Cloud Threat Hunting - Persistence
Cloud Incident Response Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.8.0 and later.
#
Cloud Threat Hunting - Persistence PlaybookThe playbook is responsible for hunting persistence activity in the cloud. It supports AWS, GCP, and Azure - one at a time.
#
Hunting QueriesThe playbook executes hunting queries for each provider related to each of the following:
- IAM
- Compute Resources
- Compute Functions
#
Indicator ExtractionIf relevant events are found during the search, indicators will be extracted using the ExtractIndicators-CloudLogging
script.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsThis playbook does not use any integrations.
#
Scripts- IsIntegrationAvailable
- Set
- ExtractIndicators-CloudLogging
#
Commands- gcp-logging-log-entries-list
- aws-cloudtrail-lookup-events
- azure-log-analytics-execute-query
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
cloudProvider | The cloud service provider involved. The supported CSPs are AWS, Azure and GCP. | Optional | |
AWSAccessKeyID | The AWS access key ID. | Optional | |
username | The username that initiated the API call. | Optional | |
region | The region to search for events in. e.g. us-east-1, us-west-2, etc. | Optional | |
AzureTimespan | The timespan to limit by the hunting query. e.g., Use 2d for timespan of 2 days Use 1.5h for timespan of 1.5 hour Use 30m for timespan of 30 minutes | Optional | |
AWSTimespan | Date and time in the following format - yyyy-mm-ddThh:mm:ss e.g., 2022-05-29T12:00:00 2021-01-01T12:00:00 | Optional | |
GCPTimespan | Date in ISO. e.g. 2022-05-29T12:00:00.123Z 2021-01-01T12:00:00.234Z | Optional | |
GCPProjectName | The GCP project name. | Optional |
#
Playbook OutputsPath | Description | Type |
---|---|---|
CloudIndicators.arn | The ARN. | unknown |
CloudIndicators.access_key_id | The AWS access key ID. | unknown |
CloudIndicators.resource_name | The resource name. | unknown |
CloudIndicators.source_ip | The source IP. | unknown |
CloudIndicators.username | The username used by the attacker. | unknown |
CloudIndicators.event_name | The name of the event. | unknown |
CloudIndicators.user_agent | The user agent used by the attacker. | unknown |