Skip to main content

Cloud SOAR Automation

The Automation section contains configuration tools for Cloud SOAR's automation and orchestration features.

Classic UI. To access Automation, click the gear icon Settings menu icon in the top right and select Automation.

New UI. To access Automation, in the main Sumo Logic menu select Automation.

Because Cloud SOAR provides automation functionality to the Automation Service, many features are identical between Cloud SOAR and the Automation Service. Therefore, for information about the following Cloud SOAR features, see the Automation Service articles:

The following sections describe automation features only used in Cloud SOAR.

Incident templates​

Incident templates define the way in which incidents will be created for a specific alert, incident type or event. They allow you to define a certain number of incident attributes (for example, incident type, severity, assignment, and any other default or custom incident parameters) that will automatically be set each time an incident is generated, based on the template. This may include type, classification, incident assignment, playbooks, knowledge base articles, or any other incident attribute. Since rules are created for generating incidents based on syslog messages, email, SIEM integrations, or other data sources, it is the incident templates that will define how the initial incident will be created.

Create a new incident template​

  1. Classic UI. Click the gear icon Settings menu icon in the top right, select Automation, and then select Incident templates in the left nav bar.
    New UI. In the main Sumo Logic menu select Automation > Template. You can also click the Go To... menu at the top of the screen and select Template.
  2. Click + to the left of Template.
    Add template
  3. Define the template:
    Create incident template dialog
    1. Template name. Enter a name that is easily identifiable and related to the activity it is developed for.
    2. Category. Enter a category for this template. For example, suppose we're building a template for a DLP incident. We might enter a category named Data Theft, but we can enter anything we want that will help us group incident templates in the future. You can customize this field to fit your environment, as well as all other fields in Cloud SOAR (see Custom fields).
    3. Tags. Enter any tags to further categorize or define the incident. You can use these tags later when searching for or correlating events.
  4. Click Incident at the top of the dialog.
  5. Define any incident parameters you want to set by default when an incident is creating using the template:
    Create incident template dialog to define the incident type
  6. Click Apply. The new template is displayed.
    New template
  7. Scroll down and enter the following:
    1. Incident details. Click the Edit toggle to set up details for a specific incident type.
    2. Description. Describe details of the template.
    3. Playbook. Select the playbooks that should be automatically assigned to an incident. For each playbook, you can choose to have the playbook automatically execute immediately upon incident creation, or assigned and wait for manual execution.
    4. Investigators. Select the investigators who should be automatically assigned to the incident.
    5. Notes. Enter notes which should be created for the incident.
    6. Mapping. Select the daemon field mapping for the template.

Configure a webhook for Cloud SOAR​

You can configure a webhook connection to allow you to send an alert from a scheduled search to Sumo Logic Cloud SOAR using an incident template.

  1. Classic UI. In the main Sumo Logic menu, select Manage Data > Monitoring > Connections.
    New UI. In the top menu select Configuration, and then under Monitoring select Connections. You can also click the Go To... menu at the top of the screen and select Connections.

  2. Click + and choose Cloud SOAR as the connection type. The Create Cloud SOAR Connection dialog is displayed.
    New connection

  3. Enter a Name and give an optional Description to the connection.

  4. The URL field shows your Sumo Logic API endpoint followed by /csoar/v3/incidents/. For example, https://api.us2.sumologic.com/api/csoar/v3/incidents/

  5. In Authorization Header, enter your basic authentication access information for the header. For example, Basic <base64 encode <accessId>:<accessKey>>. For more information, see Basic Access (Base64 encoded).

  6. Click Save. After save, the Templates dropdown shows a list of all incident templates by name configured in your Cloud SOAR environment.

  7. Select a Template.

  8. The default payload synchronizes with the selected template, and the Alert Payload field shows the associated template_id field automatically defined in the default payload. A template_id is required in the payload in order to configure the connection:

    {
    "template_id": <Template ID>,
    "fields": {
    "incidentid": "Incident Id"
    }
    }

    You can add additional variables. For example:

    {
    "fields": {
    "description": "string",
    "additional_info": "string",
    "starttime": "ISO-8601 datetime string",
    "incident_kind": <ID incident kind>,
    "incident_category": <ID incident category>,
    "status": <ID incident status>,
    "restriction": <ID incident restriction>
    }
    }
    note
  9. Click Save.

