Security Incident Playbook
-
- UpdatedFeb 1, 2024
- 4 minutes to read
- Vancouver
- Security Incident Response
Invoke the security incident playbook flow automatically or manually.
A Playbook is visible only if at least one playbook is associated with a security incident. The playbook component works only for the Process Automation Designer (PAD) built processes and not for the flow designer-built flows. For the existing flow designer enabled flows, it will continue to work, and the activities will be continuing to be rendered as response tasks.
- Automatically invoke playbook
- Manually add playbook
Invoke playbook automatically
For a Playbook to be invoked automatically, a process needs to be defined using Process Automation Designer (PAD), and when the trigger condition is met then automatically the playbook tab is rendered with the playbook activities being displayed.
Add playbook manually
- Within the playbook, the analyst can filter the playbook cards by status.
- The analyst can cancel a playbook by selecting it from the ellipse icon.
- Within each activity, the analyst will be able to perform the actions defined within the activity cards such as Skip, Mark as complete, Cancel, or Orchestration actions such as Submit to sandbox, Search Emails and so on.
- Each of these actions are defined within the activity definition, and the complete card visible is customizable at the time of building the activity definition itself.
- Navigate to .
- In the Playbook Experiences page, select an SIR Playbook Experience.
Figure 1. Playbook Experience The Playbook Experience SIR Playbook Experience page is displayed.Figure 2. Playbook Experience Record - Click on the Configuration record.
- In the Configuration tab, click the SIR Playbook Experience Configuration.
Figure 3. Playbook Configuration - Navigate to the Pending Item Visibility field's drop down list, select the desired option and save the record. Choose from the following options:
- Hide pending activities: Select this option to hide the pending activities that you would like to see on the playbook section of the workspace.
Figure 4. User Reported Phishing Example - Show pending stages and activities: Select this option to show pending stages and activities that you would to like to see on the playbook section of the workspace.
Figure 5. Show pending stages and activities - Hide pending activities and stages: Select this option to hide pending activities and stages,that you would like to see on the playbook section of the workspace.
Figure 6. Hide pending activities and stages
- Hide pending activities: Select this option to hide the pending activities that you would like to see on the playbook section of the workspace.
- On the Playbook section, use the filter option to filter the activities by Playbook card status (activity definition).
Figure 7. Playbook card status
Add Playbook
Use this section to add playbook manually.
Before you begin
Role required: sn_si.analyst
Procedure
Related Content
- Working with Security Incident Records
The Security Incident Record consists of the following.
- Prerequisites for the Playbooks
You need the following roles and plugins to build the Playbooks.
- Rebuilding existing playbooks in Workflow Studio
You can’t convert existing flows directly into playbooks in Workflow Studio. Each flow designer step that creates a response task to guide the analyst must be broken down into separate actions or subflows.
- Activity Definitions
The Now Platform provides a few activity definitions within the base system. In addition, for the playbooks that SIR Workspace base system, there are a few activity definitions defined in the base system under Enterprise Security Case Management PAD Commons application.
- Sample Playbooks for SIR Workspace
You can create or configure playbooks for SIR Workspace quickly and easily without writing complicated code. You can use these playbooks to resolve security threats in a step-by-step manner. You can invoke the security incident playbook flow automatically or manually.
- Working with MSI Records
Using the Security Incident Response workspace, you can propose, promote, or link security incidents as major security incidents when the incidents are identified as critical threat to the organization.
- Working with Form UI actions
Following are the UI actions that are displayed on the security incident form.
- Security Incident Closure workflow
Close the security incident by updating the incident state.