Splunk Soar
Splunk Soar
50 SPLUNK
SOAR GUIDED
AUTOMATION
BY IZZMIER IZZUDDIN
LIST OF USE CASES
1. Navigate to Playbooks:
o Click Automation > Playbooks > Create New Playbook.
2. Select Visual Editor: Choose the drag-and-drop visual editor for ease of use.
1. Trigger Node:
o Add a Trigger node to detect new alerts in the connected SIEM (Splunk,
QRadar).
o Configure the trigger to activate when an alert with IOCs (IPs, URLs, hashes)
is received.
2. Extract IOCs Node:
o Use the Artifact Extraction action to parse IOCs from the alert.
o Extract indicators such as suspicious IPs, URLs and hashes.
3. VirusTotal Enrichment Node:
o Add an Action node.
o Configure it to call the VirusTotal API for reputation checks on extracted
IOCs.
o Input the IOC data into the API request.
4. Decision Node:
o Add a decision node to check the threat score or reputation from VirusTotal.
o Example:
§ If the score > 75, mark it as "High Risk."
§ If the score ≤ 75, mark it as "Low Risk."
5. Update Case Node:
o Add an Update Artifact action to enrich the original alert with data retrieved
from VirusTotal.
6. Notify Analyst Node:
o Add a Send Email action to notify the SOC analyst with a summary of
findings.
Step 4: Save and Test the Playbook
1. Simulate Alert:
o Use Splunk SOAR’s simulation environment to generate a mock alert with a
malicious IP (192.168.1.100).
2. Run the Playbook:
o Observe the workflow executing step-by-step:
§ Alert triggers extraction of the IOC.
§ VirusTotal API is queried, returning the IP's reputation (malicious, with
a threat score of 85).
§ The alert is updated with enrichment data.
§ A notification email is sent to the analyst.
3. Review Output:
o Check the enriched alert in the case management system.
o Confirm data accuracy and notification delivery.
1. Navigate to Playbooks:
o Click on Automation > Playbooks > Create New Playbook.
2. Choose Editor:
o Select the drag-and-drop visual editor for ease of workflow creation.
1. Trigger Node:
o Add a trigger to listen for ransomware-related alerts from the SIEM.
o Example trigger condition:
§ Alert type: File activity anomaly (mass encryption or file extensions
like .lock).
§ Alert source: Endpoint Detection and Response (EDR), e.g.,
CrowdStrike, Carbon Black or Splunk.
2. Enrichment Node:
o Use VirusTotal API to analyse suspicious file hashes or domains associated
with the alert.
o Append reputation scores and threat intelligence data to the alert.
3. Isolate Endpoint Node:
o Integrate with EDR tools (CrowdStrike) to issue a "Network
Quarantine" command for the infected endpoint.
o Configure the node to include:
§ Hostname or IP of the infected system.
§ Confirmation of isolation status.
4. File Backup/Recovery Node:
o Check if shadow copies or backups exist on the affected endpoint using
PowerShell scripts or native EDR capabilities.
o Attempt recovery if available.
5. Notification Node:
o Use the Send Email or Send Message action to notify the incident response
team about:
§ Affected endpoint details.
§ Enriched IOC data.
§ Actions taken (isolation, backup recovery attempt).
6. Decision Node:
o Add a Decision Node to escalate or close the alert:
§ Escalate: If the alert is confirmed as ransomware.
§ Close: If the alert is a false positive.
7. Forensic Collection Node (Optional):
o Use endpoint tools to collect forensic evidence, such as memory dumps or
disk images, for further analysis.
• KPIs:
o Time to isolate endpoint: Target <1 minute.
o Ransomware spread prevention: Target 100%.
o Accuracy of detections: Target >95%.
• Use Splunk SOAR’s built-in dashboards to analyse playbook performance and make
improvements.
Use Case 3: Phishing Email Investigation and Response
• Data Sources:
o Email Gateway (Microsoft Exchange, Proofpoint).
o Threat Intelligence platforms (VirusTotal, URLhaus).
o SIEM (to correlate email-related alerts).
• Integrations in Splunk SOAR:
o Email client (Microsoft Exchange).
o Threat intelligence (VirusTotal for IOC reputation).
o Sandbox (Cuckoo or Joe Sandbox for attachment analysis).
1. Navigate to Playbooks:
o In the Splunk SOAR interface, go to Automation > Playbooks and create a
new one.
2. Name the Playbook:
o Title: "Phishing Email Investigation and Response."
o Select Visual Editor for creating the workflow.
1. Trigger Node:
o Configure a trigger to activate the playbook when an email is flagged as
suspicious.
o Trigger source: Email Gateway (Proofpoint alert or a reported phishing
email).
2. Email Parsing Node:
o Use the "Get Email" action to extract:
§ Subject.
§ Sender address.
§ Email body.
§ URLs and attachments.
3. IOC Enrichment Node:
o URL Analysis:
§ Send URLs from the email to VirusTotal or URLhaus for reputation
scoring.
o Attachment Analysis:
§ Submit suspicious attachments to a sandbox (Joe Sandbox) for
behavioral analysis.
o Append results (malicious/benign verdicts) to the email artifact.
4. Decision Node:
o Add a decision point:
§ If IOC is flagged malicious: Proceed with mitigation actions.
§ If IOC is benign: Close the ticket as a false positive.
5. Mitigation Node:
o Use email integration to:
§ Quarantine the malicious email in the user’s inbox.
§ Block the sender’s email domain in the Email Gateway.
o Use SIEM integration to:
§ Search for similar emails across the organisation and quarantine
them.
6. Notification Node:
o Notify the affected user and the Incident Response team:
§ User Notification: Warn the user about the phishing email and
confirm it is quarantined.
§ IR Team Notification: Include details of the investigation, including:
§ IOC results.
§ Actions taken.
§ Any spread within the organisation.
• KPIs:
o Time to quarantine phishing email: Target <5 minutes.
o Number of false positives identified.
o Total phishing attempts mitigated.
• Use Splunk SOAR’s dashboards and reports to analyse the playbook’s performance
and make necessary optimisations.
Use Case 4: Malware Detection and Containment on Endpoint
• Data Sources:
o Endpoint Detection and Response (EDR), e.g., CrowdStrike, SentinelOne.
o Antivirus/Antimalware solutions, e.g., Symantec, Trend Micro.
o Threat Intelligence platforms, e.g., VirusTotal, Hybrid Analysis.
• Integrations in Splunk SOAR:
o EDR (CrowdStrike for isolating endpoints).
o Threat Intelligence (VirusTotal for IOC reputation checks).
o Sandbox (Joe Sandbox for behavioral analysis).
1. Navigate to Playbooks:
o In Splunk SOAR, go to Automation > Playbooks and create a new playbook.
2. Name the Playbook:
o Title: "Malware Detection and Containment on Endpoint."
o Use the Visual Editor for workflow creation.
1. Trigger Node:
o Configure the trigger to activate the playbook when a malware detection
alert is generated by the EDR or antivirus system.
o Example source: EDR alert for suspicious file execution or flagged
processes.
2. Enrichment Node:
o File Hash Analysis:
§ Extract the hash of the suspected malware file and query VirusTotal or
Hybrid Analysis for its reputation.
o Behavioral Analysis:
§ If the file hash is unknown, submit the file to a sandbox (Joe Sandbox)
for dynamic analysis.
o Process Analysis:
§ Use EDR integration to analyse running processes on the affected
endpoint and identify anomalies.
3. Decision Node:
o Add a decision point based on enrichment results:
§ If the file/process is malicious: Proceed with containment actions.
§ If benign: Close the alert as a false positive.
