1. Based on scenarios, enhance and strengthen the capabilities of the security system to accelerate the operational process

0 27
Idle Chat:During this period, some automation scenarios have been created using...

Idle Chat:

During this period, some automation scenarios have been created using the SOAR system, and I wanted to sort out and record the distinctive parts, but I didn't know how to categorize them. It seems that the S (Security) - O (Orchestration) - A (Automation) - R (Response) has been used as O-A. It can only be said that the collective wisdom of the masses is boundless, both a deep well and a valley :).

Ps: The following list of tasks can be completely implemented through scripts, and some of them were indeed done through scripts before. The reason for trying to implement them using SOAR is: (Having a hammer, one must use it~~~)

Script vs SOAR

Implementing certain functions solely through scripts, once personnel changes or turnover occur, due to differences in coding style, programming specifications, insufficient documentation, and operating environment, it is not only inconvenient to maintain the original scripts when changing users or transferring work, but also more time is needed to learn, and sometimes even refactoring is required.

If the script is used in a production environment to implement some functions, higher requirements are placed on the quality of script writing. It would be even better if functions and problems can be realized and solved through productization and standardization methods. Currently, the SOAR system can be considered as an option to replace scripts and complete some work, while also conveniently accumulating and inheriting security experience.

1. Currently, SOAR has three types of auxiliary businesses in operation

1. Based on scenarios, enhance and strengthen the capabilities of the security system to accelerate the operational process

1.1 Enhance antivirus system capabilities

Scenario description:Each time a large-scale trojan or virus appears domestically, several fixed departments will have some terminals affected. Sometimes they are reinfected after being disinfected, sometimes the virus cannot be killed, and occasionally there are no detections of infection, with intelligence provided by brothers and security vendors. Looking at the causes, 1) the virus library is updated later than the virus appears; 2) there are cases where the antivirus system is not updated in a timely manner; 3) the antivirus system is lightweightly deployed, and some old viruses are not in the terminal virus library. Note: The types of operating systems within the network, basically what can be thought of, are: (

Current solutions for the above issues: (Dear compatriots, if you have good methods, please share more, thank you!)

Issue 1): The virus can be detected and killed, but it will be reinfected repeatedly.

Solution: Link with firewalls and terminal management systems to limit network access for terminals that have been successfully scanned within the same network segment, with data only going out and not coming in until all the viruses within the network are cleared.

Issue 2)The virus can be detected, but it is not manageable.

Solution: Use terminal management systems and firewalls to isolate the infected terminals at two levels, actively remind manual processing, and restrict network access to the terminals after processing is completed.

Issue 3)The virus has not been detected.

Solution: Link with situational awareness, traffic analysis systems, and other security systems. When other systems issue virus alerts, but the antivirus system does not, remind the security personnel to contact the vendor for antivirus upgrade. At the same time, isolate the affected terminals with terminal management systems and firewalls, and follow the same subsequent processing methods as issues 1) and 2). ·············

In summary: In case of insufficient system capabilities, we compensate with the diversity of devices within the network. 1720774862_6690f0cee8b07b6e4c97b.png!small?1720774864709

Logical diagram: Enhance antivirus capabilities

1719989724_6684f5dc4ff4e559a1312.png!small?1719989724202

Scenario: Enhance antivirus system capabilities

1719989732_6684f5e4c1c012e235189.png!small?1719989732538

Scenario: Enhance antivirus system capabilities through information collection in the same network segment

1719989743_6684f5ef0fb4cf20d1b14.png!small?1719989742509

Scenario: Enhance antivirus system capabilities after review and unblocking


1.2 One-click configuration for the 'Many configuration parameters, prone to errors' function of security devices

Scenario description: When configuring SSL certificate removal on 3 Xian'an Century devices, it is necessary to configure at least 11 parameters from the 'Certificate Decomposition Information Table' collected by the security personnel. This task is not often done, and some parameters may be forgotten to fill in the method during configuration _-_! One-click configuration, a one-time solution.

Solution: After SOAR reads the certificate decomposition parameters from the excel table, it generates 9 commands to run on the specified devices.

