EXECUTING CUSTOM PLAYBOOK CODE IN A HYBRID SECURITY OPERATIONS APPLICATION ENVIRONMENT

    公开(公告)号:US20210344576A1

    公开(公告)日:2021-11-04

    申请号:US17222789

    申请日:2021-04-05

    Applicant: Splunk Inc.

    Abstract: Techniques are described for enabling a cloud-based IT and security operations application to execute playbooks containing custom code in a manner that mitigates types of risk related to the misuse of cloud-based resources and security of user data. Users use a client application to create and modify playbooks and, upon receiving input to save a playbook, the client application determines whether the playbook includes custom code. If the client application determines that the playbook includes custom code, the client application establishes a connection with a proxy application (also referred to as an “automation broker”) running in the user's own on-premises network and sends a representation of the playbook to the proxy application. The client application further sends to the IT and security operations application an identifier of the playbook and an indication that the playbook (or the custom code portions of the playbook) is stored within the user's on-premises network.

    HYBRID EXECUTION OF PLAYBOOKS INCLUDING CUSTOM CODE

    公开(公告)号:US20230027188A1

    公开(公告)日:2023-01-26

    申请号:US17960310

    申请日:2022-10-05

    Applicant: Splunk Inc.

    Abstract: Techniques are described for enabling a cloud-based IT and security operations application to execute playbooks containing custom code in a manner that mitigates types of risk related to the misuse of cloud-based resources and security of user data. Users use a client application to create and modify playbooks and, upon receiving input to save a playbook, the client application determines whether the playbook includes custom code. If the client application determines that the playbook includes custom code, the client application establishes a connection with a proxy application (also referred to as an “automation broker”) running in the user's own on-premises network and sends a representation of the playbook to the proxy application. The client application further sends to the IT and security operations application an identifier of the playbook and an indication that the playbook (or the custom code portions of the playbook) is stored within the user's on-premises network.

    MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON INFORMATION GATHERING ACTIVITY OF A SECURITY THREAT

    公开(公告)号:US20210250373A1

    公开(公告)日:2021-08-12

    申请号:US17242165

    申请日:2021-04-27

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    TRANSLATING SECURITY ACTIONS INTO COMPUTING ASSET-SPECIFIC ACTION PROCEDURES

    公开(公告)号:US20210258340A1

    公开(公告)日:2021-08-19

    申请号:US17306703

    申请日:2021-05-03

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    INCIDENT RESPONSE AUTOMATION ENGINE
    6.
    发明申请

    公开(公告)号:US20190007448A1

    公开(公告)日:2019-01-03

    申请号:US16107972

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

    IDENTIFYING SECURITY ACTIONS FOR RESPONDING TO SECURITY THREATS BASED ON THREAT STATE INFORMATION

    公开(公告)号:US20200287930A1

    公开(公告)日:2020-09-10

    申请号:US16736120

    申请日:2020-01-07

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON COMMUNICATION ACTIVITY OF A SECURITY THREAT

    公开(公告)号:US20190020677A1

    公开(公告)日:2019-01-17

    申请号:US16107979

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.

    INCIDENT RESPONSE AUTOMATION ENGINE
    10.
    发明申请

    公开(公告)号:US20190014144A1

    公开(公告)日:2019-01-10

    申请号:US16107975

    申请日:2018-08-21

    Applicant: Splunk Inc.

    Abstract: Systems, methods, and software described herein enhances how security actions are implemented within a computing environment. In one example, a method of implementing security actions for a computing environment comprising a plurality of computing assets includes identifying a security action in a command language for the computing environment. The method further provides identifying one or more computing assets related to the security action, and obtaining hardware and software characteristics for the one or more computing assets. The method also includes translating the security action in the command language to one or more action procedures based on the hardware and software characteristics, and initiating implementation of the one or more action procedures in the one or more computing assets.

Patent Agency Ranking