Skip to main content

Cloud Threat Hunting - Persistence

This Playbook is part of the Cloud Incident Response Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.8.0 and later.

Cloud Threat Hunting - Persistence Playbook#

The playbook is responsible for hunting persistence activity in the cloud. It supports AWS, GCP, and Azure - one at a time.

Hunting Queries#

The playbook executes hunting queries for each provider related to each of the following:

  1. IAM
  2. Compute Resources
  3. Compute Functions

Indicator Extraction#

If relevant events are found during the search, indicators will be extracted using the ExtractIndicators-CloudLogging script.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

This playbook does not use any integrations.

Scripts#

  • IsIntegrationAvailable
  • Set
  • ExtractIndicators-CloudLogging

Commands#

  • gcp-logging-log-entries-list
  • aws-cloudtrail-lookup-events
  • azure-log-analytics-execute-query

Playbook Inputs#


NameDescriptionDefault ValueRequired
cloudProviderThe cloud service provider involved.
The supported CSPs are AWS, Azure and GCP.
Optional
AWSAccessKeyIDThe AWS access key ID.Optional
usernameThe username that initiated the API call.Optional
regionThe region to search for events in.
e.g. us-east-1, us-west-2, etc.
Optional
AzureTimespanThe timespan to limit by the hunting query.
e.g.,
Use 2d for timespan of 2 days
Use 1.5h for timespan of 1.5 hour
Use 30m for timespan of 30 minutes
Optional
AWSTimespanDate and time in the following format - yyyy-mm-ddThh:mm:ss
e.g.,
2022-05-29T12:00:00
2021-01-01T12:00:00
Optional
GCPTimespanDate in ISO.
e.g.
2022-05-29T12:00:00.123Z
2021-01-01T12:00:00.234Z
Optional
GCPProjectNameThe GCP project name.Optional

Playbook Outputs#


PathDescriptionType
CloudIndicators.arnThe ARN.unknown
CloudIndicators.access_key_idThe AWS access key ID.unknown
CloudIndicators.resource_nameThe resource name.unknown
CloudIndicators.source_ipThe source IP.unknown
CloudIndicators.usernameThe username used by the attacker.unknown
CloudIndicators.event_nameThe name of the event.unknown
CloudIndicators.user_agentThe user agent used by the attacker.unknown

Playbook Image#


Cloud Threat Hunting - Persistence