Skip to main content

Handle Expanse Incident

This Playbook is part of the Cortex Xpanse by Palo Alto Networks Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

Main Playbook to Handle Expanse Incidents.

There are several phases:

  1. Enrichment: all the related information from the incident is extracted, and related indicators (IP, CIDR, Domain, DomainGlob, Certificate) are created and enriched.
  2. Validation: the found IP and FQDN are correlated with the information available in other products:
    • Risky or non-compliant communications to and from the IP with external IPs as flagged in Expanse's Behavior.
    • Firewall logs from Cortex Data Lake, Panorama, and Splunk.
    • User information from Active Directory.
    • Public IP address from AWS/GCP/Azure public IP feeds to identify the Public Cloud region and service (i.e., us-west-1 on AWS EC2).
    • IP and FQDN from Prisma Cloud inventory.
  3. Shadow IT check: based on the information found, the playbook can suggest whether the discovered issue corresponds to an asset that is known to the InfoSec team (i.e., there are firewall logs present, or the asset is protected by Prisma Cloud, or is part of an IP range associated to the company).
  4. Attribution: based on the information collected above, the analyst is prompted to assign this issue to an Organization Unit, which is a group within the company with a specific owner. The analyst can choose from existing Organization Units (stored in an XSOAR list) or define a new one.
  5. Response: depending on the issue type, several remediation actions can be automatically and manually performed, such as:
    • Tagging the asset in Expanse with a specific Organization Unit tag.
    • Blocking the service on PAN-OS (if a firewall is deployed in front of the service).
    • Creating a new Shadow IT issue (if the asset is detected to be Shadow IT and the analyst confirms it).
    • Adding the service to a Vulnerability Management system.
    • Linking the incident to a related Prisma Cloud alert for the asset (if the asset is found under Prisma Cloud inventory).

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • PAN-OS - Block Destination Service on Panorama
  • Expanse Enrich Cloud Assets
  • Extract and Enrich Expanse Indicators
  • Prisma Cloud Correlate Alerts v2
  • PAN-OS - Block Destination Service on Firewall
  • Expanse Load-Create List
  • Expanse Attribution
  • Expanse VM Enrich
  • Expanse Unmanaged Cloud

Integrations#

ExpanseV2

Scripts#

  • CopyNotesToIncident
  • ExpansePrintSuggestions
  • ExpanseRefreshIssueAssets
  • AddKeyToList
  • Set
  • SetAndHandleEmpty
  • ToTable

Commands#

  • expanse-assign-tags-to-asset
  • expanse-get-issue-comments
  • expanse-update-issue
  • closeInvestigation
  • setIncident
  • panorama-show-device-version
  • linkIncidents
  • createNewIncident
  • getList
  • send-mail
  • expanse-create-tag

Playbook Inputs#


NameDescriptionDefault ValueRequired
MinPriorityForAutoRemediationMinimum Incident Priority for Auto Remediation:
1 - Low
2 - Medium
3 - High
4 - Critical
5 - Disable AutoRemediation
5Optional
FirewallTagListNameName of Cortex XSOAR list that contains the mapping between Expanse tags and XSOAR PANOS instances.ExpanseTagsToPANOSDeviceGroupOptional
TagPrefixPrefix for Cortex XSOAR related Expanse tags.xsoar-Optional
LogForwardingPAN-OS Log Forwarding Profile Name.Optional
AutoCommitPanorama Auto Commit:
True - enable AutoCommit
False - disable AutoCommit
FalseOptional
IPRangeLowConfidenceTagListComma-separated list of tags to be used to identify IP ranges attributed with low confidencelow confidenceOptional
InvalidTagTag to be used for Expanse assets that do not belong to org. (Set when the analyst selects invalid in the OU data collection.)xsoar-invalidOptional
WriteToExpanseWrite data back to Expanse?TrueOptional
OwnerNotificationSubjectSubject of the email to send to the OU Owner.New security issue on a public service owned by your teamOptional
OwnerNotificationBodyBody of the email to send to the OU Owner.Infosec identified a security issue on a service owned by your team and exposed on the internet. Get in touch with your Infosec team to define proper remediation access.Optional
ShadowITIncidentTypeIf set, specifies the type of incident that gets automatically created during the Shadow IT flow. If not set, the incident is to be created manually.Shadow ITOptional
OrganizationUnitsToOwnerNameName of the Cortex XSOAR list that contains the mapping between OU and owners.ExpanseOrganizationUnitsToOwnerOptional
OrganizationUnitsToTagNameName of the Cortex XSOAR list that contains the mapping between OU and tag names,ExpanseOrganizationUnitsToTagOptional
NumberOfDaysInThePastThe number of days to go back in time when searching logs.7Optional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Handle Expanse Incident