Integrate ASMS with Splunk
The AlgoSec Splunk App for Security Incident Response provides the ability to better analyze security incidents, understand their impact, and quickly accomplish remediation.
Note: The AlgoSec Splunk App v1.0.5 was tested with Splunk v6.4.2 and AlgoSec Security Management Suite v6.9, v6.10, and v6.11.
Install the AlgoSec App
Do the following:
- Download the App from Splunkbase, or install it directly from Splunk (Browse more Apps then search for "AlgoSec").
-
Configure the AlgoSec App, by doing the following:
- Under Manage Applications look for the AlgoSec App line and click set up.
-
Provide the AlgoSec server IP Address, username and password.
The AlgoSec Incident Response App is now ready for use.
View business impact and internet exposure data
The AlgoSec App provides the ability to retrieve business application information and internet exposure information for a specific server. This information includes:
Business Application context from AlgoSec AppViz |
Names of affected applications, indication as to whether the application is critical, and more details about the applications, including a link to the AppViz Web Interface with a list of the relevant applications. |
Network Connectivity (exposure to the Internet) | AlgoSec Traffic Simulation Query results to indicate whether the server is open to the Internet |
Do either of the following:
- View business impact and internet exposure information from the IP address
- View business impact and internet exposure information directly from the App
Note: Accessing the App from the IP address will pre-populate the server field.
View business impact and internet exposure information from the IP address
Do the following:
- Search the logs for the desired IP address.
-
Click the Actions arrow for the desired IP, and select one of the following options in the menu:
- Find Affected Business Applications. Chose this option to link directly to AppViz to view a list of affected applications along with all of the information AppViz provides.
- Analyze in AlgoSec Incident Analysis. Chose this option to view business context information and internet exposure information from the Security Incident Analysis tab of the App.
Details shown include:
Business Impact area |
The Business Impact area includes:
|
Exposure to the Internet area |
The Exposure to the Internet area includes: |
View business impact and internet exposure information directly from the App
Do the following:
-
Click on the AlgoSec Security Handling App.
-
Go to the Security Incident Analysis tab in the AlgoSec App. This is the home page by default.
-
In the Server IP field, type the name of the IP address.
-
Click Submit.
Information about the server appears:
Business Impact area |
The Business Impact area includes:
|
Exposure to the Internet area |
The Exposure to the Internet area includes:
|
Isolate a server
You can open a FireFlow change request to block all traffic to and from a risky server.
To customize the change request, see Customize the Isolate Server change request.
Do one of the following:
Note: Accessing the App from the IP address will pre-populate the server field.
Isolate a server from the IP address
Do the following:
-
Search the logs for the desired IP address.
-
Click the Actions arrow for the desired IP, and select Isolate server from the network.
A change request is created in AlgoSec FireFlow, requesting to block all traffic to and from this server. The Security Incident Response tab appears with a link to the change request in FireFlow, allowing you to track implementation progress.
Isolate a server directly from the App
Do the following:
- Click on the AlgoSec Security Handling App.
-
Click on the Security Incident Response tab in the AlgoSec App.
-
Complete the IP of Server to Isolate, Change Request Title, and Details fields.
-
Click Submit.
A change request is created in AlgoSec FireFlow, requesting to block all traffic to and from this server. A link to the change request appears in the page to allow you to track implementation progress.
Customize the AlgoSec App
The AlgoSec App supports the following customizations:
- Customize the fields supporting AlgoSec workflow actions
- Configure the 'Find Affected Business Applications' workflow action
- Customize the Isolate Server change request
- Customize the parameters used to calculate internet exposure
- Customize the conditions for Business Application Criticality
Customize the fields supporting AlgoSec workflow actions
Do the following:
- Go to Settings -> Fields and choose Workflow actions.
-
Click one of the AlgoSec actions (ABFAppLookup, algosec_incident_analysis, algosec_isolate_server) and add the needed field names under Apply only to the following fields.
-
Click Save.
-
Repeat for the other actions, as desired.
Configure the 'Find Affected Business Applications' workflow action
In order to use the Find Affected Business Applications action, you must configure the App with the IP address of your AlgoSec server.
Do the following:
-
Go to Settings -> Fields and choose Workflow actions.
-
Choose ABFAppLookup.
-
Update the URL field with your AlgoSec Server IP address.
Customize the parameters used to calculate internet exposure
The Security Incident Analysis page includes a box which details Exposure to the Internet. This information is based on traffic simulation query results performed by AlgoSec Firewall Analyzer. By default, the query runs with the chosen IP address as the source, '8.8.8.8' (representing the Internet) as the destination, and 'any' as the service.
If desired, you can customize these parameters. For example, you may want to check connectivity from the internet to the chosen server, you may want to choose a different IP address to represent the Internet, or you may want to check the connectivity for other areas of the network (critical internal networks, etc.).
Do the following:
-
Open the AlgoSec App, choose Edit, and then click Edit Source (XML).
-
Scroll down to the last panel and edit the following line to represent the traffic simulation query you prefer.
<query>| afaquery src="$ip$" dst="8.8.8.8"</query>
-
To add additional queries, do the following:
- Duplicate the panel by copying all the lines from the <panel> start tag to its end </panel>.
-
Modify the panels to represent the traffic simulation queries you prefer.
-
Click Save.
Customize the Isolate Server change request
By default, the Isolate Server function creates a change request with two traffic lines: one line blocks traffic from the chosen server to 'any' with 'any' service, and the other blocks traffic from 'any' to the chosen server with 'any' service. If desired, you can customize these parameters by editing the 'isolate server' script.
Do the following:
-
Go to the following path in your Splunk server file system: \etc\apps\TA-AlgoSec_Incident_Handling\bin
-
Find AFFIsolateServer.py.
-
Edit the script and change the parameters per your needs.
Customize the conditions for Business Application Criticality
By default, a business application is marked as critical when one of the affected applications has the 'critical' label. If desired, you can specify different conditions, by editing the relevant script. Similarly, you can also extract additional information from AppViz (e.g. technical contacts/owners of the affected applications).
Do the following:
-
Go to the following path in your Splunk server file system: \etc\apps\TA-AlgoSec_Incident_Handling\bin
-
Find ABFSearch.py.
-
Edit the script as desired.
AlgoSec features in other Splunk apps
AlgoSec capabilities can be activated from within other Splunk Apps (built-in or custom) by using the Workflow Actions. By default, these actions will appear in the Action menus of IP addresses in the following field names:
- source_ip
- dest_ip
- ip
- src_ip
- dst_ip
- source
- destination
- server_ip
The IP address from the chosen field will be automatically populated in the AlgoSec App pages. For more details, see Customize the fields supporting AlgoSec workflow actions.
In addition, the workflow actions also include the pre-defined Find Affected Business Applications (AlgoSec) action. Clicking on it will open an AlgoSec AppViz window with a list of all the business applications affected by the chosen IP address. For more details, see Configure the 'Find Affected Business Applications' workflow action.
You can pick and choose AlgoSec functionality, customize it, and incorporate it in your own custom Splunk Apps.
Do the following:
- Copy the relevant configuration parameters to your Splunk App (AlgoSec server IP, username/password, etc.).
-
Copy the scripts and panels to your own Splunk Apps.
Tip: You can also use the scripts in the AlgoSec App as a reference.