Skip to main content

ASM Issue Incident Response - Google Threat Intelligence

This Playbook is part of the GoogleThreatIntelligence Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

This playbook initiates the response for ASM Issues in XSOAR when an incident is investigated. For medium, high, or critical severity, it creates a ServiceNow ticket using the "ServiceNow v2" integration; otherwise, the incident is assigned to an analyst. The ticket is enriched with GTI ASM Issue details, including entity name, status, confidence, tags, UUID, collection info, and other relevant incident information.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • Create ServiceNow Ticket

Integrations#

This playbook does not use any integrations.

Scripts#

  • AssignAnalystToIncident
  • DeleteContext
  • Print
  • SetAndHandleEmpty

Commands#

  • servicenow-update-ticket

Playbook Inputs#


NameDescriptionDefault ValueRequired
issue_uidCollection ASM issue UID from incident.incident.gtiasmissueuidOptional
incident_severityCollect incident severity from incident.incident.severityOptional
onCallSet to true to assign only the user that is currently on shift. Default is False.falseOptional
severity_mappingSet the ASM Issue severity as per GTI platform.incident.severityOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


ASM Issue Incident Response - Google Threat Intelligence