Skip to main content

Incident Response - Infoblox Cloud

This Playbook is part of the Infoblox Threat Defense with DDI Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This playbook is used to initiate the incident response. This playbook runs when an incident is selected for investigation. It will change the state from pending to active and it will list the available indicators, events, assets, and comments from Infoblox corresponding to the incident. If incident severity is found to be higher than or equivalent to medium, it will create a ServiceNow incident otherwise the given incident will be assigned to an analyst.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • Create ServiceNow Ticket

Integrations#

This playbook does not use any integrations.

Scripts#

  • AssignAnalystToIncident
  • SetAndHandleEmpty

Commands#

  • infobloxcloud-soc-insight-asset-list
  • infobloxcloud-soc-insight-comment-list
  • infobloxcloud-soc-insight-event-list
  • infobloxcloud-soc-insight-indicator-list
  • servicenow-update-ticket

Playbook Inputs#


NameDescriptionDefault ValueRequired
soc_insight_idCollect incident severity from incident.incident.infobloxcloudinsightidOptional
incident_severityCollect incident severity from incident.incident.severityOptional
limitNo of indicators, events, assets and comments to fetch for the provided SOC Insight.50Optional
onCallSet to true to assign only the user that is currently on shift. Default is False.falseOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Incident Response - Infoblox Cloud