Prisma Cloud Remediation - AWS EC2 Instance Misconfiguration v2
Prisma Cloud by Palo Alto Networks Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
This playbook remediates Prisma Cloud AWS EC2 alerts. It calls the following sub-playbooks to perform the remediation:
- AWS Default Security Group Does Not Restrict All Traffic (policy id: 2378dbf4-b104-4bda-9b05-7417affbba3f)
- AWS Security Group allows all traffic on SSH port (22) (policy id: 617b9138-584b-4e8e-ad15-7fbabafbed1a)
- AWS Security Groups allow internet traffic from internet to RDP port (3389) (policy id: b82f90ce-ed8b-4b49-970c-2268b0a6c2e5).
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- Prisma Cloud Remediation - AWS Security Groups Allows Internet Traffic To TCP Port
- Prisma Cloud Remediation - AWS EC2 Security Group Misconfiguration
#
Integrations- PrismaCloud v2
#
Scripts- IsIntegrationAvailable
#
Commands- closeInvestigation
- prisma-cloud-alert-dismiss
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
AutoUpdateEC2 | Update AWS EC2 instance automatically? | no | Optional |
policyId | Get the Prisma Cloud policy ID. | incident.labels.policy | Optional |
#
Playbook OutputsThere are no outputs for this playbook.