Playbooks are Python scripts that Phantom interprets in order to execute your mission when you see something that you want to take action on. Playbooks hook into the Phantom platform and all of its capabilities in order to execute actions, ensuring a repeatable and auditable process around your security operations. Sample Community Playbooks can be customized at will and are synchronized via Git and published on our public Community GitHub repository. You can read more about Phantom and Playbooks here.
The spotlight playbook for today is on Operationalizing Threat Intelligence.
Threat intelligence is everywhere around us. It comes in various forms such as IP addresses, URLs, file hashes, vulnerability reports, threat actor reports, etc. This list goes on and on. The STIX document format exists solely in order to make threat intelligence shareable. As security operators we seek out this data wherever we can get it. With all of the sources, it has become increasingly important to operationalize this threat information and turn it into detection and protection mechanisms for the enterprise. How is this done today? Like anything else, there are several ways to solve it. The following is a common, albeit simplified scenario.
An organization has a subscription to a threat intel feed that provides threat data such as raw indicators, threat actor details, and even vulnerabilities. The reports are delivered, and an analyst will perform several steps along the path to protective action. The phases of operationalizing this data can be labeled as “Investigation (i.e. indicator enrichment and hunting) and Defending (i.e. including indicator deployment)”.
Indicator Hunting, Investigation and Enrichment
Determine the type of report on hand:
Raw Indicators
Threat Actor Details
Vulnerability Report
The prior actions outline only the initial protective measures that need to be implemented. After these actions are taken the Security Operations team must switch focus from threat ingestion and deploying protection measures, to analysis of prior log data to determine if there has been any prior contact from or with the identified threats. This is perhaps the most resource intensive – both from an infrastructure as well as a manpower perspective and is often left incomplete. There are simply so many sources of alerts and threat data that require triage as well as possibly requiring all of the prior outlined steps.
Containment and Recovery (Defending):
All of these steps are repeated on each intel report received by the organization, both in the “Protection” stage as well as in the “Detection” stage.
The steps above can easily be automated in Phantom, and the savings can be substantial.
Interested in seeing how Phantom Playbooks can help your organization? Get the free Phantom Community Edition.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.