SlideShare a Scribd company logo
Use Splunk for Incident Response,
Orchestration and Automation
27 Mars | Paris
Younes Khaldi | Sales Engineer
▶ Challenges with Security Operations Today
▶ Overview of Splunk Adaptive Response Initiative
▶ Technology behind the Adaptive Response Framework
▶ Demonstrations
▶ How to build your own AR Action
▶ Resources
Agenda
Incident
Response
Slow Alert Noise
Tools
Problem
Many tools
Disparate tools
Skills
Lack of skills
Retention
Training
Scale
Horizontal and Vertical
Orchestration
Automation
Security Operations Need to Change
Orchestration
▶ Brings together or integrates different
technologies and tools
▶ Provides the ability to coordinate
informed decision making, formalize
and automate responsive actions
▶ Security-specific or non-security-
specific
Automation
▶ Focus is on how to make machines do
task-oriented "human work”
▶ Improve repetitive work, with high
confidence in the outcome
▶ Allows multiple tasks or "playbooks" to
potentially execute numerous tasks
▶ Automation is a subset of orchestration
Orchestration vs Automation
Incident Response
Challenge
Incident Response Takes Significant Time
7
Source: SANS 2017 Incident Response Survey
Where Does Your Time Go?
When working an incident, which phase generally takes the
longest to complete in your organization?
Day in the life of a security professional survey © 2016 EMA, Inc.
Too much time lost:
time-to-decide
time-to-act
= increased risk/impact
Time-to-Contain + Time-to-Respond = 72%
When working an incident, which phase generally takes
the longest to complete in your organization?
Day in the life of a security professional survey © 2016 EMA, Inc.
Adaptive Response
Overview
Search and
Investigate
Analytics-Driven Security
Index Untapped Data:
Any Source, Type, Volume
On-
Premises
Private
Cloud
Public
Cloud
Storage
Online
Shopping Cart
Telecoms
Desktops
Security
Web
Services
Networks
Containers
Web
Clickstreams
RFID
Smartphones
and Devices
Servers
Messaging
GPS
Location
Packaged
Applications
Custom
Applications
Online
Services
DatabasesCall Detail
Records
Energy
Meters
Firewall
Intrusion
Prevention
Splunk
Enterprise Security
600+
Security Apps
Splunk User
Behavior Analytics
Monitoring,
Correlations,
Alerts
Dashboards
and Reports
Analytics and
Virtualization
Adaptive
Response
Employee
Info
Asset and
CMDB
Threat
Intelligence
Applications Data Stores
External Lookups
Platform for Operational Intelligence
Adaptive Response
Identity and
Access
Internal Network
Security
Endpoints
OrchestrationWAF & App
Security
Threat
Intelligence
Network
Web Proxy
FirewallMission
Deeper integrations
across the best
security
technologies to help
combat advanced
attacks together.
Approach
Gather/analyze,
share, take action
based on end-to-end
context, across
security domains.
▶ File analysis (Sandbox/malware analysis)
▶ IP reputation
▶ Hunt File: look for a particular file/process on endpoints (Forensics)
▶ Run query into Splunk (check who received/clicked on the email)
▶ Quarantine Device: disconnect a device from the network via NAC
▶ Sending Service Ticket to Reimage Workstation!
▶ Later: Malware reverse engineering
Journey of an incident response: Phishing
investigation and remediation
Cloud Security Endpoints
Orchestration
WAF & App
Security
Threat Intelligence
Network
Web Proxy
Firewall
Identity and Access
“ Security teams must be quicker
than ever in processing a vast
number of alerts with accuracy,
and we could no longer afford
the manual method of
coordinating across various
siloes of security for incidence
response within our
environments.”
Tobias Langbein,
security architect
Swisscom
“ Leveraging the ForeScout
Extended Module for Splunk via
Adaptive Response, we can
increase our holistic data
defense and security to
minimize the impact of
malware and data breaches.
…This will enable us to
minimize the time and
resources needed to respond
to emerging threats.”
Clayton Colwell,
associate security engineer,
Brown-Forman Corporation.
“ …The Adaptive Response
capabilities in Splunk Enterprise
Security provide the centerpiece
of a flexible, ecosystem-
driven approach to combat
advanced attacks through a
more coordinated, automated
response.”
Scott Crawford
research director of information security
451 Research
What the community is saying