4. Containment Node:
o Isolate Endpoint:
§ Use EDR to isolate the affected endpoint from the network to prevent
lateral movement.
o Terminate Malicious Processes:
§ Kill the identified malicious processes using EDR commands.
o Delete Malicious Files:
§ Use antivirus integration to remove the malicious file(s).
5. Mitigation Node:
o Update Threat Feeds:
§ Add the malicious file hash, domain or IP to the blocklist in firewalls
or EDR policies.
o Patch and Hardening Recommendations:
§ Run vulnerability scans on the endpoint and recommend patching or
configuration changes to prevent similar attacks.
6. Notification Node:
o Notify the Incident Response (IR) team and SOC:
§ Details of the malware.
§ Actions taken (isolation, process termination, file deletion).
§ Recommendations for further remediation.
7. Post-Incident Action Node:
o Run a comprehensive malware scan on the isolated endpoint.
o Collect forensic artifacts (memory dump, logs) for deeper analysis.
1. Assign the playbook to handle all malware-related alerts from EDR and antivirus
systems automatically.
2. Monitor its execution and performance in live incidents.
• KPIs:
o Time to detect and contain malware: Target <10 minutes.
o Reduction in lateral movement attempts.
o Number of malware infections successfully mitigated.
• Use Splunk SOAR’s built-in dashboards to track and analyse playbook
performance.
Use Case 5: Insider Threat Detection and Management
• Data Sources:
o User behavior analytics (UBA) systems for anomaly detection.
o SIEM for suspicious activity alerts (unauthorised file access, abnormal
working hours).
o DLP (Data Loss Prevention) tools for data exfiltration monitoring.
o File servers and collaboration tools (SharePoint, OneDrive) for access logs.
• Integrations in Splunk SOAR:
o UBA tools for suspicious user activity detection.
o SIEM platforms like Splunk Enterprise Security.
o Endpoint detection and response (EDR) tools for monitoring user endpoints.
o Identity and access management (IAM) systems for user account details and
privilege changes.
1. Navigate to Playbooks:
o Go to Automation > Playbooks in Splunk SOAR and click Create Playbook.
2. Name the Playbook:
o Title: "Insider Threat Detection and Response."
o Use the Visual Editor to build the workflow.
1. Trigger Node:
o Configure the playbook to trigger on alerts for insider threats detected by
UBA or SIEM, such as:
§ Abnormal access patterns.
§ Large file downloads.
§ Access to sensitive files outside of working hours.
2. Enrichment Nodes:
o User Profile Analysis:
§ Fetch user account details from IAM systems (role, privileges, recent
activity).
o Behavioral Analysis:
§ Compare the user’s activity against baseline behavior using UBA
tools.
o File Access Analysis:
§ Investigate accessed files for sensitivity and classification levels.
o Endpoint Activity Check:
§ Query EDR tools for suspicious activity on the user’s endpoint.
3. Decision Node:
o Add decision points based on enrichment results:
§ If activity is confirmed malicious: Proceed to containment actions.
§ If activity is suspicious but inconclusive: Escalate for manual
investigation.
§ If activity is false positive: Close the case.
4. Containment Nodes:
o Revoke Access:
§ Disable the user account or restrict access to sensitive systems using
IAM systems.
o Isolate Endpoint:
§ Use EDR tools to isolate the user’s device from the network.
o Audit Log Retention:
§ Ensure all activity logs are stored for forensic analysis.
5. Mitigation Nodes:
o Notify Management:
§ Alert the security and HR teams for further action.
o User Education:
§ If activity was non-malicious (negligence), schedule a security
awareness training session for the user.
6. Post-Incident Action Nodes:
o Threat Intelligence Update:
§ Add any discovered IOCs or patterns to insider threat detection
systems.
o Policy Review:
§ Recommend changes to access policies or monitoring thresholds if
gaps are identified.
o Incident Reporting:
§ Automatically generate a report summarising the incident, actions
taken and outcomes.
1. Automate the playbook to run on UBA or SIEM alerts related to insider threats.
2. Regularly update the playbook to account for new insider threat patterns.
• KPIs:
o Time to detect and contain insider threats: Target <30 minutes.
o Reduction in unauthorised data access incidents.
o Number of false positives flagged and resolved.
Use Case 6: Data Exfiltration Monitoring and Response
• Data Sources:
o Network monitoring tools for unusual outbound traffic (large file transfers).
o DLP systems for tracking sensitive data movement.
o SIEM for exfiltration alerts and logs.
o Firewall and proxy logs for tracking suspicious connections.
• Integrations in Splunk SOAR:
o Network traffic analysis tools (Zeek, NetFlow).
o Endpoint detection and response (EDR) tools for endpoint activity logs.
o Threat intelligence services to verify destination IPs and domains.
o Cloud storage monitoring tools for unauthorised uploads.
1. Navigate to Playbooks:
o Go to Automation > Playbooks in Splunk SOAR and click Create Playbook.
2. Name the Playbook:
o Title: "Data Exfiltration Monitoring and Response."
o Use the Visual Editor to build the workflow.
1. Trigger Node:
o Configure the playbook to trigger on:
§ Alerts from DLP systems.
§ SIEM anomalies, such as large outbound data transfers or
unauthorised uploads.
2. Enrichment Nodes:
o Traffic Analysis:
§ Query network monitoring tools for details on outbound connections
flagged as suspicious.
o Destination Analysis:
§ Use threat intelligence to check if the destination IP/domain is
malicious or unusual.
o File Analysis:
§ Examine file types, sizes and metadata to determine the sensitivity of
data being transferred.
o Endpoint Activity Check:
§ Inspect the endpoint involved in the exfiltration attempt using EDR
tools.
3. Decision Node:
o Add decision points based on enrichment results:
§ If confirmed malicious activity: Proceed to containment actions.
§ If activity is suspicious but not confirmed: Escalate for manual
investigation.
§ If activity is a false positive: Close the case.
4. Containment Nodes:
o Block Traffic:
§ Use firewalls or proxy tools to block the suspicious outbound
connection.
o Isolate Endpoint:
§ Leverage EDR tools to isolate the endpoint from the network.
o Suspend User Account:
§ Disable the associated user account in IAM systems to prevent
further activity.
5. Mitigation Nodes:
o Alert Security Team:
§ Notify the SOC team for detailed investigation and further action.
o Notify Affected Parties:
§ Alert stakeholders if sensitive customer or business data was
potentially compromised.
6. Post-Incident Action Nodes:
o Forensic Analysis:
§ Collect and analyse evidence, such as logs, to determine the extent
of the exfiltration.
o Threat Intelligence Update:
§ Add newly discovered malicious IPs, domains or file signatures to the
threat database.
o Review and Update Policies:
§ Recommend updates to access controls, DLP rules or monitoring
thresholds.
1. Automate the playbook to run on DLP and SIEM alerts for potential data exfiltration.
2. Continuously refine the playbook based on new exfiltration tactics and incident
outcomes.
• KPIs:
o Time to detect and respond to exfiltration attempts: Target <15 minutes.
o Reduction in successful data exfiltration incidents.
o Volume of sensitive data protected from unauthorised transfers.
Use Case 7: Brute Force Attack Mitigation
• Data Sources:
o SIEM for login failure alerts and anomalies in authentication logs.
o IAM systems for user account lockout status.
o EDR tools for endpoint login attempts.
o Firewall and network monitoring tools for traffic patterns indicating brute
force attempts.
• Integrations in Splunk SOAR:
o Authentication logs from services like Active Directory, Okta or Azure AD.
o Network firewalls for IP blocking.
o Threat intelligence services to verify IP reputations.
o VPN and endpoint logs to detect brute force on remote access systems.
