This workflow is an example of how we can use Cisco SecureX and other tools to address SolarWinds and future security threats using SecureX orchestration.
This workflow takes a Talos blog post, conducts an investigation into it using Cisco Threat Response, and then puts the results in a casebook. If targets are found, an incident is created. If a Webex Teams room name and bot token are provided, a message with the investigation's results will be sent.
- Target Group: Default TargetGroup
- Targets Used: CTR_For_Access_Token, CTR_API, Private_CTIA_Target, Webex Teams
- CTR_Credentials
- Webex Teams Token
- SolarWinds Casebook ID
- Sys Time in ISO Format (published in this repo)
- Threat Response - Update Casebook (published in this repo)
The URL will be a different depending on the region your account is in:
- US: https://securex-ao.us.security.cisco.com/orch-ui/workflows/
- EU: https://securex-ao.eu.security.cisco.com/orch-ui/workflows/
- APJC: https://securex-ao.apjc.security.cisco.com/orch-ui/workflows/
Note: CTR_API, CTR_For_Access_Token and Webex Teams are the standard targets that are pre-configured in SecureX orchestration out of the box.
It is assumed that Webex Teams Room for notifications will be created in advance (see prerequisites section).
Create Teams Room and add all necessary people. SXO will need to know the Room Name in order to send notifications.
In order to send the Webex Teams messages, you have two options:
- Option 1 (For tests only): Use your own Webex Teams API token that will need to be updated manually every 12 hours.
- Option 2 (Recommended for production): Use Webes Teams Bot to send messages.
- Create Webex Teams Bot following these instructions: Create a Bot
- Record its API Token
- Add Bot to the Webex Teams Room so that it can send notifications.
SXO workflow is represented by the file in JSON format, that contains definitions and description of all the activities, targets, variables and atomic workflows that are in use. In this step, we will use file import to add these workflows to SecureX orchestration environment.
Note: Refer to documentation for more information about workflow import options: https://ciscosecurity.github.io/sxo-05-security-workflows/importing
- Save the following workflows included in this reposiroty as json files on your computer: Threat Response - Update Casebook and Sys time to ISO format
- In SecureX orchestration left hand-side menu, go to Workflows -> Atomic Actions -> Import -> Browse and import the atomic workflows.
-
Save the following workflow included in this reposiroty as json files on your computer talos-solarwinds-blogpost-to-incident
-
In SecureX orchestration left hand-side menu, go to Workflows -> My Workflows -> Import -> Browse and import the workflow called talos-solarwinds-blogpost-to-incident
You will be presented with the following warning:
Don't get scared and click "Update" :)
- This is where you will provide your Webex Token:
Copy your personal Webex Teams API Token or your Webex Teams Bots' API Token into the VALUE field. This is Secure String variable and it will be stored securely in the SXO.
-
You should see the new workflow being added to the list. Click on the workflow when import is complete.
-
If import was successful, you should see zero warnings at the top of the workflow canvas.
-
You will need to update local variable called Webex Room Name. To do so, oepn the workflow editor and click on the variable name in the workflow properies panel on right hand side.
-
Modify the VALUE field to match the name of your Webex Teams Triage Room to receive notifications.
- To execute the workflow, click RUN at the right top corner in the action pane.
- Observe workflow execution.
As the workflow progresses, you should see activities turning green. Don't be alarmed if some activities turn red, it is expected behavior.
Please test this workflow before implementing in a production environment. This is a sample workflow!
Oxana Sannikova (Cisco)