SourcesSource TypesFormal Security

Formal Security

Collect data access logs from Formal Security, including actor, network, and resource information for comprehensive visibility into data access patterns.

Formal Security supports multiple ingestion methods including S3, Azure Blob Storage, Google Cloud Storage, and Cloudflare R2.

Ingest Methods

Setup the ingestion of this source using one of the following guides.

If using an AWS S3 bucket use the following SNS topic ARN to send your bucket notifications.

arn:aws:sns:<REGION>:253602268883:runreveal_formal_security

Setup

Formal Security logs can be ingested via object storage. Configure your Formal Security instance to export logs to one of the supported storage providers.

Verify It’s Working

Once added, the source logs should begin flowing within a few minutes.

You can validate we are receiving your logs by running the following SQL query.

SELECT * FROM runreveal.logs WHERE sourceType = 'formal-security' LIMIT 1

Schema

The following columns are exposed for this source. RunReveal applies schema normalization across all sources, ensuring uniform field names and data types for cross-source queries and reusable detection logic.

Table: formal_security_logs (22 columns)

ColumnType
idString
receivedAtDateTime
workspaceIDString
sourceTypeString
sourceIDString
eventIDString
eventNameString
eventTimeDateTime
readOnlyBool
srcIPString
resourcesArray(String)
serviceNameString
srcASOrganizationNullable(String)
srcASNumberNullable(UInt32)
srcASCountryCodeNullable(String)
dstIPString
dstASOrganizationNullable(String)
dstASNumberNullable(UInt32)
dstASCountryCodeNullable(String)
actorMap(String, String)
tagsMap(String, String)
rawLogString