Clouds and Silver Linings
Mobile and cloud have changed the way organizations work, making it easier to collaborate, manage projects, and develop products at scale. However, this decentralization of computing power has brought with it security challenges. Mobile apps and cloud tools often use APIs to bypass organizational perimeters, which has a profound impact on information integrity and confidentiality. There’s a need to standardize cloud security procedures and interweave them with other security processes to curtail new-age attacks.
Users can now leverage the cloud and DLP security capabilities of Netskope with the security orchestration and automation features of Demisto Enterpise for repeatable and scalable cloud threat response that dovetails with other organizational security measures.
- Ingest Netskope alert data into Demisto to create incidents in Demisto and trigger playbooks tied to those incidents.
- Automate enrichment of alerts as playbook tasks: get associated events and logs with an alert, get indicator reputation, perform file analysis, and so on.
- Leverage 160+ Demisto product integrations to further enrich Netskope alerts and coordinate response across security functions.
- Run 100s of commands (including for Netskope) interactively via a ChatOps interface while collaborating with other analysts and Demisto’s chatbot.
USE CASE #1
Automated enrichment and response to cloud security threats
If cloud security consoles are isolated from other functions such as EDR, malware analysis, and threat intelligence, it becomes time-consuming and repetitive for security analysts to cross-reference alerts from cloud security tools, get further context, and coordinate containment and response. Processes diverge depending on the analyst that handles the incident, and this leads to differing response quality.
Analysts can use the Netskope integration to ingest alert data, create incidents in Demisto, and trigger standard, automated playbooks for that incident. These playbooks can enrich the alert with more details from Netskope as well as coordinate across other products to extract wider context without the need for screen switching and manual repetition.
For example, a playbook could check all the applications and users affected by a Netskope alert by querying Netskope for further data, validate IOC malice using threat intelligence tools, check Active Directory for more user details of the affected parties, and send automated mails to the affected users.
Enrichment playbooks automate a host of actions across products so that analysts have a wealth of information at their fingertips while starting incident investigation. Automating Netskope lookups can save screen switching time, and orchestrating other product actions in the same window can help analysts look across security functions for richer and deeper incident context.
To learn more about our integration, read the solution brief below
USE CASE #2
Interactive, real-time investigation for complex threats
While standardized, repeatable playbooks can automate commonly performed tasks to ease analyst load, an attack investigation usually requires additional tasks such as pivoting from one suspicious indicator to another to gather critical evidence, drawing relations between incidents, and finalizing resolution. Running these commands traps analysts in a screen-switching cycle during investigation and a documentation-chasing cycle after investigations end.
After running enrichment playbooks, analysts then can gain greater visibility and new actionable information about the attack by running Netskope commands in the Demisto War Room. For example, if playbook results throw up an alert and associated details, analysts can get the list of applications exposed by that alert in real-time by running the respective Netskope command. Analysts can also run commands from other security tools in real-time using the War Room, ensuring a single-console view for end-to-end investigation.
The War Room will document all analyst actions and suggest the most effective analysts and command-sets with time.
The War Room allows analysts to quickly pivot and run unique commands relevant to incidents in their network from a common window. All participating analysts will have full task-level visibility of the process and be able to run and document commands from the same window. They will also prevent the need for collating information from multiple sources for documentation.
To learn more about Demisto’s integration with Netskope, you can watch the integration video on our YouTube channel. To explore Demisto in greater detail, you can access the Free Community Edition below.
Stay tuned for more product integration walkthroughs in the coming weeks.