Containment of security threats within a computing environment

    公开(公告)号:US11165812B2

    公开(公告)日:2021-11-02

    申请号:US14675176

    申请日:2015-03-31

    申请人: SPLUNK INC.

    摘要: Systems, methods, and software described herein provide for identifying and implementing security actions within a computing environment. In one example, a method of operating an advisement system to provide security actions in a computing environment includes identifying communication interactions between a plurality of computing assets and, after identifying the communication interactions, identifying a security incident in a first computing asset. The method further provides identifying at least one related computing asset to the first asset based on the communication interactions, and determining the security actions to be taken in the first computing asset and the related computing asset.

    Anonymizing action implementation data obtained from incident analysis systems

    公开(公告)号:US11133977B2

    公开(公告)日:2021-09-28

    申请号:US16926907

    申请日:2020-07-13

    申请人: Splunk Inc.

    IPC分类号: H04L12/24 H04L29/06

    摘要: Described herein are systems, methods, and software to enhance the management of responses to incidents. In one example, a method of improving incident response comprises identifying an incident in an information technology (IT) environment associated with a first entity of a plurality of entities, and identifying action implementation information related to the incident. The method further anonymizes the action implementation information for the incident, and determines action suggestions based at least on the anonymized action implementation information.

    GENERATING ACTION RECOMMENDATIONS FOR COURSES OF ACTION USED FOR INCIDENT RESPONSE

    公开(公告)号:US20210281602A1

    公开(公告)日:2021-09-09

    申请号:US17327098

    申请日:2021-05-21

    申请人: Splunk Inc.

    IPC分类号: H04L29/06 H04L9/00 G06F21/55

    摘要: Described herein are systems and methods for enhancing an interface for an information technology (IT) environment. In one implementation, an incident service causes display of a first version of a course of action and obtains input indicative of a request for a new action in the course of action. The incident service further determines suggested actions based at least one the input and causes display of the suggested actions. Once displayed, the incident service obtains input indicative of a selection of at least one action from the suggested actions, and causes display input indicative of a selection of at least one action from the suggested actions.

    Graphical interface for incident response automation

    公开(公告)号:US11019093B2

    公开(公告)日:2021-05-25

    申请号:US16539918

    申请日:2019-08-13

    申请人: Splunk Inc.

    摘要: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    MODIFYING INCIDENT RESPONSE TIME PERIODS BASED ON CONTAINMENT ACTION EFFECTIVENESS

    公开(公告)号:US20200213348A1

    公开(公告)日:2020-07-02

    申请号:US16699299

    申请日:2019-11-29

    申请人: Splunk Inc.

    IPC分类号: H04L29/06 G06F16/28 G06F21/55

    摘要: Systems, methods, and software described herein provide for managing service level agreements (SLAs) for security incidents in a computing environment. In one example, an advisement system identifies a rule set for a security incident based on enrichment information obtained for the security incident, wherein the rule set is associated with action recommendations to be taken against the incident. The advisement system further identifies a default SLA for the security incident based on the rule set, and obtains environmental characteristics related to the security incident. Based on the environmental characteristics, the advisement system determines a modified SLA for the security incident.

    Determining security actions for security threats using enrichment information

    公开(公告)号:US10567424B2

    公开(公告)日:2020-02-18

    申请号:US16107979

    申请日:2018-08-21

    申请人: Splunk Inc.

    摘要: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    SELECTING ACTIONS RESPONSIVE TO COMPUTING ENVIRONMENT INCIDENTS BASED ON ACTION IMPACT INFORMATION

    公开(公告)号:US20200007574A1

    公开(公告)日:2020-01-02

    申请号:US16568949

    申请日:2019-09-12

    申请人: Splunk Inc.

    IPC分类号: H04L29/06 G06F21/55 G06F16/28

    摘要: Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of operating an advisement system to provide actions in a computing environment includes identifying a security incident in the computing environment, identifying a criticality rating for the asset, and obtaining enrichment information for the security incident from one or more internal or external sources. The method also provides identifying a severity rating for the security incident based on the enrichment information, and determining one or more security actions based on the enrichment information. The method further includes identifying effects of the one or more security actions on operations of the computing environment based on the criticality rating and the severity rating, and identifying a subset of the one or more security actions to respond to the security incident based on the effects.