Alert triage can be a very cumbersome and time consuming process for SOC teams. Our State of Security report found that 26% of respondents agree that the volume of alerts they deal with makes it difficult to keep up with addressing emergencies.
While tools like virtual sandboxes can help analysts better test and understand the severity of the threats they encounter, the process of testing and documenting results can add further tedium to an already prolonged process.
Splunk Attack Analyzer can help SOC teams automate these key threat analysis tasks by performing the actions required to fully execute an attack chain, including:
When paired with Splunk SOAR, Splunk Attack Analyzer can conduct automated analysis of identified indicators without SOC analysts having to perform manual investigative tasks.
These two products can be used together to help SOC teams tackle a variety of security use cases and reduce the time consuming staring on the alert triage process.
For this month’s edition of Splunk SOAR Playbook of the Month, we’ll be taking a look at how you can use one of our out-of-the-box playbooks for faster, simpler, and more effective dynamic analysis.
The Splunk Attack Analyzer Dynamic Analysis Playbook is an input playbook that accepts url link, domain or vault_id (hash) to be detonated using the Splunk Attacker (SAA) API connector. This process aligns with Mitre D3FEND’s Dynamic Analysis technique which involves executing or opening a file in a sandbox environment to see if the artifact in question is a malicious program or if it attempts to exploit another program.
By using this playbook, you can easily tap into the combined potential of Splunk SOAR and Splunk Attack Analyzer for more effective dynamic analysis of threats to enable more informed response and remediation efforts.
For the latest on Splunk SOAR playbooks, please visit research.splunk.com/playbooks. Also, check out our previous blog where we discussed how to implement the Cisco Umbrella DNS Denylisting playbook.
As always, we look forward to hearing about your experience with this month’s featured playbook as well as any other playbooks you’ve been using. We’ll be back next month with more playbooks and demos, but until then, get out there and get automating!
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.