1. Navigate to Playbooks:
o Go to Automation > Playbooks in Splunk SOAR and click Create Playbook.
2. Name the Playbook:
o Title: "Brute Force Attack Mitigation."
o Use the Visual Editor to build the workflow.
1. Trigger Node:
o Configure the playbook to trigger on:
§ Multiple consecutive failed login attempts from the same IP.
§ High volume of login attempts within a short time window flagged by
SIEM.
2. Enrichment Nodes:
o User Account Analysis:
§ Check the status of the targeted user account in IAM systems (locked,
active, privileged).
o Source IP Analysis:
§ Use threat intelligence to verify if the source IP is known for malicious
activity.
o Network Traffic Analysis:
§ Inspect network logs for patterns of brute force behavior, such as
repeated connections to authentication services.
3. Decision Node:
o Add decision points based on enrichment results:
§ If confirmed brute force attack: Proceed to containment actions.
§ If activity is inconclusive: Escalate for manual review.
§ If activity is false positive: Close the case.
4. Containment Nodes:
o Block IP Address:
§ Use firewalls to block the source IP of the attack.
o Lock User Account:
§ Automatically lock the targeted user account to prevent further
unauthorised attempts.
o Isolate Endpoint:
§ Isolate any endpoint involved in the brute force attempt using EDR
tools.
5. Mitigation Nodes:
o Notify SOC Team:
§ Alert the security team with details of the incident and actions taken.
o Password Reset:
§ Force a password reset for the targeted user account if there is a risk
of compromise.
6. Post-Incident Action Nodes:
o Update Threat Intelligence:
§ Add malicious IPs to the blocklist for future prevention.
o Audit Logs:
§ Retain logs of the brute force attack for further analysis and
compliance purposes.
o Policy Review:
§ Review and update password policies, lockout thresholds and
monitoring rules to reduce future brute force attempts.
1. Automate the playbook to trigger on brute force detection rules in SIEM or network
monitoring systems.
2. Regularly refine the playbook based on attack patterns and feedback from the SOC
team.
• KPIs:
o Time to detect and mitigate brute force attacks: Target <10 minutes.
o Reduction in successful brute force compromises.
o Number of false positives versus legitimate detections.
Use Case 8: Suspicious Login and Access Investigation
• Data Sources:
o SIEM for anomalous login alerts (geolocation anomalies, multiple logins in
short intervals).
o IAM systems for access control logs and user account activities.
o VPN logs for unusual remote access behavior.
o Cloud monitoring tools for suspicious access in cloud environments.
• Integrations in Splunk SOAR:
o Threat intelligence platforms for validating IPs and geolocations.
o Authentication and access control logs (Active Directory, Okta, Azure AD).
o EDR solutions for endpoint activity related to suspicious logins.
o Cloud monitoring tools like AWS CloudTrail or Microsoft Azure Monitor.
1. Navigate to Playbooks:
o Go to Automation > Playbooks in Splunk SOAR and click Create Playbook.
2. Name the Playbook:
o Title: "Suspicious Login and Access Investigation."
o Use the Visual Editor to build the workflow.
1. Trigger Node:
o Configure the playbook to trigger on:
§ Alerts from SIEM for login anomalies (impossible travel, unusual
geolocations).
§ Failed or repeated login attempts followed by successful access.
§ Unauthorised attempts to access critical systems or files.
2. Enrichment Nodes:
o Geolocation Check:
§ Query the login's originating IP address and compare it with the user's
usual locations.
o User Behavior Analysis:
§ Examine recent user activities (login times, accessed systems) for
anomalies.
o Threat Intelligence Lookup:
§ Check the originating IP against threat intelligence feeds for known
malicious actors.
o Endpoint Investigation:
§ Inspect endpoints used during the suspicious login for malicious
activities or tools.
3. Decision Node:
o Add decision points based on enrichment results:
§ If confirmed suspicious login: Proceed to containment actions.
§ If inconclusive activity: Escalate for manual investigation.
§ If false positive: Close the case.
4. Containment Nodes:
o Block IP Address:
§ Use firewalls to block the suspicious IP.
o Force User Logoff:
§ Terminate the suspicious session in IAM systems.
o Lock User Account:
§ Temporarily lock the account to prevent further misuse.
5. Mitigation Nodes:
o Notify SOC Team:
§ Send detailed information about the incident to the security team.
o Force Password Reset:
§ Require the user to reset their password if the account was
compromised.
6. Post-Incident Action Nodes:
o Forensic Analysis:
§ Investigate compromised accounts and endpoints to determine the
root cause.
o Threat Intelligence Update:
§ Add malicious IPs or indicators to blocklists for future detection.
o Review Access Policies:
§ Recommend tightening access controls or adding multi-factor
authentication (MFA) if not already implemented.
1. Automate the playbook to trigger on login anomalies from SIEM or IAM alerts.
2. Continuously refine rules for identifying suspicious logins based on incident trends
and SOC feedback.
• KPIs:
o Time to detect and respond to suspicious logins: Target <10 minutes.
o Number of compromised accounts successfully contained.
o Volume of false positives minimised through tuning and playbook
improvements.
Use Case 9: Endpoint Detection and Response (EDR) Automation
• Data Sources:
o Alerts from EDR platforms (CrowdStrike Falcon, Carbon Black, SentinelOne).
o SIEM alerts for endpoint anomalies.
o Threat intelligence feeds for validating suspicious files, processes and
domains.
• Integrations in Splunk SOAR:
o EDR Tools: CrowdStrike Falcon, Carbon Black or Microsoft Defender ATP.
o Threat Intelligence: VirusTotal, Recorded Future or ThreatConnect.
o Sandboxing Tools: Joe Sandbox, Cuckoo Sandbox for malware analysis.
o Ticketing Systems: Jira or ServiceNow for incident management.
1. Navigate to Playbooks:
o Open Splunk SOAR, go to Automation > Playbooks and select Create
Playbook.
2. Name the Playbook:
o Title: "Endpoint Detection and Response Automation."
o Use the Visual Editor for workflow creation.
1. Trigger Node
2. Enrichment Nodes
3. Decision Nodes
4. Containment Nodes
• Isolate Endpoint:
o Automatically quarantine the affected device via EDR tools.
• Kill Malicious Process:
o Terminate suspicious processes or services flagged during analysis.
• Block Malicious IPs or Domains:
o Update firewalls or endpoint rules to block malicious traffic.
5. Mitigation Nodes
• Remediate Files:
o Delete or quarantine malicious files.
• Patch Vulnerabilities:
o Apply patches to close known vulnerabilities exploited in the attack.
6. Notification Nodes
• Forensic Analysis:
o Retrieve endpoint memory and disk snapshots for detailed analysis.
• IOC Update:
o Add newly identified indicators of compromise to the threat intelligence
database.
• Review Endpoint Policies:
o Evaluate and update endpoint protection policies as needed.
• KPIs:
o Mean time to respond (MTTR) to EDR alerts: Target <15 minutes.
o Number of incidents mitigated before causing impact.
o False positive rate for EDR alerts.
Use Case 10: Cloud Security Incident Handling
• Data Sources:
o Cloud provider logs (AWS CloudTrail, Azure Monitor, Google Cloud Logging).
o Alerts from cloud security tools (AWS GuardDuty, Azure Security Center).
o SIEM alerts for cloud-specific anomalies.