Automation rules​

Cloud SOAR can ingest, parse, and process incident data from email, syslog and bidirectional integrations. For Cloud SOAR to begin processing incident data from these sources, automation rules need to be configured.

Automation rules allow specific data to be parsed from the incoming data sources and then acted upon automatically or through manual actions. You can establish any daemonized integration rules to define what occurs when data is received from each of these sources.

Create an automation rule​

  1. Classic UI. Click the gear icon Settings menu icon in the top right, select Automation, and then select Rules in the left nav bar.
    New UI. In the main Sumo Logic menu select Automation > Rules. You can also click the Go To... menu at the top of the screen and select Rules.
  2. Click + to the left of Rules.
  3. Select a name for the rule, then select the daemon to use with this new rule, the resource, and fill in all the remaining parameters.
    Add automation rule
  4. Click Save. The new rule is displayed.
    Sample automation rule
  5. Add a Filter if desired.
  6. Click + to the left of Actions.
  7. Click Action type.
    Automation rule Action type dropdown menu
  8. Select the action Cloud SOAR will can take when the specified activity is observed:
    • Create incident from template. Specify what incident template to use, the incident owner, and incident ID format. This is the most common action.
    • Update incident. Update a field in an existing incident based on parameters from the parsed message.
    • Close incident. Automatically close a known false positive incident.
    • Add events to an existing incident. Add events based on parameters from the parsed message.
    • Set task progress. Set task progress based on parameters from the parsed message.
    • Close task. Close a task based on parameters from the parsed message.
    • Add to Triage. Create a new triage event based on parameters from the parsed message.
  9. Fill out the rest of the fields for the action.
  10. Click + to the left of Mapping and select the daemon field mapping for the rule.

Configure Slack for Cloud SOAR​

With the Cloud SOAR Slack integration, teams can remain connected, organize conversations, and quickly find what is needed to get the work done.

With the Cloud SOAR Slack integration, you can directly manage user choice actions within the playbooks from your Slack workspace. Furthermore, for each new incident, a related conversation channel will be created within your Slack workspace, where users will correspond to investigators. Changing a user within the incident will also result in a change to the user within the conversation channel.

note

To configure Slack for use inside Cloud SOAR, you must first create a public or private channel so you can send messages or files to channels or users directly.

Step 1: Create a Slack app​

Before you can use the Slack integration in Cloud SOAR, you need to create a Slack app on the user or company workspace.

  1. Navigate to the Slack API page.
  2. Click Create an App.
    Create a Slack app
  3. Select From scratch.
    Create a Slack app from scratch
  4. Enter "CSOAR Bot" as the app name and select the workspace where you wish to install it.
    Insert name and workspace for Slack app
  5. Click Create App.

Step 2: Add permissions to the Slack app​

After you create a Slack app, you must add the appropriate permissions for use with Cloud SOAR.

  1. Click Permissions, or from the left nav bar, click OAuth & Permissions.
    Slack OAuth and Permissions
  2. Scroll down to the Scopes section.
    You must add permissions for the Bot Token. Bot tokens let your app act independently.
  3. Click Add an OAuth Scope under Bot Token Scopes.
    Add an OAuth Scope in Slack
  4. Enter the following permissions.
    • Actions: List Channels / Get Channel / Get Members
      • channels:read. View basic information about public channels in a workspace.
      • groups:read. View basic information about private channels that your Slack app has been added to.
      • im:read. View basic information about direct messages that your Slack app has been added to.
      • mpim:read. View basic information about group direct messages that your Slack app has been added to.
    • Actions: Create channel / Invite To Channel / Remove User From Channel / Archive Channel
      • channels:manage. Manage public channels that your Slack app has been added to and create new ones.
      • channels:write.invites. Invite members to public channels.
      • groups:write. Manage private channels that your Slack app has been added to and create new ones.
      • groups:write.invites. Invite members to private channels.
      • im:write. Start direct messages with people.
      • mpim:write. Start group direct messages with people.
      • mpim:write.invites. Invite members to group direct messages.
    • Actions: List Users / Get User
      • users:read. View people in a workspace.
      • users:read.email. View email addresses of people in a workspace.
    • Actions: List Conversations History
      • channels:history. View messages and other content in public channels that your Slack app has been added to.
      • groups:history. View messages and other content in private channels that your Slack app has been added to.
      • im:history. View messages and other content in direct messages that your Slack app has been added to.
      • mpim:history. View messages and other content in group direct messages that your Slack app has been added to.
    • Actions: Send Message / Delete Message
      • chat:write. Post messages in approved channels and conversations.
  5. Verify that scopes are set up correctly:
    • Here are the Bot Token scopes after configuration:
      Bot token 1
  6. Place your instance URL in the Interactivity & Shortcuts page.
    Interactivity
  7. Click Install to Workspace to make the app available for use.
    Install the app
  8. Installation generates a Bot User OAuth Token and a Signing Secret. Copy the tokens and keep them in a secure location for use in the next step.
    Bot Oauth token
    Signing Secret

