Top Banner
SOLUTION BRIEF + Splunk SOC Automation Challenges Splunk™ is a powerful log management solution and is increasingly used by security teams for SIEM (Security Incident and Event Management). However, due to limitations in Splunk, teams are often pivoting outside the Splunk console to perform additional investigation, notification, and response actions. Security analysts often find themselves running the same follow-on ‘ad-hoc’ queries over and over again in the course of an investigation to cull the information they need. When it comes to customizing enrichment, the analyst is limited to data sources already in Splunk. Correlating against an external data source (e.g., a custom HR system internal to an organization) requires programming to leverage. Alerts are either “on” or “off”; it’s difficult to add prioritization based on additional enrichment and complex workflows. Security analysts who wish to take reactive measures (containment of a server) cannot do so easily in Splunk. Automation in Splunk is limited to ‘Action’ scripts or built-in apps, which require significant development skills to customize. SIGNIFICANT TIME SAVED ACCURATE RESPONSE WORKFLOWS EXTENSIBLE SECURITY STACK WITH KOMAND + SPLUNK REPEATABLE AND EFFICIENT PROCESSES
3

Splunk SOC Automation Challenges - Rapid7 · Splunk SOC Automation Challenges Splunk™ is a powerful log management solution and is increasingly used by security teams for SIEM (Security

Oct 28, 2018

Download

Documents

hoangdan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Splunk SOC Automation Challenges - Rapid7 · Splunk SOC Automation Challenges Splunk™ is a powerful log management solution and is increasingly used by security teams for SIEM (Security

S

S O L U T I O N B R I E F

+

Splunk SOC Automation ChallengesSplunk™ is a powerful log management solution and is increasingly used

by security teams for SIEM (Security Incident and Event Management).

However, due to limitations in Splunk, teams are often pivoting outside

the Splunk console to perform additional investigation, notification, and

response actions.

Security analysts often find themselves running the same follow-on

‘ad-hoc’ queries over and over again in the course of an investigation

to cull the information they need.

When it comes to customizing enrichment, the analyst is limited to

data sources already in Splunk. Correlating against an external data

source (e.g., a custom HR system internal to an organization) requires

programming to leverage.

Alerts are either “on” or “off”; it’s difficult to add prioritization based

on additional enrichment and complex workflows.

Security analysts who wish to take reactive measures (containment

of a server) cannot do so easily in Splunk. Automation in Splunk is

limited to ‘Action’ scripts or built-in apps, which require significant

development skills to customize.

SIGNIFICANTTIME SAVED

ACCURATERESPONSE

WORKFLOWS

EXTENSIBLE SECURITY STACK WITH KOMAND +

SPLUNK

REPEATABLE AND EFFICIENT

PROCESSES

Page 2: Splunk SOC Automation Challenges - Rapid7 · Splunk SOC Automation Challenges Splunk™ is a powerful log management solution and is increasingly used by security teams for SIEM (Security

Komand + Splunk: A Powerful Solution

Use Cases

Automated Threat HuntingRather than running a series of queries manually, an analyst can automate threat hunting procedures around suspicious malware, domain, and other indicators by building a workflow using the Splunk(™) `Search` action.

Using our Splunk™ plugin, getting Splunk alerts to

trigger Komand workflows is as simple as selecting

the name of the alert to instrument.

You can also use our Splunk™ plugin to automatically

perform searches or index events based off of

triggers. Email come in you want to index in Splunk?

Ticket creation that requires you to run a history

query for user account or IP address? You can do it

with Komand, no code necessary.

TIME SAVED: 15 MINUTES PER HUNT

Automated Notification and EscalationRather than manually creating tickets in response to a Splunk alert, determining assignment and SLA, attaching context, and performing appropriate escalation, analysts can automate this procedure using Komand.

TIME SAVED: 15 MINUTES PER ALERT

Security ChatOps: Running Splunk Queries on Chat Commands Using our Slack + Splunk integrations, customers can rapidly build ‘bots’ that respond to queries around IP / domain intel, login history, and other use cases that security teams can leverage quickly when performing research.

TIME SAVED: 3 MINUTES PER QUERY

Pruning Threat Intelligence ListsRather than manually correlating threat intel feeds against firewall logs to see if there are any hits, automate this process using the Splunk(™) search plugin.

TIME SAVED: 1 HOUR

ContainmentTake advantage of various response actions (disabling a user account in Duo Security™,

disabling AWS™ IAM credentials) to ensure that when there is a threat of compromised

credentials that appears via an alert in Splunk, analysts can react fast to contain it.

TIME SAVED: 15 MINUTES PER ALERT

Index Email

Query IP

Investigate Domain

Query Account

Create Ticket

Page 3: Splunk SOC Automation Challenges - Rapid7 · Splunk SOC Automation Challenges Splunk™ is a powerful log management solution and is increasingly used by security teams for SIEM (Security

Benefits of Komand + SplunkKomand connects to Splunk easily, allowing you to react to Splunk alerts to perform additional

enrichment that works based on context, build a complex notification or response workflow, or even run

Splunk queries from triggers in other tools.

T

C O N S E R V E YO U R W O R K F O R C E ' S T I M E

Get the context you need fast with

automated follow-on queries in Splunk

using our ‘Search’ action, and perform

contextualized notifications and escalations

easily, without writing code.

T

R E S P O N D S A F E LY,D O N ' T J U S T A L E R T

Build and perform response workflows

(whether a human is involved or not) with

multiple ‘decision points’, allowing for

flexibility and accuracy.

T

R E P E ATA B L E & E F F I C I E N TS E C U R I T Y P R O C E S S E S

Using Komand’s intuitive workflow builder,

define your workflow ‘best practices’ for

responding to an alert to meet SLA and

compliance requirements.

T

G E T M O R E O U T O F YO U R E N T I R E S E C U R I T Y S TAC K

Use Komand to connect your existing

security stack with Splunk alerts and

searches, making data transport into other

tools (or vice versa) as simple as a few clicks.

Supercharge Your Splunk Environment with KomandLearn more about how Komand will empower you to perform Splunk investigations, notifications, and

response actions faster than ever before. Email [email protected] to get started.