Adaptive Response
Technology
How To Interact With AR
Suggest Next StepsAutomatically With Notables Run Ad-Hoc
Adaptive Response Actions (Examples)
AUTOMATIO
N
Automatically With Notables
Adaptive Response Actions (Examples)
AUTOMATIO
NCategory – Information gathering, Information conveyance, Permissions control
Task – Create, Update, Delete, Allow, Block
Subject – What will be acted upon (network, endpoint, etc.)
Vendor – Providing the action. Ex.: Splunk, Ziften, Palo Alto Networks, etc.
Adaptive Response Actions (Examples)
AUTOMATIO
N
Accelerate Detection, Investigation &
Response
▶ Use the correlation search builder
to configure, automate and attach
the results to notable events
▶ In incident review, configure and
execute ad-hoc responses and
queries across the security
ecosystem
▶ Use the actions dashboard to
search and review responses
taken and their results
Demo
Adaptive Response
AWS Adaptive Response
AR actions using AWS Lambda
▶ Detect suspicious activity
▶ Tag machine
▶ Change security group to lockdown
▶ Take snapshot of infected instance
▶ Send email to instance owner (Terminate)
What we will show
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and Automation
Anomali Threatstream Splunk
App Adaptive Response
Capabilities
Information gathering AR
actions using Anomali
Splunk’s powerful analytics with Anomali’s threats
▶ Anomali is a powerful Threat Hunting engine that compares millions of Indicator
Of Compromise (IOC) against internal traffic
▶ Match threats from Anomali provides security teams the tools to research and
investigate IOCs
▶ Anomali delivers critical insight into IOC threats
▶ Splunk’s users can access this information, or pivot to the Anomali portal
▶ Detect suspicious communications
▶ Dispatch “notable event” data to Anomali for further analysis.
▶ Compare against ThreatStream’s database of threat intelligence
▶ Write information back to the Splunk’s investigation timeline
What we will show
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and Automation
The Development
Building your own AR Actions
▶ Option 1: Develop from scratch
▶ Option 2: Use the Splunk Add-on Builder (Recommended)
▶ Option 3: Outsource to a development partner
Development Options
Option #1 Dev From Scratch
▶ Start here:
• Guide to developing AR actions for ES
• Code example of AR action
▶ Pretty easy, but there is a better
way…
Option #2: Splunk Add-on Builder
Validate Add-on
• Score health of CIM compliance and naming conventions
• Verify readiness for Certification
• Detect problems with field extraction
Define Knowledge Extraction
• Extract and define fields using automated event analysis
• Map fields to CIM with click of button
Create Modular Input and Custom Alert
• Create required directory structure, configuration/XML files, Python
scripts
• Multiple input types supported, including shell, REST, and Splunk Python
SDK
• Build and validate Custom Alert Action (optional)
Create Add-on using step by step process
free download
splunkbase.com
▶ AR Technical Brief on splunk.com
• https://www.splunk.com/pdfs/technical-briefs/using-splunk-adaptive-response.pdf
▶ Adaptive Response framework
• http://dev.splunk.com/view/enterprise-security/SP-CAAAFBE
▶ Video Demos
• Carbon Black AR
• Recorded Future
• Anomali
Resources
© 2018 SPLUNK INC.
1. Adaptive Response helps accelerate
Incident Detection, Investigation and
Response
2. Use Adaptive Response framework for
multi-vendor security workflow
orchestration and automation
3. Use with IT and Security domains to
solve a range of security use cases
Mitigate Incident
Response Challenges
With Orchestration and
Automation
Key
Takeaways
Attend .conf18
.conf is Splunk’s premier education and thought
leadership event for thousands of IT and business
professionals who are keen to use machine data insights
to find answers.
.conf18 | October 1 - 4, 2018
University | September 29 – October 1, 2018
Walt Disney World Swan and Dolphin Resort | Orlando,
Florida
“.conf is an exciting collection of technical sessions, hands-on demos and social
networking with industry professionals and users. I can’t wait for .conf18.”
– Michael Deisher, Systems Analyst, Visa
Registration opens April 10th!
© 2018 SPLUNK INC.
Thank You!
https://www.surveymonkey.com/r/SLParis2018
Q&A