Step 3: Configure the Slack integration in Cloud SOAR​

Now you must configure the Slack integration in Cloud SOAR to use the Bot OAuth Token and Signing Secret you saved in the previous step. These tokens will give the Slack integration the permissions it needs to perform the tasks in the scopes you set up.

  1. Add resources for the tokens:

    1. Classic UI. Click the gear icon Settings menu icon in the top right, select Automation, and then select Integrations in the left nav bar.
      New UI. In the main Sumo Logic menu select Automation > Integrations. You can also click the Go To... menu at the top of the screen and select Integrations.
    2. Select the Slack integration. The integration's resources appear.
      Select the Slack integration
    3. Click + to add a new Resource.
      Add a resource
    4. Name the resource "Bot User OAuth Access Token".
    5. Copy the Bot Oauth Token you saved from the Slack API setup and paste it Into the Bot/User OAuth Token field.
    6. Click TEST to verify configuration.
    7. Once you have filled in all the required fields, click SAVE.
      Bot resource
  2. Configure instant messaging:

    1. Classic UI. Click the gear icon Settings menu icon in the top right and select Settings.
      New UI. In the top menu select Administration, and then under Cloud SOAR Settings select General Settings. You can also click the Go To... menu at the top of the screen and select General.
    2. Scroll down and open Instant Messaging.
      Instant Messaging configuration dialog
    3. For Integration select Slack.
    4. Paste your previously saved Bot User OAuth Access Token to the Bot OAuth field.
    5. Paste your previously saved Signing Secret to the Signing Secret for verify requests field. If configuration is successful, Workspace displays "Success".

    If your new resources are configured correctly, and Instant Messaging displays a "Success" message for the configured workspace, you can Use the Slack app in User Choice.

Use the Slack app in User Choice​

If you have configured Slack as described in Configure Slack for Cloud SOAR, you can set a playbook’s user choice to be answered by Slack.

  1. Run a playbook with a User Choice action. The following example shows a simple playbook with two available answers: Close Incident and Investigate. Notice that the option Answer By Slack is enabled.
    Playbook with user choices
    In this case, the Authorizer set is just a user. If a group is chosen, a message will be sent directly from the CSOAR Bot to every available user. If a user is not selected, and the playbook is inside an incident, the message will be sent within the relevant channel in the Slack workspace, and all the users within it will be authorized to choose one of the User Choice available options.
  2. When the playbook flow reaches the User Choice, the user will receive a message containing the reference to the incident, the playbook name, and the question set for the User Choice.
    Slack user choice message
  3. After a recipient chooses one of the available options, the playbook flow will continue and a message will inform the user or the group about the choice made.
    Selected user choice

Bidirectional use cases between Slack and incident management​

You can manage Slack communication channels directly by creating/editing various incidents within Cloud SOAR. Here are some use cases:

  • Creating an incident
    When an incident is created, a conversation channel will automatically be created within your Slack workspace, where the channel name will be formed like this: incident-incident_id. Furthermore, all users (owners, investigators, groups) who are part of the workspace will be added to the channel.
    Created incident
    Created Slack channel
  • Adding / removing users from the incident
    When users (owners, investigators, groups) are added or removed from the incident, they will be managed in the same way within the channel in the workspace.
  • Close / delete an incident
    When an incident is closed / deleted, the related channel in the workspace will automatically be archived as well.
    Archived Slack channel
  • Viewing channel history from the War room section
    Within the war room section of an incident, it will be possible to view the history of a Slack channel.
    Slack message in the war room
Status
Legal
Privacy Statement
Terms of Use

Copyright Β© 2024 by Sumo Logic, Inc.