Cisco Security and Splunk SOAR

How Splunk SOAR and Cisco Security work together

The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.

Founded in 2003, Splunk is a global company  — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.

Product Integrations

  • Secure Endpoint: Splunk SOAR (formerly Phantom) Supported Actions with Secure Endpoint •test connectivity - Validate the asset configuration by attempting to connect and getting the version of the API ... •list endpoints - List all of the endpoints connected to Secure Endpoint (FireAMP) •hunt file - Search for a file matching a SHA256 hash across all endpoints •hunt ip - Search for a given IP •hunt url - Search for a given URL •get device info - Get information about a device given its connector GUID Product page: https://my.phantom.us/4.5/apps/?search=FireAMP
  • Secure Malware Analytics: There is simple “playbook”, or automated security operations procedure, which demonstrates using Phantom and Cisco to investigate a security alert associated with a questionable URL •use Secure Malware Analytics to investigate the URL and get a threat score •If the threat score is over a threshold value, I block the IP associated with the URL using Cisco Secure Firewall ASA Here is a another sample playbook utilizing Cisco products. •A playbook starts with a security alert associated with a questionable file •The file's hash is passed to Secure Malware Analytics •The resulting threat score is then analyzed and if over a defined threshold, an action is taken to automatically list all endpoints with the file in question and create a ticket that describes them •This playbook could just as easily take a remediate action such as locking down the endpoint with Cisco ISE
  • SecureX Threat Response: Splunk SOAR user, or an automated playbook/action, initiates a query to SecureX threat response for verdicts or sightings of an observable and render in a table
  • Kenna: Splunk can generate incidents using the Kenna Security app on Splunkbase

Useful links