA-256 hashes
IP addresses (full)Privacy: truncated to /24 or /48
File contentsPrivacy: never leaves device
Contact informationPrivacy: not accessed by agent

Applied before any data leaves the device for cloud transmission or external delivery.

Data TypeRedaction MethodExample
PII (email)Replaced with [REDACTED]admin@example.com[REDACTED]
PII (name)Replaced with [REDACTED]Max Mustermann[REDACTED]
PII (phone number)SHA-256 hash+49 30 123456sha256:a1b2c3...
URLsSHA-256 hashhttps://evil.com/loginsha256:d4e5f6...
IP addresses (IPv4)Truncated to /24192.168.1.42192.168.1.0/24
IP addresses (IPv6)Truncated to /48Full → /48 prefix
Message contentNot includedNever present in telemetry

Scope: Cloud transmission and external delivery only. Local Event Store (AES-256 encrypted) retains full unredacted data.


Event TypeLocal RetentionCloud RetentionStatus
Detection eventsTarget: 90 daysTarget: 180 daysNot confirmed by current workspace
User action eventsTarget: 90 daysTarget: 180 daysNot confirmed by current workspace
Policy change events (audit)Target: 90 daysTarget: 12 monthsNot confirmed by current workspace
Aggregated metricsN/ATarget: 24 months (then anonymized)Not confirmed by current workspace

Deletion: Irreversible. Early deletion requestable via dashboard or API.


  • Endpoint: Configurable HTTPS URL
  • Format: JSON (canonical event schema)
  • Signing: HMAC-SHA256 (X-Superheld-Signature)
  • Delivery: At-least-once with exponential backoff
  • Filtering: By severity, threat category
  • Endpoint: GET /events
  • Pagination: Cursor-based (cursor + limit)
  • Filtering: since (ISO 8601), severity, threat_category
  • Format: JSON array with has_more and cursor
Superheld FieldCommon SIEM FieldCEF Field
event_idEvent IDexternalId
timestampEvent Timert
device_idSource Hostshost
threat_categoryCategorycat
severitySeverityseverity
action_takenActionact
confidenceConfidencecfp1

Documented export target: CEF mapping as shown below. The current workspace does not yet expose a dedicated CEF/syslog delivery path.

CEF:0|Superheld|CloudRelay|1.0|detection|Threat Detected|8|externalId=evt_7f2a9c rt=2026-03-14T14:32:08Z shost=dev_3c8a1f cat=phishing severity=high act=block cfp1=0.94

Syslog (RFC 5424) example:

<134>1 2026-03-14T14:32:08Z superheld-cloud - evt_7f2a9c - - CEF:0|Superheld|CloudRelay|1.0|detection|Threat Detected|8|cat=phishing act=block cfp1=0.94