Module 3: Security Incident and Threat Intelligence Integrations Flashcards
Lab Takeaway: Explain the differences between the ServiceNow Store and ServiceNow Share
What are the four integrations provided in the security operations base system
- Security Incident Response - Event Management Integration
- Security Incident Response - Import Set API Integration
- Threat Intelligence - lookup source integration
- Threat Intelligence - threat source integration
What are the three driving needs for capability framework v2
- Enhanced Configurability
- Configure Orchestration parameters outside of workflows (Max Concurrent requests, Rate limiting, batch size, etc)
- Define rune time conditions for triggering Orchestration (Category = malware, Threat lookup = VirusTotal)
- Improved Maintainability
- Improve robustness of Orchestration calls (configurable time out, retry after, retry limits)
- Design integrations to receive inputs in a flexible way (CI, observables, etc)
- Employ better error handling routines with integrations (flow, subflow and script level)
- Ease to Extend, Scale, and Report
- Create blueprint that are easy to extend and replicate; reusable actions go into iHub spokes
- Address Tech Debts: Integrations outside the capability framework, not domain separated, not efficiently designed
- Easy to report on “usage” and “value” of Orchestration through PA dashboards (customer facing)
Expalin the following capability that has been moved from a workflow to a Flow:
Block Request
Provides a way to block observables associated with a security incident on a firewall, web proxy, or some other control point. This capability is used during incident response investigations to contain an identified threat.
Example integration: Palo Alto Network - Firewall
Expalin the following capability that has been moved from a workflow to a Flow:
Email Search and Delete
Provides a wayto search an email server during a security investigation and if necessary, delete emails from the server
Expalin the following capability that has been moved from a workflow to a Flow:
Enrich Configuration Item
Provides a general way to enrich configuration items with additional information from a variety of sources. This capabilty is used during incident response investigations to enrich data associated with a security incident
Expalin the following capability that has been moved from a workflow to a Flow:
Enrich Observable
Provides a genearl way to enrich observables with additional information from a variety of sources. This capability is used during incident response investigations to contain an identified threat
Expalin the following capability that has been moved from a workflow to a Flow:
Event Ingestion
Provides a general way to create a security incident by mapping events from an integration source to a security incident
Expalin the following capability that has been moved from a workflow to a Flow:
Get Network Statistics
Retrieves a list of active network connections from an endpoint or host. This capability is used for incident enrichment during investigations
Expalin the following capability that has been moved from a workflow to a Flow:
Get Running Processes
Retrieves a list of running processes from an endpoint or host. This capability is used for incident enrichment during investigations.
Example integrations include:
Carbon Black and Tanium
Expalin the following capability that has been moved from a workflow to a Flow:
Isolate Host
Provides a way to isolate an endpoint or a host associated with a security incident to a watchlist that monitors for security events and generates alerts. This capability is used as part of incident response during investigations
Example: Carbon Black
Expalin the following capability that has been moved from a workflow to a Flow:
Publish to Watchlist
Provides a way to add observables associated with a security incident to a watchlist that monitors for security events and generates alerts. This capability is used as part of incident response during investigations
Expalin the following capability that has been moved from a workflow to a Flow:
Sightings Search
Searches various SIEMs or other log stories for instances of observables. This capability is used to determine the presence of malicious IoCs in your environment.
Exmaples include:
Splunk and QRadar
Expalin the following capability that has been moved from a workflow to a Flow:
Threat Lookup
Performs threat intelligence lookups to determine whether a certain observable is associated with a known security threat. This capability is used as part of incident response during investigations
What are the sighting search configuration options? (four)
- Sighting Search Configuration define queries that are specific to the integration that supports this search capability
- Each combination of Observable Type and integration will require its own Sighting Search Configuration
- Three Observable Types are supported for Sighting Search Configuration
- IP Address
- Hash
- URL
- Default Sighting Search Configurations are installed with an integration that supports the capability