Change Management
Change Management Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.1.0 and later.
If you are using PAN-OS/Panorama firewall and Jira or ServiceNow as a ticketing system, this playbook will be a perfect match for your change management for firewall process. This playbook can be triggered by 2 different options - a fetch from ServiceNow or Jira - and will help you manage and automate your change management process.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- ServiceNow Change Management
- Jira Change Management
#
IntegrationsThis playbook does not use any integrations.
#
ScriptsThis playbook does not use any scripts.
#
CommandsThis playbook does not use any commands.
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
TicketSummary | Provide a summary for your firewall change request. | incident.details | Optional |
SecurityTeamEmail | The email of the security team that approves the firewall requests. | Optional | |
log_type | Log type to query. Can be: traffic, threat, wildfire, url or data-filtering. | traffic | Optional |
query | The query string by which to match criteria for the logs. This is similar to the query provided in the web interface under the Monitor tab when viewing the logs. | Optional | |
Query_logs | By providing the value "Yes" to this input, the "Panorama Query Logs" playbook will be activated. | Yes | Optional |
addr-src | The source address for the change request. | incident.sourceips | Optional |
addr-dst | The destination address for the change request. | incident.destinationips | Optional |
port-dst | The destination ports for the change request. | incident.dstports | Optional |
zone-src | The relevant firewall source zone for the change request. | incident.sourcenetworks | Optional |
zone-dst | The relevant firewall destination zone for the change request. | incident.destinationnetworks | Optional |
Action | The action for the change request (such as: allow, drop, deny) | incident.policyactions | Optional |
Protocol | The relevant IP protocol for the change request. | incident.protocol | Optional |
Log_forwarding | Log forwarding profile. | Optional | |
Profile_setting | A profile setting group. | Optional | |
Service | A comma-separated list of service object names for the rule. | incident.protocolnames | Optional |
Application | A comma-separated list of application object names for the rule to create. | Optional | |
Target | Target number of the firewall. Use only for a Panorama instance. | Optional | |
Vsys | Target vsys of the firewall. Use only for a Panorama instance. | Optional | |
Rulename | Name of the rule to create. | Optional | |
Rule_position | Pre rule or Post rule (Panorama instances). Possible options: - post-rulebase - pre-rulebase | Optional | |
Description | Set the description of the ticket. | Optional | |
Time_generated | The time the log was generated from the timestamp and prior to it. For example: "2019/08/11 01:10:44". | Optional | |
TestConfigurations | By providing YES to this input, the requested firewall rule will be tested in your test environment. | Optional | |
TestInstance | The instance name of the firewall in the DEV environment for testing the new rule. | Optional | |
Closing_status_approved | The closing status in Jira is changing in the project templates. Please provide the relevant closing status if the issue was approved. | Optional | |
Closing_status_rejected | The closing status in Jira is changing in the project templates. Please provide the relevant closing status if the issue was rejected. | Optional | |
Limit | Maximum number of API requests that the PanoramaSecurityPolicyMatchWrapper script will send. The default is 500. | Optional |
#
Playbook OutputsThere are no outputs for this playbook.