• Integrations in Splunk SOAR:
o Cloud Services: AWS, Azure, Google Cloud.
o Threat Intelligence: VirusTotal, Shodan or Recorded Future for validating IPs
and domains.
o IAM Management: Tools for managing user privileges and access (AWS IAM,
Azure Active Directory).
o Ticketing Systems: Jira or ServiceNow for incident tracking.
1. Navigate to Playbooks:
o Open Splunk SOAR, go to Automation > Playbooks and select Create
Playbook.
2. Name the Playbook:
o Title: "Cloud Security Incident Handling."
o Use the Visual Editor for workflow creation.
1. Trigger Node
2. Enrichment Nodes
• IP Reputation Check:
o Validate the IP address of suspicious activities via VirusTotal or Recorded
Future.
• Resource Misconfiguration Validation:
o Use cloud provider APIs to query resource configurations for compliance.
• Access Pattern Analysis:
o Analyse IAM logs to identify unusual access attempts or privilege
escalations.
3. Decision Nodes
4. Containment Nodes
• Revoke Access:
o Disable the compromised user account or role.
• Restrict Network Traffic:
o Apply firewall rules to block malicious IPs or regions.
• Snapshot Resource State:
o Take a snapshot of affected cloud resources for further analysis.
5. Mitigation Nodes
• Correct Misconfigurations:
o Automatically adjust resource configurations to meet security policies.
• Terminate Malicious Sessions:
o End active sessions tied to compromised accounts.
6. Notification Nodes
• Forensic Analysis:
o Analyse logs and resource states for root cause identification.
• Compliance Verification:
o Verify cloud resources against compliance frameworks like CIS or NIST.
• Update IAM Policies:
o Revise and enforce stricter IAM policies.
• KPIs:
o Mean time to detect (MTTD) and respond (MTTR) to cloud security incidents.
o Number of misconfigured resources corrected automatically.
o Reduction in unauthorised access attempts.
Use Case 11: Cryptojacking Detection and Mitigation
• Data Sources:
o Endpoint Detection and Response (EDR), e.g., CrowdStrike or Carbon Black.
o Network Monitoring Tools, e.g., Zeek (Bro) or Splunk Stream.
o Threat Intelligence, e.g., VirusTotal or AbuseIPDB.
• Integrations in Splunk SOAR:
o SIEM (Splunk for correlating mining-related alerts).
o Firewall (Palo Alto Networks for blocking malicious traffic).
o EDR (CrowdStrike for isolating compromised endpoints).
1. Navigate to Playbooks:
o In Splunk SOAR, go to Automation > Playbooks and create a new playbook.
2. Name the Playbook:
o Title: "Cryptojacking Detection and Mitigation."
o Use the Visual Editor to design the workflow.
1. Trigger Node:
o Set a trigger to activate the playbook based on:
§ High CPU usage alerts from endpoints.
§ Network traffic to known mining pools or suspicious domains.
o Example source: SIEM or EDR alerts.
2. Enrichment Node:
o Process Analysis:
§ Query the affected endpoint for processes consuming high CPU/GPU.
o Network Traffic Analysis:
§ Query network logs for connections to known cryptocurrency mining
pool IPs/domains.
o Threat Intelligence:
§ Use VirusTotal or AbuseIPDB to check if identified domains or IPs
have been flagged as malicious.
3. Decision Node:
o Add a decision point based on enrichment data:
§ If IOC is confirmed malicious: Proceed with mitigation.
§ If IOC is benign: Close the alert as a false positive.
4. Isolation Node:
o Use EDR to isolate the compromised endpoint from the network.
o Include details such as:
§ Hostname.
§ User logged in.
§ Malicious processes identified.
5. Mitigation Node:
o Kill Malicious Processes:
§ Execute a script to terminate cryptocurrency mining processes.
o Update Firewall Rules:
§ Block malicious mining pool IPs/domains using firewall integration
(Palo Alto Networks or Fortinet).
6. Notification Node:
o Notify the Incident Response (IR) team and SOC with detailed findings:
§ Affected endpoint.
§ Malicious processes or connections identified.
§ Actions taken (isolation, process termination, firewall update).
7. Post-Incident Action Node:
o Use the Run Command action to scan the endpoint for potential
vulnerabilities (missing patches, misconfigurations).
o Suggest remediation steps such as applying security patches or resetting
credentials.
• KPIs:
o Time to detect and mitigate cryptojacking: Target <5 minutes.
o Number of false positives reduced: Target <10%.
o Overall system performance improvement.
• Use Splunk SOAR’s reporting features to analyse and improve playbook
performance.
Use Case 12: DNS Tunneling Attack Investigation
• Data Sources:
o DNS logs (BIND, Infoblox, Windows DNS Server).
o Firewall logs (Palo Alto, Cisco ASA).
o SIEM alerts for suspicious DNS activity.
• Integrations in Splunk SOAR:
o DNS Analysis Tools: Farsight DNSDB, VirusTotal or PassiveTotal.
o Network Traffic Analysis: Wireshark or Zeek (formerly Bro).
o Threat Intelligence Platforms: Recorded Future or Anomali.
o Endpoint Detection and Response (EDR): CrowdStrike or Carbon Black.
1. Navigate to Playbooks:
o Open Splunk SOAR, go to Automation > Playbooks and select Create
Playbook.
2. Name the Playbook:
o Title: "DNS Tunneling Attack Investigation."
o Use the Visual Editor for workflow creation.
1. Trigger Node
2. Enrichment Nodes
• Domain Reputation Check:
o Query the suspicious domains or subdomains through VirusTotal, Farsight
DNSDB or PassiveTotal.
• Analyse DNS Query Patterns:
o Extract and decode DNS payloads for base64 or other encoded data using
custom scripts or tools.
• Network Traffic Analysis:
o Analyse network packet captures (PCAP) for tunneling activity using
Wireshark or Zeek.
3. Decision Nodes
4. Containment Nodes
5. Mitigation Nodes
6. Notification Nodes
• KPIs:
o Mean time to detect (MTTD) and respond (MTTR) to DNS tunneling incidents.
o Number of malicious domains identified and blocked.
o Reduction in DNS tunneling attack occurrences.
Use Case 13: Advanced Persistent Threat (APT) Detection
• Data Sources:
o SIEM alerts for abnormal behavior (lateral movement, privilege escalation).
o EDR tools for endpoint behavior analysis.
o Threat intelligence feeds to identify IOCs related to known APT groups.
o Network traffic logs for unusual patterns (beaconing or encrypted data
exfiltration).
• Integrations in Splunk SOAR:
o Threat Intelligence Platforms: Recorded Future, Anomali or MISP.
o EDR Solutions: CrowdStrike, SentinelOne or Carbon Black.
o Network Monitoring Tools: Zeek (Bro) or Palo Alto firewall.
o Sandboxing Tools: Cuckoo Sandbox or Joe Sandbox for malware analysis.
1. Navigate to Playbooks:
o Open Splunk SOAR, go to Automation > Playbooks and select Create
Playbook.
2. Name the Playbook:
o Title: "APT Detection and Response."
o Use the Visual Editor for workflow creation.
1. Trigger Node
3. Decision Nodes
4. Containment Nodes
• Isolate Endpoint:
o Use EDR solutions to isolate the compromised endpoint.
• Block Malicious IPs/Domains:
o Add IOC-related IPs/domains to the firewall’s blocklist.
5. Investigation Nodes
• Malware Analysis:
o Submit suspicious files to a sandbox (Cuckoo) for dynamic analysis.
• Timeline Reconstruction:
o Query logs from SIEM and network monitoring tools to reconstruct the attack
lifecycle.
6. Mitigation Nodes
7. Notification Nodes
• Notify Incident Response Team:
o Send a detailed incident report to the SOC and IR team, including indicators,
affected systems and containment steps.
