Skip to content

Latest commit

 

History

History
91 lines (66 loc) · 6.14 KB

soar.md

File metadata and controls

91 lines (66 loc) · 6.14 KB

SOAR

This page deals with Security Orchestration Automation and Response.

Table of content

Must read

What is SOAR?

As per Gartner definition:

image

Hence 3 critical tools (see above): SIRP, TIP, SOA, on top of SIEM.

And in my view, SOAR is more an approach, a vision, based on technology and processes, than a technology or tool per say.

More especially, SOAR mainly aims at:

  • reducing human error;
  • offloading repetitive and valueless tasks for humans, to an automate (security orchestrator);
  • improving integration between tools (thanks to API);
  • increasing performance of SOC/CERT teams (higher workload with the same teams) and processes (quicker processes runs);

Simple and commonly needed automation tools

  • Online automated hash checker (script):

  • Online URL automated analysis:

  • Online automated sample analyzer:

  • Offline automated sample analyzer:

  • (pure) Windows tasks automation:

  • SaaS-based (and partly free, for basic stuff) SOA:

Common automations

My recommendations for detection (alerts handling):

Try to implement at least the following automations, leveraging the SOA/SIRP/TIP/SIEM capabilities:

  • Make sure all the context from any alert is being automatically transfered to the SIRP ticket, with a link to the SIEM alert(s) in case of.
    • Leverage API (through SOA) if needed to retrieve the missing context info, when using built-in integrations.
  • Automatically query the TIP for any artefacts or even IOC that is associated to a SIRP ticket.
  • Automatically retrieve the history of antimalware detections for an user and/or endpoint, that is associated to a SIRP ticket.
  • Automatically retrieve the history of SIEM detections for an user and/or endpoint, that is associated to a SIRP ticket.
  • Automatically retrieve the history of SIRP tickets for an user and/or endpoint, that is associated to a new SIRP ticket.
  • Automatically query AD or the assets management solution, for artefact enrichment (user, endpoint, IP, application, etc.).

My recommendations for response (incident response, containment/eradication steps):

End

Go to main page.