{"id":107650,"date":"2020-03-13T06:00:49","date_gmt":"2020-03-13T13:00:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=107650"},"modified":"2020-07-31T10:35:23","modified_gmt":"2020-07-31T17:35:23","slug":"cloud-threat-intelligence-bot","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/03\/cloud-threat-intelligence-bot\/","title":{"rendered":"The Art of Automation: Creating Threat Intelligence Bots in the Cloud"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Scaling assets and applications in the cloud creates a degree of complexity that often leads to misconfigurations and vulnerabilities. With this increased complexity, other process issues begin to surface, such the need for a collaborative space to share threat intelligence information and lessons learned, or an audit trail of actions taken during the investigation.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Automations are often created by both team members and product vendors to alleviate some of these issues. I\u2019ve worked with exceptional analysts and engineers who have successful processes and techniques powered by custom-built scripts and applications to make their lives easier. For instance, a security analyst may create Python scripts to format and transform data to more easily comprehensible information. However, custom tools are often difficult to leverage at scale due to limited compute and\/or inability to access and launch cloud functions. Additionally, custom tools often lack a friendly user interface.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By taking these automations and combining them with modern chat interfaces and existing tools, we can combat these issues. For example, creating a Slack bot can assist by inviting users to a collaborative space and sharing relevant information about an alert or incident.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this post, I'll explore how to scale automation efforts with a focus on threat intelligence, leveraging <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/02\/cortex-xsoar\/\">Cortex&#x2122; XSOAR<\/a> to ingest alerts from security controls and to automate reports for analysts. Additionally, I\u2019ll show how Slack can be used as a collaborative space that automatically invites team members and provides alert context.<\/span><\/p>\n<figure id=\"attachment_107664\" aria-describedby=\"caption-attachment-107664\" style=\"width: 1215px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"1215\"><span class=\"ar-custom\" style=\"padding-bottom:27%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-107664 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/legacy1.png\" alt=\"This graphic compares legacy infrastructure and modern cloud infrastructure. The lefthand side of the graphic covers the evolution of security architecture, and the righthand side covers ChatOps. \" width=\"1215\" height=\"328\" \/><\/span><\/div><figcaption id=\"caption-attachment-107664\" class=\"wp-caption-text\">Fig1: Comparison of legacy infrastructure and modern cloud infrastructure.<\/figcaption><\/figure>\n<h2><strong>Automated Bots<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The image below describes common goals and use cases where an automated bot can assist. Each of these use cases requires different contextual information for responding to the event types. For example, email headers, email subject and email body are artifacts that can expose threats to users. Additionally, analysts often leverage threat intelligence data sources to determine if the threat has been previously identified.<\/span><\/p>\n<figure id=\"attachment_107677\" aria-describedby=\"caption-attachment-107677\" style=\"width: 541px\" class=\"wp-caption alignright\"><div style=\"max-width:100%\" data-width=\"541\"><span class=\"ar-custom\" style=\"padding-bottom:56.19%;\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-107677 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/image5.png\" alt=\"Case Study: Threat Intelligence. This graphic illustrates goals and use cases where a cloud threat intelligence bot can assist. Goals: Keep pace with rapidly scaling cloud environment, automatate everything that humans don't need to do, provide value to other technology departments. Use cases: EC2 and account compromise, phishing enrichment and response, cryptocurrency mining\" width=\"541\" height=\"304\" \/><\/span><\/div><figcaption id=\"caption-attachment-107677\" class=\"wp-caption-text\">Fig 2: Use cases where a Cloud Threat Intel Bot can assist<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Threat intelligence data is contextual information that may provide details about the <\/span><b>who, what, when and where<\/b><span style=\"font-weight: 400;\"> of an attack. Using this data could assist with making informed decisions when answering security questions and responding to events.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Threat intelligence doesn\u2019t guarantee success when responding to these events, but it can serve as a great data source for analysts and engineers. There are also information sharing groups called Information Sharing and Analysis Centers (ISACs) that your organization may be eligible to join. These groups can serve as a great source when retrieving context about an attack or event seen by companies in the same industry.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, leveraging threat intelligence and coupling it with alert data comes with challenges. More specifically, few case-management platforms support storing data gathered from alerts and threat intelligence. This creates challenges pivoting from data point to data point and coupling it with alerts from our data sources. By documenting analyst tradecraft, playbooks can be created that facilitate the delivery of threat intelligence to analysts. Delivering this information in a common workspace such as Slack enables organizations to enrich data on demand while displaying a log of analyst actions and chats.