Optimizing Security Operations With Palo Alto Networks Cortex XSOAR
Optimizing Security Operations With Palo Alto Networks Cortex XSOAR
Optimizing Security
Operations with
Palo Alto Networks’
Cortex XSOAR
Written by Matt Bromiley
June 2024
Cortex XSOAR
Our examination of Cortex XSOAR began with all products at the initial dashboard. A
product’s initial dashboard is always a good starting point because many security tools
are utilized by junior
analysts, executives,
and everyone in
between. The initial
dashboard is an
opportunity to quickly
answer “What is going
on?” for all viewers. In
Figure 1, XSOAR answers
that question.
XSOAR provides a wealth of options and capabilities, many of which work together to create a
seamless experience for security teams. However, like any tool or platform, the adage “garbage in,
garbage out” always applies. Ensure that your team utilizes XSOAR with the best available telemetry
to lessen the burden on the SOC.
In Figure 2, you can see XSOAR offers prebuilt dashboards that focus on metrics such as:
• “My Threat Landscape”
• SLAs
• Troubleshooting
• Incidents
• Cost optimization playbooks
Reporting is an equally powerful feature within XSOAR’s platform. Out of the box, XSOAR
includes a wealth of rich reports for all needs. See Figure 3.
• Time-based reports, such as activity within the past 24 hours or seven days
• Metric-based reports, such as Mean Time to Resolve or late incidents (past an SLA)
Reporting is not just a way to represent active data. It can also be a powerful vehicle for
generating insight to answer questions about optimization and efficiency. For example,
are response or remediation times too slow or too fast? Can we use reports to adjust
metrics on a monthly or quarterly basis? Are there incidents or issues that took too long
to resolve, necessitating an adjustment to our processes? You can only begin to answer
these questions with high-level insights into your data.
Incidents
The Incidents tab provides insight into incidents within Cortex XSOAR. Cortex XSOAR’s
classification engine streamlines security analysis by automatically categorizing incoming
alerts based on their content. This assigns predefined incident types (e.g., Malware,
Phishing) to each alert, enabling analysts to focus on the most relevant incidents. Figure 6
provides a snippet of the Incidents dashboard.
• Response and IOC actions that can be executed with a single button click
These quick response and IOC actions, including endpoint isolation, file quarantine, and
tagging an IOC for allow/deny lists, factor into the split-second decisions an analyst might
need to make to identify and stop a threat. Adversaries often introduce new techniques
and capabilities that playbooks may not act on but are still detected.
Sometimes, the placement of certain response
Having easily customizable response actions up front significantly cuts actions and capabilities within a tool or platform
down on response and remediation times, a goal for any security team. can seem trivial. In many cases, however, the faster
an analyst or responder can get to where they need
Integrated Case Management to be, the faster their response decisions can be.
With XSOAR, everything was quickly at our fingertips,
Far too often, security teams are stuck in conference rooms with resulting in less hesitation.
whiteboards and phone bridges, trying to work with remote teams.
Palo Alto looked at solving this issue within XSOAR, particularly in its case management
capabilities. Necessary for effective security triage and response, incident management
is a must-have. XSOAR’s built-in case management capabilities, such as the War Room,
provide real-time investigation into an incident. This ChatOps-powered capability allows
analysts to:
Analysts can open and close tickets directly from the War Room, providing a “single-stop”
area for key incident and investigation analysis.
Threat Intelligence
One of the more powerful capabilities of XSOAR is its integration
The Threat Intelligence module allows SOCs to manage
within Palo Alto Networks’ Cortex ecosystem. As seen in the multiple
their own threat feeds, including a combination of
Incidents screenshots presented so far, XDR can be a powerful source open source, industry, and paid feeds. This is a driving
of telemetry. Threat intelligence feeds and more (see sidebar) can be feature that integrates within the platform and assists
fed into XSOAR, as part of the larger Cortex ecosystem. Although other with threat intelligence management—a much-needed
feature for enterprise SOCs.
Cortex products are outside the scope of this product review, we cannot
overstate from how powerful a single-platform approach is.
In many cases, security analysts will not begin at a threat intelligence page. For example,
if you needed to triage the incidents in your organization, you wouldn’t start by asking,
“What types of malware have been observed?” Often, supporting metadata and other key
points are included as part of the alert or rolled-up incident. Being able to drill down into
those details and understand why something was determined to be malicious, however,
is exactly the additional support analysts require. As we pointed out earlier, the faster
analysts can access the relevant information they need to make decisions, the faster they
can make those decisions.
As seen in Figure 9, XSOAR provides a wealth of data points about an investigation. The Figure 9. Snippet of an IOC as
Identified in XSOAR’s Threat
importance of this screen, and making it accessible to security analysts, is critical. XSOAR Intelligence Pane
isn’t simply displaying metadata; it is displaying relationships and analysis-driving data.
For example,
• Related incidents provide a quick, high-level answer to “Where have we seen this?”
In many cases, threat intelligence may provide context about a threat without
confirming whether it’s part of an active incident.
• The Timeline feature shows the lifecycle of an IOC, from initial classification to
granular updates. This is critical for understanding the “newness” of a threat.
• Additional data points, such as the Verdict, help drive an understanding of why
something was flagged as malicious.
All in all, the threat intelligence section not only provides resources on incident or case
enrichment, but also can act as a “self-serve” capability for analysts looking to drill
further into why or how something was classified as malicious. The end result? Analysts
are adequately informed to make better decisions or craft more precise playbooks.
time to get familiar with the platform’s capabilities and expand their understanding while
still receiving some forms of protection.
XSOAR has powerful integration capabilities. There are hundreds of integrations, allowing
customers to build their own approach. Customers can utilize their own plug-ins, APIs,
and data enrichment capabilities as they see fit. At no point did we see XSOAR define the
“right” way; rather, it provides a myriad of options to tune the tool as needed. In short,
XSOAR users can bring their own tech or capabilities to the table, and XSOAR can utilize
that technology to enable and expand current capabilities.
As the security landscape continues to evolve, platforms such as XSOAR will play an
important role in empowering and enabling SOCs to defend against threats of today and
tomorrow. However, even the best laid plans and tools can go to waste if not properly
tuned or trained to the needs of their host environment. Taking the time to utilize a
complete and capable platform such as Cortex XSOAR is an investment that will surely
arm your team for the threats of tomorrow.
Sponsor