More Related Content

PPTX
SplunkLive! Paris 2018: Delivering New Visibility And Analytics For IT Operat...
PPTX
SplunkLive! Paris 2018: Plenary Session
PPTX
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
PPTX
SplunkLive! Paris 2018: Integrating Metrics and Logs
PPTX
SplunkLive! Paris 2018: Event Management Is Dead
PPTX
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
PDF
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
PPTX
SplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Delivering New Visibility And Analytics For IT Operat...
SplunkLive! Paris 2018: Plenary Session
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Integrating Metrics and Logs
SplunkLive! Paris 2018: Event Management Is Dead
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics Methods

What's hot (20)

PPTX
SplunkLive! Munich 2018: Predictive, Proactive, and Collaborative ML with IT ...
PPTX
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
PPTX
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
SplunkLive! Munich 2018: Getting Started with Splunk Enterprise
PPTX
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
PPTX
SplunkLive! Paris 2018: Splunk And AI 101
PPTX
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
PPTX
SplunkLive! Frankfurt 2018 - Use Splunk for Incident Response, Orchestration ...
PPTX
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
PPTX
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
PPTX
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
PPTX
SplunkLive! Munich 2018: Intro to Security Analytics Methods
PPTX
Splunk Discovery: Milan 2018 - Splunk Overview
PPTX
SplunkLive! Munich 2018: Monitoring the End-User Experience with Splunk
PPTX
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
PPTX
SplunkLive! Paris 2018: Legacy SIEM to Splunk
PPTX
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
PPTX
SplunkLive! Munich 2018: Integrating Metrics and Logs
SplunkLive! Munich 2018: Predictive, Proactive, and Collaborative ML with IT ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Munich 2018: Getting Started with Splunk Enterprise
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
SplunkLive! Paris 2018: Splunk And AI 101
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Frankfurt 2018 - Use Splunk for Incident Response, Orchestration ...
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Munich 2018: Intro to Security Analytics Methods
Splunk Discovery: Milan 2018 - Splunk Overview
SplunkLive! Munich 2018: Monitoring the End-User Experience with Splunk
Splunk Discovery: Milan 2018 - Intro to Security Analytics Methods
SplunkLive! Paris 2018: Legacy SIEM to Splunk
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
SplunkLive! Munich 2018: Integrating Metrics and Logs
Ad

Similar to SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and Automation (20)

PPTX
Splunk Incident Response, Orchestrierung und Automation
PPTX
Accelerate incident Response Using Orchestration and Automation
PPTX
Accelerate incident Response Using Orchestration and Automation
PPTX
Accelerate Incident Response with Orchestration & Automation
PPTX
Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Splunk Discovery Köln - 17-01-2020 - Accelerate Incident Response
PDF
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
PDF
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
PPTX
Security crawl walk run presentation mckay v1 2017
PDF
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
PPTX
Customer Presentation with a Healthcare Company
PPTX
SplunkLive! Customer Presentation – HCA
PPTX
Level Up Your Security Skills in Splunk Enterprise
PPTX
Build a Security Portfolio That Strengthens Your Security Posture
PPTX
Group Health Cooperative Customer Presentation
PPTX
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
PDF
Splunk-Presentation
PDF
Splunk for security
Splunk Incident Response, Orchestrierung und Automation
Accelerate incident Response Using Orchestration and Automation
Accelerate incident Response Using Orchestration and Automation
Accelerate Incident Response with Orchestration & Automation
Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Splunk Discovery Köln - 17-01-2020 - Accelerate Incident Response
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Security crawl walk run presentation mckay v1 2017
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Customer Presentation with a Healthcare Company
SplunkLive! Customer Presentation – HCA
Level Up Your Security Skills in Splunk Enterprise
Build a Security Portfolio That Strengthens Your Security Posture
Group Health Cooperative Customer Presentation
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Splunk-Presentation
Splunk for security
Ad