• Open Ticket:
o Create a ticket in ServiceNow or Jira for tracking and documentation.
• Forensic Analysis:
o Perform deep-dive forensic analysis of endpoints and network logs to
uncover the root cause.
• IOC Sharing:
o Share IOCs and attack details with threat intelligence platforms.
• Policy Updates:
o Update security policies and network configurations to mitigate similar
attacks.
1. Integrate the playbook with live monitoring systems for real-time response to APT
indicators.
2. Continuously refine and update based on new APT campaigns and IOCs.
• KPIs:
o Mean time to detect (MTTD) and respond (MTTR) to APT activities.
o Number of APT-related incidents contained successfully.
o Reduction in dwell time of attackers within the network.
Use Case 14: Zero-Day Vulnerability Response
• Data Sources:
o SIEM alerts for exploit attempts.
o Vulnerability scanners like Nessus or Qualys for known vulnerabilities.
o Threat intelligence feeds for indicators of zero-day exploits.
o EDR tools for endpoint activity and behavior monitoring.
• Integrations in Splunk SOAR:
o Threat Intelligence: Recorded Future, MISP or VirusTotal for zero-day IOCs.
o Vulnerability Management: Tenable or Qualys for scanning.
o Sandboxing Tools: Cuckoo Sandbox or Joe Sandbox for malware payload
analysis.
o EDR Tools: CrowdStrike or SentinelOne for monitoring suspicious behavior.
1. Navigate to Playbooks:
o Open Splunk SOAR, go to Automation > Playbooks and create a new
playbook.
2. Name the Playbook:
o Title: "Zero-Day Vulnerability Response."
1. Trigger Node
2. Enrichment Nodes
• Gather Threat Intelligence:
o Query threat intelligence platforms for IPs, domains or hashes associated
with zero-day exploits.
• Endpoint Analysis:
o Query EDR tools to detect suspicious behavior on endpoints (new processes
or file changes).
• Vulnerability Context:
o Pull data from vulnerability scanners to identify systems with related
vulnerabilities.
3. Decision Nodes
4. Containment Nodes
• Isolate Systems:
o Automatically isolate impacted or vulnerable systems from the network
using EDR or NAC (Network Access Control).
• Block IOCs:
o Add IOCs (IPs, domains) to firewall and proxy blocklists.
5. Investigation Nodes
6. Mitigation Nodes
• Apply Workarounds:
o Implement vendor-recommended mitigations or temporary fixes for the zero-
day.
• Patch Management:
o Monitor for and apply patches as soon as they are released.
7. Notification Nodes
• Notify Teams:
o Send alerts to the SOC, IT and vulnerability management teams about the
zero-day incident and actions taken.
• Incident Reporting:
o Generate a detailed report summarising the indicators, impact and
containment steps.
• IOC Sharing:
o Share IOCs with threat intelligence platforms and industry ISACs.
• Policy and Rule Updates:
o Update detection rules in SIEM to identify similar exploit patterns.
• Training and Awareness:
o Conduct awareness training for staff on mitigating similar attacks.
• KPIs:
o Mean time to detect (MTTD) and respond (MTTR) to zero-day incidents.
o Percentage of vulnerable systems isolated before exploitation.
o Number of exploit attempts mitigated successfully.
Use Case 15: Compliance Audit Automation
• Data Sources:
o Security configurations from firewalls, servers and endpoints.
o Vulnerability and patch management reports.
o User activity logs from identity and access management (IAM) tools.
o SIEM data for log aggregation.
• Integrations in Splunk SOAR:
o Compliance Tools: Tenable.sc, Nessus or Qualys for scanning.
o SIEM: Splunk Enterprise Security or QRadar for log analysis.
o Policy Management: ServiceNow or Confluence for policies and
procedures.
o IAM Tools: Okta or Azure AD for access and privilege reviews.
1. Navigate to Playbooks:
o Open Splunk SOAR, go to Automation > Playbooks and create a new
playbook.
2. Name the Playbook:
o Title: "Compliance Audit Automation."
1. Trigger Node
• Set a trigger for periodic audit events, such as monthly, quarterly or annually.
• Alternatively, initiate the audit process based on external triggers, like regulatory
updates or specific audit requests.
3. Analysis Nodes
4. Decision Nodes
5. Remediation Nodes
• Assign Tasks:
o Create tickets in ServiceNow or JIRA for IT teams to address compliance
gaps.
• Automate Configurations:
o Push configuration updates to firewalls or IAM tools for detected policy
violations.
• Enforce Patches:
o Trigger patching processes using tools like WSUS or SCCM.
6. Reporting Nodes
7. Notification Nodes
• Notify stakeholders of the compliance status and any required follow-up actions.
• KPIs:
o Reduction in manual audit effort (time saved).
o Percentage of compliant systems post-audit.
o Time to remediate identified compliance gaps.
Use Case 16: API Abuse and Security Monitoring
• Data Sources:
o API Gateway Logs (e.g., AWS API Gateway, Azure API Management).
o Web Server Logs (e.g., NGINX, Apache).
o SIEM for aggregated threat detection.
o Threat Intelligence Feeds for IP/URL reputation.
• Integrations in Splunk SOAR:
o API Gateway (AWS, Azure or Google Cloud integrations).
o Threat Intelligence Platforms (e.g., VirusTotal, ThreatConnect).
o SIEM (e.g., Splunk Enterprise Security or QRadar).
o Communication Tools (e.g., Slack, Microsoft Teams or email).
1. Navigate to Playbooks:
o In Splunk SOAR, go to Automation > Playbooks and create a new playbook.
2. Name the Playbook:
o Title: "API Abuse and Security Monitoring."
1. Trigger Node
• Trigger Type:
o Real-time alerts from the API gateway or SIEM for unusual API activity.
• Example Triggers:
o Multiple failed authentication attempts.
o Excessive API requests from a single IP.
o Unexpected payload patterns detected.
• Retrieve Logs:
o Pull logs from the API gateway for detailed analysis of usage patterns.
• Threat Intelligence Query:
o Check the reputation of suspicious IPs or domains using VirusTotal or other
tools.
• Correlate Logs:
o Use SIEM to correlate API events with other suspicious activities across the
network.
3. Analysis Nodes
4. Decision Nodes
5. Remediation Nodes
6. Reporting Nodes
• Alert the API team and SOC analysts about the detected abuse and remediation
actions via Slack, Teams or email.
1. Simulated Scenario:
o Mock Scenario:
§ A single IP makes 10,000 API requests within 5 minutes.
§ Payloads include suspicious SQL injection attempts.
o Playbook Execution:
§ Collects and analyses logs.
§ Flags the IP as abusive.
§ Blocks the IP in the API gateway.
§ Generates and sends the report.
• KPIs:
o Time to detect and respond to API abuse incidents.
o Reduction in abusive requests post-implementation.
o Number of incidents resolved automatically versus manually.
Use Case 17: Threat Hunting Workflow Automation
• Data Sources:
o SIEM (e.g., Splunk Enterprise Security, QRadar).
o EDR (Endpoint Detection and Response) tools like CrowdStrike or Carbon
Black.
o Threat Intelligence Platforms (e.g., VirusTotal, Recorded Future).
o Log repositories (e.g., cloud service logs, network traffic logs).
• Integrations in Splunk SOAR:
o SIEM integration for querying logs and events.
o EDR integration for endpoint visibility.
o Threat intelligence integrations for IOC enrichment.
o OSINT tools (e.g., Shodan, theHarvester).
1. Navigate to Playbooks:
o In Splunk SOAR, go to Automation > Playbooks and create a new playbook.
