Dynamic updates of incident status information

    公开(公告)号:US11265206B1

    公开(公告)日:2022-03-01

    申请号:US16051106

    申请日:2018-07-31

    申请人: Splunk Inc.

    发明人: Sourabh Satish

    摘要: Described herein are systems, methods, and software to enhance the management of responses to incidents in an information technology (IT) environment. In one example, a management system identifies an incident in an IT environment, identifies an initial status for the incident for an analyst of the IT environment, and provides the initial status for display to the analyst. The management system further monitors state information for the incident in the IT environment, identifies a second status of the incident based on the monitored state, and provides the second status for display to the analyst.

    Customizable courses of action for responding to incidents in information technology environments

    公开(公告)号:US11182163B1

    公开(公告)日:2021-11-23

    申请号:US16119238

    申请日:2018-08-31

    申请人: Splunk Inc.

    IPC分类号: G06F9/30

    摘要: Examples described herein relate to customization of courses of action for responding to incidents in information technology (IT) environments. An incident management service executes incident response monitoring, identification and remediation across an IT environment for one or more entities that may have their own configuration of computing assets (computing environment) within the IT environment. A course of action outlines remediation actions for responding to specific types of incidents within an IT environment. A course of action is customized for implementation within a particular computing environment associated with an entity. Customization of a course of action comprises generation and implementation of instruction sets that are usable to tailor remedial actions for execution in computing environments of different entities. An instruction set provides commands/calls that are specific to computing assets associated with an entity, which are usable to execute remedial actions for a specific type of incident.

    Learning based security threat containment

    公开(公告)号:US11019092B2

    公开(公告)日:2021-05-25

    申请号:US14677493

    申请日:2015-04-02

    申请人: SPLUNK INC.

    摘要: Systems, methods, and software described herein provide action recommendations to administrators of a computing environment based on effectiveness of previously implemented actions. In one example, an advisement system identifies a security incident for an asset in the computing environment, and obtains enrichment information for the incident. Based on the enrichment information a rule set and associated recommended security actions are identified for the incident. Once the recommended security actions are identified, a subset of the action recommendations are organized based on previous action implementations in the computing environment, and the subset is provided to an administrator for selection.

    SECURELY MANAGING AUTHENTICATION INFORMATION FOR AUTOMATED INCIDENT RESPONSES

    公开(公告)号:US20210081523A1

    公开(公告)日:2021-03-18

    申请号:US17106001

    申请日:2020-11-27

    申请人: Splunk Inc.

    IPC分类号: G06F21/45 G06F21/60 H04L29/06

    摘要: Described herein are improvements for responding to incidents in an information technology (IT) environment. In one example, a method includes, in an incident response system, receiving authentication information for use by a first component for responding to an incident in an information technology (IT) environment. The method further includes encrypting the authentication information and storing the authentication information in the incident response system along with encrypted parameters for operating the first component. In the incident response system, upon determining that the first component requires the authentication information for an interaction, the method provides retrieving the authentication information and providing the authentication information to the first component.

    Translating security actions to action procedures in an advisement system

    公开(公告)号:US10425441B2

    公开(公告)日:2019-09-24

    申请号:US16107975

    申请日:2018-08-21

    申请人: Splunk Inc.

    摘要: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    SECURITY ACTIONS FOR COMPUTING ASSETS BASED ON ENRICHMENT INFORMATION

    公开(公告)号:US20180316718A1

    公开(公告)日:2018-11-01

    申请号:US15924759

    申请日:2018-03-19

    申请人: SPLUNK INC.

    IPC分类号: H04L29/06 G06F17/30 G06F21/55

    摘要: Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of operating an advisement system to provide actions in a computing environment includes identifying a security incident in the computing environment, identifying a criticality rating for the asset, and obtaining enrichment information for the security incident from one or more internal or external sources. The method also provides identifying a severity rating for the security incident based on the enrichment information, and determining one or more security actions based on the enrichment information. The method further includes identifying effects of the one or more security actions on operations of the computing environment based on the criticality rating and the severity rating, and identifying a subset of the one or more security actions to respond to the security incident based on the effects.