Skip to content

Latest commit

 

History

History
66 lines (47 loc) · 2.93 KB

File metadata and controls

66 lines (47 loc) · 2.93 KB

Understand the Core Concepts

Response Integrations

In Google SecOps, Response Integration consists of Python scripts that are designed to execute third party API and use the information as part of the Security Operation Center workflows.

In the Platform Response Integrations are available under Content Hub → Response Integrations:

response_integrations

Response Integration consists of the following script types:

Action—a Python script that is used to perform a simple activity. These scripts are then used in playbooks to build an automated response. Key use cases are enrichment of Assets and IOCs, performing triaging activities (Update Alert), remediation (Isolate Machines).

Connector—a Python script that runs continuously like a cron job. The main goal of the connector is to ingest Alerts and Events from third party products into Google SecOps.

Note: in Google SecOps you can also ingest data via SIEM Feed + Parser and in general, that’s the preferred method.

Jobs—a Python script that runs continuously, similar to the connector, but the use case for this script is to synchronize information between Google SecOps and third Party Product. For example, if a comment was added to a Google SecOps Alert, to add the same comment to a third Party Alert.

You don’t need to have all script types inside the Response Integration for it to be considered valid. As an example, in our official repository we have Response Integrations that only contain 2–3 actions and nothing else.


Playbooks

Playbooks in Google SecOps are automated workflows that orchestrate and automate the response to security incidents. Playbooks automate repetitive and manual tasks that are part of an incident response process. This can include enriching alerts with threat intelligence, quarantining infected devices, or creating tickets in an IT service management system. They are a series of actions and decisions that are automatically executed when a specific trigger is met, such as a new alert.

Core concepts of Google SecOps Playbooks:

By using playbooks, security teams can standardize their incident response processes, reduce response times, and improve the overall effectiveness of their security operations.

flowchart LR
    T[Trigger] -->|Starts| P[Playbook]
    P -->|Executes| S1[Step 1: Action]
    S1 -->|Result| S2[Step 2: Condition]
    S2 -->|True| S3[Step 3: Action]
    S2 -->|False| S4[Step 4: Action]
Loading