Splunk SOAR: Five Automation Use Cases For
Splunk SOAR: Five Automation Use Cases For
Splunk SOAR
The security operations center (SOC) is constantly Security orchestration, automation and response (SOAR)
overwhelmed. Analysts are drowning in security alerts, with can tackle even the most mundane or repetitive of tasks. Any
far too many threats to investigate and resolve. Security process that involves detection, investigation, containment —
operations work is rife with these types of monotonous, routine or even logistical items, like cross-functional communication
and repetitive tasks — especially at the tier-1 analyst level. via tickets — can be orchestrated across the many IT and
security tools that you own, and automated without any
To make matters worse, there’s a significant shortage of
human interaction.
cybersecurity professionals, making it that much harder
to respond to the thousands of alerts that come in daily. In this e-book, we’ll walk you through five common use cases
Combined, all of these factors result in painfully slow threat for SOAR, the steps you need to take for each use case, and
detection and response — not great for the business, or for how to automate these steps using a pre-built playbook from
keeping users and assets safe. Splunk SOAR.
2. P
hishing Investigation and Response....................................................... 5
5. Threat Intelligence...................................................................................................11
1. Alert Enrichment
When it comes to investigating security alerts, the analyst’s first order of The Norlys security team operates on a specific promise: if something is annoying,
business is to look at the indicators of compromise (IOCs) such as IP address, automate it. As a result, the team uses 20 different playbooks every day to save
URL, user name, domain, hash and any other relevant criteria. This helps time and money.
determine the severity of the alert. Many analysts will then manually dive into
the data to search for additional context, or will hop between different threat
intelligence platforms to gather more information. “Splunk SOAR saves us 35 hours per week — about five hours per day.
We can now finally focus on the important tasks.”
A SOAR tool can easily weave together the intelligence from multiple tools
within the SOC, enriching alert data and surfacing it into a single interface. By — Tibor Földesi, Security Analyst, Norlys
automating the process of data collection and enrichment from various sources,
the analyst can see valuable details related to the alert as soon as it surfaces.
Orchestration and automation helps analysts investigate and respond to
security alerts that much faster, and also enriches the data they collect through
compiling intel from various sources into one place.
Stop working hard, and start working smarter. Splunk SOAR automates repetitive
tasks such as alert enrichment so that security analysts have everything they
need to know about the alert before they start investigating. Use this pre-built
playbook within Splunk SOAR to gather analysis quickly for any investigation.
90 60
4. IP reputation: Queries VirusTotal for IP information
5. Geolocate IP address: Queries MaxMind for IP location information
6. Determine whois domain: Execute a whois lookup on the given domain
minutes seconds 7. Determine whois IP: Execute a whois lookup on the given IP
per phishing alert per phishing alert
Then, the playbook will continue to gather information on the attached file and
URL from the email and launch these two actions:
Before SOAR After SOAR
8. Detonate file: Run the file in the Threat Grid sandbox and retrieve
Adding a SOAR tool will help the analysis
you save time and focus on
mission critical tasks. 9. Detonate URL: Load the URL in the Threat Grid sandbox and retrieve
the analysis
1. Get indicator: Get an IOC by providing a type and value “Automation with Splunk SOAR enables us to process malware email
alerts in about 40 seconds versus 30 minutes or more.”
2. Get process detail : Retrieve the details of a process that is running
or that previously ran, given a process ID — Adam Fletcher, CISO, Blackstone
1. Block hash: Add a hash to the Carbon Black blacklist “What impressed me most about the SolarWinds attack was the
perfect tradecraft of the adversaries. Not only did they perform
2. Block IP: Block an IP
a flawless attack, they made sure to hide their tracks by using IPs,
3. Find malware: Execute the malfind volatility plugin to find injected code/dlls VPSs, and domains that were either geographically correct or
in user mode memory
mimicked the specific victim they were attacking.”
4. Geolocate IP: Queries MaxMind for IP location info
— Ryan Kovar, Distinguished Security Strategist at Splunk
5. Get process file: Extracts the process file from the memory dump
6. Get report: Get further details about an AutoFocus tag
7. Hunt IP: Hunt an IP and retrieve a list of associated tags
8. List VM(s): Get the list of registered VM(s)
9. Send email: Send an email
10. Snapshot VM(s): Take a snapshot of the VM(s)
11. Terminate process:Kill running processes on a machine
12. Whois IP: Execute a whois lookup on the given IP
Use this pre-built playbook within Splunk SOAR to investigate and contain a
command-and-control scenario.
When a suspicious URL is detected, the Zscaler Hunt and Block URL Playbook Threat intelligence can be used to augment a diverse set of use cases, making
can be used to identify internal devices that have accessed that URL and it an essential resource for security teams as they investigate alerts. Use these
triage the organizational importance of those devices. Then, depending on the pre-built playbooks to help your team save time from tracking down malicious
maliciousness of the URL and whether or not the affected device belongs to indicators, so they can spend more time on addressing critical tasks.
an executive in the organization, the URL will be blocked and an appropriate
ServiceNow ticket will be created. This playbook is supported via VirusTotal, Get the Playbook
Zscaler, Microsoft Exchange, ServiceNow, Splunk, and Carbon Black.
Learn More
Splunk, Splunk>, Data-to-Everything, D2E and Turn Data Into Doing are trademarks and registered trademarks of Splunk Inc. in the United States
and other countries. All other brand names, product names or trademarks belong to their respective owners. © 2021 Splunk Inc. All rights reserved.
21-19396-Splunk-Five Automation Use Cases For Splunk SOAR-EB-111