Skip to main content

Cloud Data Exfiltration Response

This Playbook is part of the Cloud Incident Response Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.8.0 and later.

Cloud Data Exfiltration Response#

The Cloud Data Exfiltration Response playbook is designed to address data exfiltration activity alerts in the cloud environment. This playbook is intended for handling "An identity performed a suspicious download of multiple cloud storage object" alert. The playbook supports AWS, GCP, and Azure and executes the following:

  • Enrichment involved assets.
  • Determines the appropriate verdict based on the data collected from the enrichment.
  • Cloud Persistence Threat Hunting:
    • Conducts threat hunting activities to identify any cloud persistence techniques
  • Verdict Handling:
    • Handles false positives identified during the investigation
    • Handles true positives by initiating appropriate response actions

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • Cloud Response - Generic
  • Cloud Threat Hunting - Persistence
  • Cloud User Investigation - Generic
  • Handle False Positive Alerts

Integrations#

This playbook does not use any integrations.

Scripts#

  • SearchAlertsV2

Commands#

  • core-get-IP-analytics-prevalence
  • core-get-cloud-original-alerts
  • ip
  • closeInvestigation

Playbook Inputs#


NameDescriptionDefault ValueRequired
autoUserRemediationWhether to execute the user remediation automatically. (Default: False)FalseOptional
autoBlockIndicatorsWhether to execute the block remediation automatically. (Default: False)FalseOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Cloud Data Exfiltration Response