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced IT Governance
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Modernizing your data center with Dell and AMD
PDF
cuic standard and advanced reporting.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced IT Governance
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Monthly Chronicles - July 2025
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Approach and Philosophy of On baking technology
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Unlocking AI with Model Context Protocol (MCP)
Modernizing your data center with Dell and AMD
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx

SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and Automation

  • 1. Use Splunk for Incident Response, Orchestration and Automation 27 Mars | Paris Younes Khaldi | Sales Engineer
  • 2. ▶ Challenges with Security Operations Today ▶ Overview of Splunk Adaptive Response Initiative ▶ Technology behind the Adaptive Response Framework ▶ Demonstrations ▶ How to build your own AR Action ▶ Resources Agenda
  • 3. Incident Response Slow Alert Noise Tools Problem Many tools Disparate tools Skills Lack of skills Retention Training Scale Horizontal and Vertical Orchestration Automation Security Operations Need to Change
  • 4. Orchestration ▶ Brings together or integrates different technologies and tools ▶ Provides the ability to coordinate informed decision making, formalize and automate responsive actions ▶ Security-specific or non-security- specific Automation ▶ Focus is on how to make machines do task-oriented "human work” ▶ Improve repetitive work, with high confidence in the outcome ▶ Allows multiple tasks or "playbooks" to potentially execute numerous tasks ▶ Automation is a subset of orchestration Orchestration vs Automation
  • 6. Incident Response Takes Significant Time 7 Source: SANS 2017 Incident Response Survey
  • 7. Where Does Your Time Go? When working an incident, which phase generally takes the longest to complete in your organization? Day in the life of a security professional survey © 2016 EMA, Inc. Too much time lost: time-to-decide time-to-act = increased risk/impact
  • 8. Time-to-Contain + Time-to-Respond = 72% When working an incident, which phase generally takes the longest to complete in your organization? Day in the life of a security professional survey © 2016 EMA, Inc.
  • 10. Search and Investigate Analytics-Driven Security Index Untapped Data: Any Source, Type, Volume On- Premises Private Cloud Public Cloud Storage Online Shopping Cart Telecoms Desktops Security Web Services Networks Containers Web Clickstreams RFID Smartphones and Devices Servers Messaging GPS Location Packaged Applications Custom Applications Online Services DatabasesCall Detail Records Energy Meters Firewall Intrusion Prevention Splunk Enterprise Security 600+ Security Apps Splunk User Behavior Analytics Monitoring, Correlations, Alerts Dashboards and Reports Analytics and Virtualization Adaptive Response Employee Info Asset and CMDB Threat Intelligence Applications Data Stores External Lookups Platform for Operational Intelligence
  • 11. Adaptive Response Identity and Access Internal Network Security Endpoints OrchestrationWAF & App Security Threat Intelligence Network Web Proxy FirewallMission Deeper integrations across the best security technologies to help combat advanced attacks together. Approach Gather/analyze, share, take action based on end-to-end context, across security domains.
  • 12. ▶ File analysis (Sandbox/malware analysis) ▶ IP reputation ▶ Hunt File: look for a particular file/process on endpoints (Forensics) ▶ Run query into Splunk (check who received/clicked on the email) ▶ Quarantine Device: disconnect a device from the network via NAC ▶ Sending Service Ticket to Reimage Workstation! ▶ Later: Malware reverse engineering Journey of an incident response: Phishing investigation and remediation
  • 13. Cloud Security Endpoints Orchestration WAF & App Security Threat Intelligence Network Web Proxy Firewall Identity and Access
  • 14. “ Security teams must be quicker than ever in processing a vast number of alerts with accuracy, and we could no longer afford the manual method of coordinating across various siloes of security for incidence response within our environments.” Tobias Langbein, security architect Swisscom “ Leveraging the ForeScout Extended Module for Splunk via Adaptive Response, we can increase our holistic data defense and security to minimize the impact of malware and data breaches. …This will enable us to minimize the time and resources needed to respond to emerging threats.” Clayton Colwell, associate security engineer, Brown-Forman Corporation. “ …The Adaptive Response capabilities in Splunk Enterprise Security provide the centerpiece of a flexible, ecosystem- driven approach to combat advanced attacks through a more coordinated, automated response.” Scott Crawford research director of information security 451 Research What the community is saying
