Skip to main content

Cortex ASM - ASM Alert

This Playbook is part of the Cortex Attack Surface Management Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This playbook handles ASM alerts by enriching asset information and providing a means of remediating the issue directly or through contacting service owners.


This playbook uses the following sub-playbooks, integrations, and scripts.


  • Cortex ASM - Remediation
  • Cortex ASM - Remediation Guidance
  • Cortex ASM - Enrichment
  • Cortex ASM - Detect Service


  • ServiceNow v2


  • GenerateASMReport
  • GridFieldSetup
  • GetTime


  • servicenow-create-ticket
  • send-mail
  • closeInvestigation

Playbook Inputs#

NameDescriptionDefault ValueRequired
AutomatedRemediationDecide whether to potentially skip analyst intervention and conduct automated remediation if meeting the criteria specified here:

Default is "False" (don't do automated remediation). Set "True" to turn this feature on.
OwnerNotificationSubjectSubject of the notification (email or ticket) sent to potential service owner.A new security risk was identified on an external service owned by your teamRequired
OwnerNotificationBodyBody of the notification (email or ticket) sent to potential service owner.Infosec identified a security risk on an external service potentially owned by your team: ${}<br><br>
Description: ${alert.details}

RemediationRuleThe firewall rule that will be used for remediating internet exposures.Remediation-Security-GroupRequired

Playbook Outputs#

There are no outputs for this playbook.

Playbook Image#

Cortex ASM - ASM Alert