1719989791_6684f61f63489f854508c.png!small?1719989790757Logical diagram: One-click configuration for SSL certificate removal  1719989762_6684f6020157bcd3d34e4.png!small

Scenario: One-click configuration for SSL certificate removal

2. Verify the functionality of the security system

(1) Verify system availability: Most of the existing security systems are connected to the log platform, and can actively alert the operation and maintenance personnel when the system is abnormal. However, there are cases where the system status is displayed as normal without any alarms, but the system policy does not take effect.

Ps: In this case, we will only know that the system is abnormal when there is a problem. The troubleshooting process is arduous, and in the end, it is found that the device function is not working, and you can imagine the mood at that time, which everyone understands.

Solution approach:Configure a policy on the devices that have experienced the above problems, according to the effective characteristics of the policy, cooperate with other systems within the network through the SOAR system, and check the existence of the characteristics on a timed basis to judge whether the system function is normal.

For example, the network access system NAC, which analyzes unauthenticated A terminals from the mirror traffic and sends redirection data packets to A to achieve mandatory authentication; when the function fails, the access terminals do not need to be authenticated to access the network. The solution is: regularly simulate the sending of access data packets by terminal A to check whether NAC sends redirection packets to A. If not found, it indicates that NAC is abnormal.

1720774893_6690f0edc979a2c26bbef.png!small?1720774893617

Logic diagram: NAC system availability verification

1719990067_6684f733796a535f7b8bc.png!small?1719990067420Script: NAC system availability verification

Ps: This script is only for explaining the solution to the problem and does not include the function of executing scripts on a timed basis

3. Daily small tasks

Ps: Don't know how to classify, just some things that need to be done from time to time.

(1) Automatically obtain OA-approved DNS applications and record them in the asset system

Scenario description:Timely task monitoring OA, after finding a new DNS application form, synchronize the data to the asset system, and send WeChat Enterprise reminders at the same time. Avoid cumbersome manual asset entry operations.

1720774940_6690f11c1d9b3835f308c.png!small?1720774941109

Logic diagram: Asset entry

1719990110_6684f75e49b53bb11e4b3.png!small?1719990109554

Script: OA approval data acquisition

1719990122_6684f76a91c06bc4f10ad.png!small?1719990122785

Script: OA approval for asset entry

2) Technical support for dynamic password OTP

A. Obtain users who have not configured OTP and send reminders

Scenario description:Timely monitoring, find users who have not configured OTP and failed to log in, remind them proactively, and guide them to solve the problem themselves. If a reminder has already been given, no further reminders will be sent.

1719990147_6684f7834aa561d502d90.png!small?1719990147088

Script: OTP login failure

1719990152_6684f78870e5c1ee8d8a6.png!small?1719990152433

Script: Reminder information for OTP login failure

B. Check users whose dynamic password OTP is about to expire and send messages to remind them proactively

Scenario description:Obtain the users whose OTP is about to expire in the past 1 day, 7 days, 15 days, and 30 days, and send a reminder through WeChat Enterprise to notify them. Avoid the impact on users' use of OTP login after expiration.

1719990231_6684f7d73548b6708ffbd.png!small?1719990231400

Script: Reminder before OTP expiration

(3) Firewall configuration backup

Scenario description: Back up firewall configuration information through command scheduling and notify security personnel of the summary backup results.

1719990249_6684f7e92c6328caa537d.png!small?1719990249332

Script: Firewall configuration backup

Old hat:

A big thank you to all the friends who have persevered to this point. The above are personal opinions, and I welcome everyone to discuss and exchange ideas together :) . If anyone has better scenarios, please feel free to share. Let's work together to make progress!

Currently, it is unknown how far SOAR can run on this unproductive path of O-A. As the understanding of SOAR deepens, there are indeed many scenarios that can be automated in work. Let's summarize these first, and sort out and summarize the follow-up achievements as they come.

Ps: With SOAR, the work before has indeed become easier, but there are more things to arrange scripts. Here's a weak wish, can the colleagues attending the next meeting scatter fewer thoughts about convenience? :(

你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

A brief discussion on the methods of discovering vulnerabilities in business systems from the perspective of management

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Deception defense for advanced threat detectionenhance security orchestration, automation, and response capabilities

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

A brief discussion on how key information infrastructure operators should revise and improve security management systems

Attackers of the SolarWinds Web Help Desk vulnerability can access stored passwords, and a PoC has been released.

最后修改时间:
admin
上一篇 2025年03月25日 07:04
下一篇 2025年03月25日 07:26

评论已关闭