  • 16. How To Interact With AR Suggest Next StepsAutomatically With Notables Run Ad-Hoc
  • 17. Adaptive Response Actions (Examples) AUTOMATIO N Automatically With Notables
  • 18. Adaptive Response Actions (Examples) AUTOMATIO NCategory – Information gathering, Information conveyance, Permissions control Task – Create, Update, Delete, Allow, Block Subject – What will be acted upon (network, endpoint, etc.) Vendor – Providing the action. Ex.: Splunk, Ziften, Palo Alto Networks, etc.
  • 19. Adaptive Response Actions (Examples) AUTOMATIO N
  • 20. Accelerate Detection, Investigation & Response ▶ Use the correlation search builder to configure, automate and attach the results to notable events ▶ In incident review, configure and execute ad-hoc responses and queries across the security ecosystem ▶ Use the actions dashboard to search and review responses taken and their results
  • 22. AWS Adaptive Response AR actions using AWS Lambda
  • 23. ▶ Detect suspicious activity ▶ Tag machine ▶ Change security group to lockdown ▶ Take snapshot of infected instance ▶ Send email to instance owner (Terminate) What we will show
  • 25. Anomali Threatstream Splunk App Adaptive Response Capabilities Information gathering AR actions using Anomali
  • 26. Splunk’s powerful analytics with Anomali’s threats ▶ Anomali is a powerful Threat Hunting engine that compares millions of Indicator Of Compromise (IOC) against internal traffic ▶ Match threats from Anomali provides security teams the tools to research and investigate IOCs ▶ Anomali delivers critical insight into IOC threats ▶ Splunk’s users can access this information, or pivot to the Anomali portal
  • 27. ▶ Detect suspicious communications ▶ Dispatch “notable event” data to Anomali for further analysis. ▶ Compare against ThreatStream’s database of threat intelligence ▶ Write information back to the Splunk’s investigation timeline What we will show
  • 30. ▶ Option 1: Develop from scratch ▶ Option 2: Use the Splunk Add-on Builder (Recommended) ▶ Option 3: Outsource to a development partner Development Options
  • 31. Option #1 Dev From Scratch ▶ Start here: • Guide to developing AR actions for ES • Code example of AR action ▶ Pretty easy, but there is a better way…
  • 32. Option #2: Splunk Add-on Builder Validate Add-on • Score health of CIM compliance and naming conventions • Verify readiness for Certification • Detect problems with field extraction Define Knowledge Extraction • Extract and define fields using automated event analysis • Map fields to CIM with click of button Create Modular Input and Custom Alert • Create required directory structure, configuration/XML files, Python scripts • Multiple input types supported, including shell, REST, and Splunk Python SDK • Build and validate Custom Alert Action (optional) Create Add-on using step by step process free download splunkbase.com
  • 33. ▶ AR Technical Brief on splunk.com • https://www.splunk.com/pdfs/technical-briefs/using-splunk-adaptive-response.pdf ▶ Adaptive Response framework • http://dev.splunk.com/view/enterprise-security/SP-CAAAFBE ▶ Video Demos • Carbon Black AR • Recorded Future • Anomali Resources
  • 34. © 2018 SPLUNK INC. 1. Adaptive Response helps accelerate Incident Detection, Investigation and Response 2. Use Adaptive Response framework for multi-vendor security workflow orchestration and automation 3. Use with IT and Security domains to solve a range of security use cases Mitigate Incident Response Challenges With Orchestration and Automation Key Takeaways
  • 35. Attend .conf18 .conf is Splunk’s premier education and thought leadership event for thousands of IT and business professionals who are keen to use machine data insights to find answers. .conf18 | October 1 - 4, 2018 University | September 29 – October 1, 2018 Walt Disney World Swan and Dolphin Resort | Orlando, Florida “.conf is an exciting collection of technical sessions, hands-on demos and social networking with industry professionals and users. I can’t wait for .conf18.” – Michael Deisher, Systems Analyst, Visa Registration opens April 10th!
  • 36. © 2018 SPLUNK INC. Thank You! https://www.surveymonkey.com/r/SLParis2018
  • 37. Q&A