Please enable JavaScript.
Coggle requires JavaScript to display documents.
SOC - TOOLS - Coggle Diagram
SOC - TOOLS
SPLUNK :explode:
-
Investigate alerts to determine whether they are true positives, false positives, or false negatives.
- Triage and Investigate Security Alerts
▪ Cross-correlate logs from multiple sources (e.g., firewalls, intrusion detection systems, endpoint security logs) to gather evidence for each alert.
▪ Use Drill-down capabilities in Splunk to dive deeper into specific events (e.g., drilling down into specific login attempts or firewall rule changes).
▪ False Positive Management: If an alert is determined to be a false positive, document and update correlation rules to minimize noise in the future.
-
-
-
-
-
Create reports on security metrics, trends, and incidents for management and stakeholders
- Generate Security Reports and Metrics
▪ Produce reports on key performance indicators (KPIs) like MTTR (Mean Time to Respond), MTTD (Mean Time to Detect), and number of false positives.
▪ Create compliance reports based on regulatory frameworks (e.g., PCI DSS, HIPAA) to show adherence to security policies.
▪ Generate daily/weekly reports summarizing security incidents, alerts, and response efforts.
Fine-tune detection rules, correlation searches, and alert thresholds to reduce noise and improve accuracy
- Tune and Maintain Detection Rules
-
-
-
▪ Regularly review and update existing correlation searches and alert thresholds to improve detection capabilities.
Leverage threat intelligence feeds within Splunk ES to enrich event data and improve detection capabilities
- Integration with Threat Intelligence
▪ Create searches that correlate internal events with known bad IPs, domains, or file hashes from threat feeds.
▪ Update threat intelligence sources regularly to ensure that you are using up-to-date information for correlation.
▪ Integrate external threat feeds (e.g., VirusTotal, Recorded Future, or open-source feeds) to enrich Splunk data.
Work closely with other teams (IT, network, endpoint security) to investigate and respond to incidents
- Collaborate with Incident Response Teams
▪ Use Splunk’s Adaptive Response Actions to trigger actions like quarantining devices, disabling accounts, or blocking IPs automatically.
▪ Participate in post-incident reviews to identify improvements in detection and response workflows.
▪ Share investigation details and findings from Splunk with other teams to facilitate response efforts.
Stay updated with the latest security threats, Splunk updates, and best practices.
- Continuous Learning and Adaptation
▪ Follow security news and threat intelligence reports to adapt your security monitoring efforts accordingly.
▪ Use Splunk’s built-in Security Content Exchange to apply new searches, dashboards, and alert rules designed for emerging threats.
▪ Regularly attend training sessions on Splunk updates, new features, and threat detection techniques.
-
-
-
-
-
-
-
-
-