Automating a findings response
Google provides procedures for the following four types of SOAR products for exporting SCC alerts and findings:
- Palo Alto Cortex XSOAR
- Elastic Stack
- Splunk
- IBM QRadar
However, you can set up an integration using Pub/Sub to any other product if it can ingest and parse the Pub/Sub message.
Figure 14.2 – Automating SCC response
Figure 14.2 shows an architecture of a simple workflow to automate a response based on SCC alerts and findings. The steps in the workflow are listed as follows. Each of these steps represents an action that can be taken either manually or automated. Understanding the various categories of threats and vulnerability findings is critical before building such a workflow.
Let us quickly run through these steps:
- SCC alerts and findings are exported to the SIEM tool of your choice. As you saw in the previous section, you can export alerts and findings using continuous...