Skip to main content

Prisma Cloud Remediation - AWS EC2 Instance Misconfiguration v2

This Playbook is part of the Prisma Cloud by Palo Alto Networks Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This playbook remediates Prisma Cloud AWS EC2 alerts. It calls the following sub-playbooks to perform the remediation:

  • AWS Default Security Group Does Not Restrict All Traffic (policy id: 2378dbf4-b104-4bda-9b05-7417affbba3f)
  • AWS Security Group allows all traffic on SSH port (22) (policy id: 617b9138-584b-4e8e-ad15-7fbabafbed1a)
  • AWS Security Groups allow internet traffic from internet to RDP port (3389) (policy id: b82f90ce-ed8b-4b49-970c-2268b0a6c2e5).

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • Prisma Cloud Remediation - AWS Security Groups Allows Internet Traffic To TCP Port
  • Prisma Cloud Remediation - AWS EC2 Security Group Misconfiguration

Integrations#

  • PrismaCloud v2

Scripts#

  • IsIntegrationAvailable

Commands#

  • closeInvestigation
  • prisma-cloud-alert-dismiss

Playbook Inputs#


NameDescriptionDefault ValueRequired
AutoUpdateEC2Update AWS EC2 instance automatically?noOptional
policyIdGet the Prisma Cloud policy ID.incident.labels.policyOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Prisma Cloud Remediation - AWS EC2 Instance Misconfiguration v2