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Creating a Threat Intelligence Bot<\/strong><\/h2>\n<figure id=\"attachment_107690\" aria-describedby=\"caption-attachment-107690\" style=\"width: 548px\" class=\"wp-caption alignright\"><div style=\"max-width:100%\" data-width=\"548\"><span class=\"ar-custom\" style=\"padding-bottom:139.96%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-107690 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/image4.png\" alt=\"\" width=\"548\" height=\"767\" \/><\/span><\/div><figcaption id=\"caption-attachment-107690\" class=\"wp-caption-text\">Fig 3: How a Cortex XSOAR playbook powers bot logic<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">For the following examples, Cortex XSOAR will be leveraged to ingest alerts from cloud applications and threat intelligence sources and orchestrate bot logic via a playbook.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As alerts are generated and threat context is provided, opportunities begin to emerge for rapid response and remediation. The delivery of alert data and threat intelligence context is facilitated by the Cortex XSOAR playbook and sent to a collaborative workspace or war room, such as Slack. An organization could also use other chat services such as Microsoft Teams or Discord.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As an example, phishing campaigns send mass emails to as many users as possible. This threat may be reported by several users or applications. As duplicate or related events are seen by Cortex XSOAR, our threat intelligence bot can provide correlated event information and the option to block malicious indicators on demand. For more sensitive events such as malware outbreaks, analysts may want to enrich threat data with specific threat intelligence sources to avoid tipping the attacker that an investigation is ongoing. The playbook then controls our threat intelligence bot logic and selectively enriches threat data based on an analyst response.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another common threat that cloud applications are exposed to is cryptocurrency mining. When this threat emerges, response strategies need to be implemented immediately. This often includes blocking malicious IP addresses and reprovisioning cloud applications. To avoid analyst burnout and error, simple tasks can be performed via our threat intelligence bot. For example, the playbook in figure 3 contains an optional path for blocking IP addresses at the firewall.<\/span><\/p>\n<figure id=\"attachment_107703\" aria-describedby=\"caption-attachment-107703\" style=\"width: 824px\" class=\"wp-caption alignleft\"><div style=\"max-width:100%\" data-width=\"824\"><span class=\"ar-custom\" style=\"padding-bottom:28.28%;\"><img loading=\"lazy\" decoding=\"async\"  class=\" wp-image-107703 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/ThreatIntel1.png\" alt=\"This screenshot shows examples of how a threat intelligence bot would appear when providing threat intelligence. \" width=\"824\" height=\"233\" \/><\/span><\/div><figcaption id=\"caption-attachment-107703\" class=\"wp-caption-text\">Fig 4: Threat intel provided by a bot<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Depending on the context of the alert and threat intelligence supplied, specific analysts and engineers are required to collaboratively respond to events. As mentioned, automation often assists with this investigation phase. Additional logic can be implemented in our playbook to invite users on demand and restrict access to a Slack channel when sensitive information is contained within an investigation.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>When to Use a Threat Intelligence Bot<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">In summary, as organizations migrate and onboard services and applications to the cloud, managing and responding to alerts can become increasingly difficult. Automation can assist with responding and mitigating security events generated from applications and users. Leveraging chat services such as Slack can assist with creating an interface for automation tools that were previously difficult to interact with, while providing an audit trail of events that transpire during an investigation. Pairing automation and Cortex XSOAR can enable organizations to create an interactive war room that assists analysts during each phase of their investigation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Go more in-depth on threat intelligence bots \u2013 check out <\/span><a href=\"https:\/\/wcc.on24.com\/webcast\/previewlobby?e=2182571&amp;k=60B4FD1E638B386D2A85CE1914AACCAF\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Ron\u2019s on-demand session<\/span>, \"Creating Threat Intel Bots in the Cloud,\"<\/a><span style=\"font-weight: 400;\">\u00a0from our recent Cloud Native Security Summit. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to use threat intelligence bots to create a collaborative space to share information and lessons learned and create an audit trail.<\/p>\n","protected":false},"author":663,"featured_media":107651,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768,6770],"tags":[7009,161,1166,7025,922],"coauthors":[7042],"class_list":["post-107650","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","category-secure-the-future","tag-30-days-of-cloud","tag-automation","tag-cloud-security","tag-cortex-xsoar","tag-threat-intelligence"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/30-days-of-cloud_network-security-1200x675-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/107650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=107650"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/107650\/revisions"}],"predecessor-version":[{"id":107719,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/107650\/revisions\/107719"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/107651"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=107650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=107650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=107650"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=107650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}