Skip to content

Sh0bra/SplunkSOAR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Automating Incident Response with Splunk SOAR

Introduction

SOAR SOAR SOAR. You keep hearing it but what does it mean??

When I first heard this term I pondered as to how it fit into the world of Incident Response and the SOC. In order to learn about it I decided to implement it at our SOC.

Splunk SOAR (Formerly Splunk Phantom)

Requirements

Download and Install Splunk SOAR. For our install we installed it onto a virtual machine running Centos.

💡

You cannot install Splunk SOAR and Splunk Enterprise Server on the same device.

You will also need to install the following apps on your Splunk Server:

Playbooks

Once you have everything working and are able to forward your events to Splunk SOAR we can start the fun part of automating tasks.

Playbooks are a set of instructions and actions that Splunk SOAR can do on a given input. For our use case we forwarded unidentified IP addresses that were flagged by our detection and sent it to a custom playbook called UID Checker.

Screenshot of SOAR playbooks

Screenshot of SOAR playbooks

As a Security Analyst one of the things I would do when given an unidentified IP is run it through VirusTotal(VT). Every time a new IP is flagged I would browse to VT, copy the IP and paste it into the search and run it to see the results.

Screenshot of VirusTotal scan results

Screenshot of VirusTotal scan results

This gets pretty repetitive. Imagine doing this for 100s of IPs addresses throughout the month. This is where Splunk SOAR helps us to automate this process and returning the results via an event in Splunk. Splunk playbooks are created via a GUI interface and we can filter incoming data based on certain fields and run actions on them. Splunk SOAR has a built in VirusTotal action that scans ip addresses. Below is an example of the workflow of the playbook we created.

Screenshot of Splunk SOAR playbook

Screenshot of Splunk SOAR playbook

We recently also integrated a WHOIS command to add more data on incoming IP addresses. You can see the corresponding output in the screenshot below.

Screenshot of playbook automation

Screenshot of playbook automation

This information is further exported to Splunk via the Splunk app for SOAR and you can see the data below.

Splunk SOAR data seen from Splunk

Splunk SOAR data seen from Splunk

Conclusion

Splunk SOAR helps us save time by automating the repetitive tasks that the Security Analysts have to do. This saves time for the Security Analysts so that they can spend time elsewhere. There is a lot more to explore with Splunk SOAR and I am currently looking into Splunk SOAR automation using SSH to potentially add firewall block rules for IPs that are malicious.

About

Automating Incident Response with Splunk SOAR

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published