Skip to content

Latest commit

 

History

History
129 lines (91 loc) · 8.88 KB

soar.md

File metadata and controls

129 lines (91 loc) · 8.88 KB

SOAR

This page deals with Security Orchestration Automation and Response.

Table of content

Must read/watch

What is SOAR?

As per Gartner definition:

image

Hence the statement that SOAR is in fact made of 3 critical tools (see drawing above):

  • SIRP;
  • TIP;
  • SOA.

And on top of that, SIEM.

Thus, in my view and probably as well in Gartner's mind when they invented the name, SOAR is more an approach, a vision, based on technologies and processes, than a technology or a tool per say.

More especially, SOAR mainly aims at:

  • reducing human error;
  • offloading repetitive and valueless tasks for humans, to an automate (security orchestrator);
  • improving integration between tools (thanks to API);
  • increasing performance of SOC/CERT teams (higher workload with the same team size), constant quality, and improved processes (quicker processes runs);

SOAR need for security monitoring

Here is an example of a SOC workflow leveraging SOAR approach, with the following technology layers in place:

image

Simple and commonly needed automation tools

  • Online automated hash checker (script):

  • Online URL automated analysis:

  • Online automated sample analyzer:

  • Offline automated sample analyzer:

  • (pure) Windows tasks automation:

  • SaaS-based (and partly free, for basic stuff) SOA:

Common security automation use cases

My recommendations for detection (alerts handling):

Try to implement at least the following automations, leveraging the SOA/SIRP/TIP/SIEM capabilities:

  • Make sure all the context from any alert is being automatically transfered to the SIRP ticket, with a link to the SIEM alert(s) in case of.
    • Leverage API (through SOA) if needed to retrieve the missing context info, when using built-in integrations.
  • Automatically query the TIP for any artefacts or even IOC that is associated to a SIRP ticket.
  • Automatically retrieve the history of antimalware detections for an user and/or endpoint, that is associated to a SIRP ticket.
  • Automatically retrieve the history of SIEM detections for an user and/or endpoint, that is associated to a SIRP ticket.
  • Automatically retrieve the history of SIRP tickets for an user and/or endpoint, that is associated to a new SIRP ticket.
  • Automatically query AD or the assets management solution, for artefact enrichment (user, endpoint, IP, application, etc.).

My recommendations for detection (artefacts investigation):

  • Search for a list of IP addresses in the TIP:
    • My recommendation: use a script to query OpenCTI for with a CSV file, and make sure the output will confirm known malicious IP addresses (+ OpenCTI link to the IOC).
  • Extract a list of fresh IOCs from the TIP, and embed them in an IOC scanner:
    • My recommendation: use a script extract IP/URL/domains over the last month, MD5 over the last year, and embed them in Thor Lite or DFIR-ORC.

My recommendations for response (incident response, containment/eradication steps):

Automation example around identity-based detections

End

Go to main page.