2. Name the Playbook:
o Title: "Threat Hunting Workflow Automation."
1. Trigger Node
• Trigger Type:
o Schedule-based: Automatically run at predefined intervals (e.g., daily,
weekly).
o Manual: Analysts can trigger the playbook as part of their hunting exercise.
• Gather Logs:
o Query recent logs from SIEM for suspicious patterns (e.g., failed logins,
privilege escalations, lateral movements).
• Retrieve EDR Data:
o Pull recent alerts and suspicious activity from EDR tools for correlation.
• Threat Intelligence Lookup:
o Enrich IOCs (e.g., IPs, hashes, domains) with threat intelligence feeds.
3. Analysis Nodes
• Pattern Analysis:
o Analyse logs and events for predefined threat patterns (e.g., beaconing
behavior, rare process executions).
• Correlate Data:
o Correlate endpoint activity, network traffic and SIEM events for a holistic
view.
• Behavior Anomalies:
o Use anomaly detection to flag deviations in user or system behavior.
4. Decision Nodes
5. Investigation Nodes
• Endpoint Analysis:
o Isolate and analyse suspicious endpoints for unauthorised activity.
• Network Traffic Inspection:
o Inspect unusual traffic flows for signs of C2 communications or data
exfiltration.
• IOC Scanning:
o Scan the environment for artifacts matching IOCs.
6. Remediation Nodes
• Quarantine Endpoints:
o Automatically isolate compromised systems using EDR integrations.
• Block IPs/Domains:
o Use firewalls or SIEM to block malicious IPs or domains identified during
analysis.
7. Reporting Nodes
• Generate Threat Hunt Report:
o Compile a summary of findings, including suspicious patterns, impacted
assets and actions taken.
• Share Findings:
o Distribute the report to SOC teams via email or collaboration platforms like
Slack.
8. Post-Hunt Nodes
1. Simulated Scenario:
o Mock Data:
§ SIEM logs show a series of failed logins followed by a successful login
from a rare geolocation.
§ EDR detects a process spawning PowerShell commands atypical for
the system.
o Playbook Execution:
§ Collects logs and correlates data.
§ Flags the geolocation as suspicious and isolates the endpoint.
§ Generates and shares the report.
• Automate the playbook for regular, proactive threat hunting in your environment.
• Ensure analysts can manually trigger the playbook during on-demand hunts.
• KPIs:
o Time saved per hunting session using automation.
o Number of threats identified and mitigated during automated hunts.
o Reduction in repetitive tasks for SOC analysts.
Use Case 18: Denial-of-Service (DoS) Attack Response
• Data Sources:
o Firewall logs (e.g., Palo Alto Networks, Cisco ASA).
o Network traffic monitoring tools (e.g., Zeek, NetFlow).
o Cloud service logs (AWS WAF, Azure Network Watcher).
o SIEM platform logs.
• Integrations in Splunk SOAR:
o Firewall APIs for blocking malicious IPs.
o SIEM integration for querying logs and correlating traffic anomalies.
o Threat intelligence feeds for identifying known malicious IPs or attack
signatures.
o Load balancers and CDN services for redirecting or throttling traffic.
1. Navigate to Playbooks:
o In Splunk SOAR, go to Automation > Playbooks and create a new playbook.
2. Name the Playbook:
o Title: "DoS Attack Response Playbook."
1. Trigger Node
• Trigger Type:
o Event-based: Playbook triggers automatically upon detection of traffic
anomalies or alerts in SIEM/firewall logs.
o Manual: Analysts can initiate the playbook when suspecting a DoS attack.
2. Detection Nodes
• Analyse Traffic:
o Query network traffic logs for anomalies like a sudden spike in requests from
a single IP range.
• Correlation:
o Correlate data from SIEM and network logs to confirm patterns of DoS
attacks (e.g., SYN floods, HTTP request floods).
• Threat Intelligence Lookup:
o Check source IPs against threat intelligence feeds to identify known
malicious actors.
3. Decision Nodes
4. Mitigation Nodes
5. Investigation Nodes
• Endpoint Analysis:
o Investigate if internal endpoints are participating in the DoS attack (e.g., as
part of a botnet).
• Traffic Origin Analysis:
o Identify the geographic origin of the attack and any related patterns.
6. Notification Nodes
7. Reporting Nodes
1. Simulated Scenario:
o Mock Data:
§ Firewall logs show a sudden influx of SYN packets from a range of IPs.
§ SIEM detects a spike in HTTP requests from the same IPs, exceeding
normal thresholds.
o Playbook Execution:
§ Blocks the malicious IPs via the firewall.
§ Activates rate-limiting rules on the load balancer.
§ Generates and shares a detailed report with the SOC team.
• KPIs:
o Time to detect and mitigate DoS attacks.
o Reduction in downtime during attacks.
o Accuracy of detection (minimising false positives).
Use Case 19: Third-Party Risk Management and Monitoring
• Data Sources:
o Vendor-provided security reports and SLAs.
o Threat intelligence feeds for third-party IP/domain monitoring.
o Vulnerability scanners (e.g., Nessus, Qualys) for vendor-exposed assets.
o Cloud service logs if third parties access shared environments.
• Integrations in Splunk SOAR:
o Vendor security platforms (if APIs are available).
o Threat intelligence platforms (e.g., VirusTotal, Recorded Future).
o Vulnerability scanners for assessing vendor-hosted systems.
o Ticketing systems (e.g., ServiceNow, Jira) for incident tracking.
1. Navigate to Playbooks:
o In Splunk SOAR, go to Automation > Playbooks and create a new playbook.
2. Name the Playbook:
o Title: "Third-Party Risk Monitoring Playbook."
1. Trigger Node
• Trigger Type:
o Scheduled: Periodically check third-party systems and threat intelligence for
vulnerabilities and suspicious activity.
o Event-Based: Triggered when a vendor-related alert is detected in the SIEM.
• Assess Severity:
o Correlate vulnerabilities with CVSS scores and prioritise based on
exploitability and potential impact.
• Third-Party Access Review:
o Analyse logs from shared systems to detect anomalous or unauthorised
access patterns.
4. Decision Nodes
5. Mitigation Nodes
• Restrict Access:
o Temporarily suspend or limit third-party access to sensitive resources until
issues are resolved.
• Notify Vendor:
o Automate notifications to the vendor with specific findings and required
action steps.
• Track Responses:
o Monitor vendor updates on the reported issue through email or ticketing
systems.
• Escalation:
o Escalate to vendor management team if issues are not resolved within SLA
timelines.
7. Reporting Nodes
• Generate Risk Report:
o Compile a detailed report of risks identified, mitigation actions taken and
vendor responses.
• Update Compliance Records:
o Ensure all actions are logged for audit purposes.
1. Simulated Scenario:
o Vendor Threat:
§ Threat intelligence flags a vendor-managed domain as part of a
phishing campaign.
o Response:
§ The playbook triggers a query to gather logs of the vendor's access,
sends automated notifications to the vendor and restricts access
temporarily until the issue is resolved.
• KPIs:
o Time to identify and mitigate third-party risks.
o Number of false positives versus actual incidents.
o Compliance adherence to SLA and regulatory frameworks.
Use Case 20: Automated Vulnerability Patch Management
• Data Sources:
o Vulnerability scanners (e.g., Nessus, Qualys, Rapid7).
o Asset inventory systems for identifying affected devices and applications.
o Patch management tools (e.g., WSUS, SCCM, Ansible).
o SIEM for correlating vulnerability data with existing threats.
• Integrations in Splunk SOAR:
o Vulnerability scanners for detecting missing patches.
o Patch management systems for automating patch deployment.
o Ticketing systems (e.g., ServiceNow, Jira) to track and document patching
processes.
1. Navigate to Playbooks:
o In Splunk SOAR, go to Automation > Playbooks and create a new playbook.
2. Name the Playbook:
o Title: "Automated Vulnerability Patch Management Playbook."
1. Trigger Node
• Trigger Type:
o Scheduled: Run daily or weekly scans to identify missing patches.
o Event-Based: Triggered by vulnerability alerts from the scanner or SIEM.
• Prioritise Vulnerabilities:
o Sort vulnerabilities based on CVSS scores, exploitability and criticality of
affected assets.
• Check Asset Impact:
o Query the asset inventory to assess the business impact of affected
systems.
4. Decision Nodes
6. Validation Nodes
• Post-Deployment Scans:
o Re-scan systems to confirm successful patch application.
• Functionality Testing:
o Ensure patched systems are functioning correctly.
7. Reporting Nodes
1. Simulated Scenario:
o Vulnerability Alert:
§ A vulnerability scanner detects a critical CVE affecting multiple
systems.
o Response:
§ The playbook fetches the vulnerability details, prioritises based on
risk, deploys the patch using a patch management tool and validates
the successful patching of all affected systems.
• Schedule the playbook for daily scans and integrate it with the patch management
process.
• Establish workflows for handling exceptions, such as systems that require
downtime for patching.
• KPIs:
o Time to detect and patch vulnerabilities.
o Percentage of systems patched within SLA timelines.
o Reduction in vulnerabilities detected during subsequent scans.
Use Case 21: Credential Harvesting Detection and Response
Step 1: Define the Use Case
1. Navigate to Playbooks:
o Go to Automation > Playbooks > Create New Playbook.
2. Select Visual Editor:
o Use the drag-and-drop visual editor for intuitive workflow design.
1. Trigger Node:
o Add a Trigger node to detect alerts related to credential harvesting attempts
in connected SIEM (e.g., Splunk, QRadar).
o Configure the trigger to activate on alerts flagged for phishing or abnormal
login attempts.
2. Extract IOC Node:
o Use the Artifact Extraction action to parse IOCs (URLs, IPs, email
addresses) from the alert.
o Focus on suspicious links, domains, and sender email addresses associated
with credential harvesting.
3. Phishing Domain Analysis Node:
o Add an Action node to query threat intelligence sources like VirusTotal or
OpenPhish for domain reputation.
o Input the extracted URLs and domains into the API request.
4. User Behavior Analysis Node:
o Add an action to cross-check flagged user accounts in the Identity
Management System (e.g., Active Directory).
o Identify unusual login patterns or geographical discrepancies.
5. Decision Node:
o Insert a Decision node to evaluate the risk level:
§ High Risk: If phishing domains are confirmed or login anomalies are
detected.
§ Low Risk: If no malicious indicators are found.
6. Block Malicious Source Node:
o For High Risk, add an Action node to:
§ Block URLs and IPs in the firewall or web gateway.
§ Disable compromised user accounts temporarily.
7. Update Case Node:
o Enrich the alert with findings such as:
§ Malicious domains flagged.
§ Actions taken (e.g., blocked URLs, disabled accounts).
§ Affected users.
8. Notify Analyst Node:
o Add a Send Email action to notify SOC analysts with a summary of findings
and remediation actions.
1. Simulate Alert:
o Use Splunk SOAR’s simulation environment to generate a phishing alert with
a malicious domain (e.g., phishingsite.com).
2. Run the Playbook:
o Observe the following workflow:
§ Alert triggers IOC extraction.
§ Malicious domain phishingsite.com is flagged by VirusTotal with a
high threat score.
§ The domain is blocked in the firewall.
§ Affected user account is disabled.
§ Notification email is sent to the analyst.
3. Review Output:
o Confirm the enriched alert in the case management system.
o Verify that malicious sources are blocked and the analyst is notified.
1. Navigate to Playbooks:
o Go to Automation > Playbooks > Create New Playbook.
2. Select Visual Editor:
o Choose the drag-and-drop visual editor for ease of use.
1. Trigger Node:
o Add a Trigger node to detect file access events flagged by connected SIEM
tools (e.g., Splunk, QRadar).
o Configure the trigger to activate when unusual file access patterns or
unauthorised user access is logged.
2. Extract File Access Details Node:
o Use the Artifact Extraction action to parse details from the alert, including:
§ User ID.
§ File name and location.
§ Time of access.
3. User Privilege Verification Node:
o Add an Action node to check the user's access permissions in the Identity
Management System (e.g., Active Directory).
o Identify whether the user is authorised to access the flagged file.
4. File Sensitivity Analysis Node:
o Add an Action node to validate the sensitivity of the accessed file using Data
Loss Prevention (DLP) systems or file metadata.
o Classify files as "Confidential," "Public," or "Restricted."
5. Decision Node:
o Insert a Decision node to evaluate the situation:
§ Unauthorised Access: If the user lacks proper permissions or the file
is classified as sensitive.
§ Authorised Access: If the user has legitimate access to the file.
6. Block User Node:
o For Unauthorised Access, add an Action node to:
§ Temporarily disable the user’s account.
§ Block the user's IP address or workstation if suspicious.
7. Update Case Node:
o Enrich the original alert with details about the user, accessed file, and
actions taken.
8. Notify Analyst Node:
o Add a Send Email action to notify the SOC analyst, including:
§ The user involved.
§ The sensitive file accessed.
§ Actions performed (e.g., user blocked).
1. Simulate Alert:
o Use Splunk SOAR’s simulation environment to generate an alert for
unauthorised access to a confidential file (SensitiveFile.docx).
2. Run the Playbook:
o Observe the following:
§ File access details are extracted.
§ User privileges are checked and found unauthorised.
§ File sensitivity is verified as "Confidential."
§ The user account is disabled, and the SOC analyst is notified.
3. Review Output:
o Confirm the enriched alert in the case management system.
o Verify that unauthorised access was flagged, and appropriate actions were
taken.
1. Navigate to Playbooks:
o Go to Automation > Playbooks > Create New Playbook.
2. Select Visual Editor:
o Use the drag-and-drop visual editor for ease of workflow creation.
1. Trigger Node:
o Add a Trigger node to monitor communication channels (e.g., email logs,
chat systems) for alerts flagged by connected SIEM tools or email security
gateways (e.g., Proofpoint, Microsoft Defender for Office 365).
o Configure the trigger to activate on emails or messages containing
suspicious content, such as fake URLs, urgent requests, or unusual sender
addresses.
2. Extract Communication Details Node:
o Use the Artifact Extraction action to parse details from the alert, including:
§ Sender address.
§ Recipient address.
§ Subject and body content.
§ Attachments or URLs.
3. Phishing URL Analysis Node:
o Add an Action node to query threat intelligence sources (e.g., VirusTotal,
OpenPhish) for reputation checks on URLs and attachments found in the
communication.
o Input the extracted data into the API request.
4. User Behavior Verification Node:
o Add an Action node to check recent activity of the recipient user in the
Identity Management System or endpoint protection platform.
o Look for anomalies such as failed login attempts or unusual access
patterns.
5. Decision Node:
o Insert a Decision node to evaluate the threat level:
§ High Risk: If the URL or attachment is flagged as malicious, or if user
behavior is abnormal.
§ Low Risk: If no malicious indicators are detected.
6. Immediate Mitigation Node:
o For High Risk, add an Action node to:
§ Quarantine the email or block the suspicious communication.
§ Notify the recipient of a potential threat and provide awareness
guidance.
7. Update Case Node:
o Enrich the original alert with details about:
§ Sender information.
§ Malicious indicators (e.g., flagged URLs or attachments).
§ Actions taken (e.g., email quarantined).
8. Notify Analyst Node:
o Add a Send Email action to notify the SOC analyst, including:
§ The sender and recipient details.
§ The flagged content.
§ Actions performed.
1. Simulate Alert:
o Use Splunk SOAR’s simulation environment to generate a phishing email
alert with a malicious link (phishingsite.com).
2. Run the Playbook:
o Observe the following:
§ Email details are extracted.
§ The malicious link is flagged by VirusTotal.
§ The email is quarantined, and the recipient is notified.
§ A summary is sent to the SOC analyst.
3. Review Output:
o Confirm that the email was successfully quarantined.
o Verify that the analyst and recipient received appropriate notifications.
1. Navigate to Playbooks:
o Go to Automation > Playbooks > Create New Playbook.
2. Select Visual Editor:
o Use the drag-and-drop visual editor for a simplified workflow creation.
1. Trigger Node:
o Add a Trigger node to activate on alerts from dark web monitoring tools (e.g.,
Recorded Future, SpyCloud, Cybersixgill) or custom scrapers.
o Configure the trigger to monitor for matches on keywords, domain names, or
employee email addresses.
2. Extract Dark Web Data Node:
o Use the Artifact Extraction action to parse data from the alert, such as:
§ Mentioned keywords or credentials.
§ Source of the dark web post.
§ Time and date of the discovery.
3. Threat Validation Node:
o Add an Action node to cross-reference the leaked information with internal
databases or SIEM tools:
§ Verify if the exposed data is valid or active.
§ Check if any exposed credentials match currently used accounts.
4. Decision Node:
o Insert a Decision node to determine the level of risk:
§ High Risk: If the leaked data is valid or highly sensitive (e.g., active
credentials).
§ Low Risk: If the data is outdated or irrelevant.
5. Immediate Mitigation Node:
o For High Risk, add an Action node to:
§ Notify affected individuals or departments to change credentials or
secure systems.
§ Temporarily disable compromised accounts.
§ Flag the source of the leak for further investigation.
6. Update Case Node:
o Enrich the original alert with:
§ Details of the leak (e.g., forum post, marketplace listing).
§ Actions taken to mitigate the threat.
7. Notify Analyst Node:
o Add a Send Email action to notify the SOC analyst with:
§ A summary of the leaked data.
§ Actions performed and suggested next steps.
1. Simulate Alert:
o Use Splunk SOAR’s simulation environment to create a mock alert for a
leaked credential ([email protected]) detected on a dark web forum.
2. Run the Playbook:
o Observe the following:
§ Extracted data is validated and found to be active credentials.
§ The affected account is disabled, and the user is notified to reset their
password.
§ A notification is sent to the SOC analyst.
3. Review Output:
o Confirm the enriched alert in the case management system.
o Verify that mitigation actions and analyst notifications were executed
successfully.
1. Navigate to Playbooks:
o Go to Automation > Playbooks > Create New Playbook.
2. Select Visual Editor:
o Use the drag-and-drop visual editor for streamlined workflow design.
1. Trigger Node:
o Add a Trigger node to activate on alerts from network monitoring tools (e.g.,
Zeek, Cisco Stealthwatch, or a SIEM like Splunk or QRadar).
o Configure the trigger to monitor for:
§ Traffic spikes.
§ Anomalous IP communications.
§ Protocol misuse or unusual port activity.
2. Extract Network Anomalies Node:
o Use the Artifact Extraction action to parse details such as:
§ Source and destination IPs.
§ Protocols and ports involved.
§ Bandwidth usage metrics.
3. Threat Intelligence Correlation Node:
o Add an Action node to query threat intelligence sources (e.g., VirusTotal,
AbuseIPDB) for reputation checks on the source/destination IPs or domains.
o Input extracted data into the API requests.
4. Decision Node:
o Add a Decision node to determine the risk level based on findings:
§ High Risk: If the IPs or domains are flagged malicious, or traffic
behavior is highly abnormal.
§ Low Risk: If no malicious indicators are found, and the anomaly
seems explainable.
5. Immediate Mitigation Node:
o For High Risk, add an Action node to:
§ Block the IP or connection via firewall automation (e.g., Palo Alto,
Fortinet).
§ Isolate the affected device from the network.
6. Update Case Node:
o Enrich the original alert with:
§ Contextual details (e.g., suspected intent, traffic logs).
§ Actions performed (e.g., IP blocked, device isolated).
7. Notify Analyst Node:
o Add a Send Email action to notify the SOC analyst with:
§ The anomaly details.
§ Actions taken and any unresolved concerns.
1. Simulate Alert:
o Use Splunk SOAR’s simulation environment to generate a mock alert for
unusual traffic involving a suspicious IP (203.0.113.50) and high outbound
traffic on port 22.
2. Run the Playbook:
o Observe the following:
§ Network anomalies are extracted and analyzed.
§ The suspicious IP is flagged as malicious by VirusTotal.
§ The IP is blocked, and the affected device is isolated.
§ A notification is sent to the SOC analyst.
3. Review Output:
o Confirm the enriched alert and actions in the case management system.
o Verify the effectiveness of the automated response and the analyst
notification.
1. Navigate to Playbooks:
o Go to Automation > Playbooks > Create New Playbook.
2. Select Visual Editor:
o Choose the drag-and-drop visual editor to build the testing workflow.
1. Trigger Node:
o Add a Trigger Node to activate the playbook.
o Set up a manual trigger or use a scheduled time to simulate various security
incidents for testing purposes.
§ Example triggers:
§ A scheduled simulation of a ransomware attack.
§ A simulated DDoS event.
§ A mock phishing attempt alert.
2. Simulated Incident Generation Node:
o Add an Action Node that will simulate different types of security incidents
for testing purposes.
§ Use tools such as Splunk, QRadar, or other testing tools to generate
test alerts for various scenarios.
§ Example scenarios:
§ Malware detection (e.g., ransomware).
§ Unauthorized access attempt (e.g., brute force).
§ Abnormal network traffic (e.g., DDoS).
3. Run Automated Response Playbook:
o Add an Action Node to trigger the existing response playbooks based on the
simulated incidents generated in the previous step.
§ Example playbooks to test:
§ Ransomware Response Playbook.
§ DDoS Mitigation Playbook.
§ Phishing Attack Response Playbook.
4. Evaluate Response Execution Node:
o Add a Decision Node to evaluate if the automated responses triggered by
the playbooks execute as expected.
§ Check for:
§ Alert generation and enrichment.
§ Mitigation actions (e.g., blocking IPs, isolating devices).
§ Case creation and incident management.
5. Validation Node:
o Add an Action Node to validate whether the correct actions were taken
during the playbook execution.
§ Compare the actions triggered by the playbook against a predefined
success criteria.
§ Example validation steps:
§ Ensure that alerts are generated for incidents.
§ Confirm that mitigation actions (e.g., blocking a malicious IP)
were successful.
§ Ensure that case creation or updates are properly logged.
6. Alerting and Reporting Node:
o Add an Action Node to notify stakeholders about the outcome of the testing.
§ Send an email or platform notification to SOC analysts and relevant
teams with a summary of the test results.
§ Include any issues found, such as failed actions or incomplete
responses.
7. Post-Test Analysis Node:
o Add an Action Node to collect logs and data generated during the test for
post-test analysis.
§ Gather logs from the SIEM, incident management system, and any
other relevant sources.
§ Create a detailed report summarizing the test's success and
identifying areas for improvement.