Threat Findings User Guide
The information on this page has moved
For the most up to date Threat Findings guidance, go to Threat Findings.
Threat Findings provides access to data visualizations (Trend and Analytics), filtering, saved filters, and a table/list display of Event Sources, Findings Types, and more.
Go to Security > Threat Findings to get started.
Filtering & Searching
Threat Findings has filtering functionality to narrow the scope of the Event Source list. The "Add Filter" button allows you to select a filter/filters that will be applied to the data displayed on the page, including the Trend and Analytics visualizations.
Filter and review threat findings
- Go to Security > Threat Findings.
- On the Threat Findings page, click Add Filter and enter your filter criteria.
- (Optional) Save the filter for repeat use.
- Click the ellipsis and select Save Filter.
- Select whether the filter if the default filter to display.
- Select whether to make the filter public.
- Click OK.
- Review the findings.
Search
Type into the search bar and the list of event sources will automatically filter to match the criteria. Updating the view of Findings and the Trend and Analytics data display.
Data Display
The main Thread Findings page displays a list of Threat Findings (with a total and percentage displayed at the top) with search, and columns for: Event Source, Finding Type, Count, Severity, Cloud Account, Resource Name & ID, Resource Type, and Last Detected.
The main Threat Findings view includes the columns Event Source, Finding Type, Count, Severity, Cloud Account, Resource Name & ID, Resource Type, and Last Seen. The view can be sorted ascending/descending on any of these columns.
Details | Description |
---|---|
Event Source | Identifies the source of the Threat Finding. For this current release only third-party CSP sources are supported. |
Finding Type | Identifies the Finding Type and links to expanded data. Clicking on the link for an individual Finding Type opens a detail pane that contains additional detail for that finding, as well as a JSON display/download option. |
Count | Provides a count of the findings for the event source. |
Severity | Identifies the severity of the Threat Finding (e.g. High, Medium, Low). Severities are determined by data reported through the individual 3rd-party severity information. |
Resource Name & ID | Displays the Resource Name and ID. Clicking on the individual Resource ID opens the detailed resource view. This view contains the option to download the source data as well as a tabbed view (Properties, Public Access, Insight Findings, Thread Findings, etc.) |
Resource Type | Displays the Resource Type, for example Instance or Serviceaccesskey. |
Last Detected | Provides the time the Threat Finding was last seen. This will vary based on when the data was last harvested. |
Threat Findings and Automation (Bots)
InsightCloudSec supports the ability to build automation around notifications through our Bot capability out-of-the-box with Threat Findings. Users can export findings to SIEM (e.g. Splunk) or generate notifications for a specific scope of findings to an specific email or Slack channel. Your Bot can be scoped with two resource types associated with Threat Findings:
- The Threat Findings resource and the Resource(s) (e.g., EC2 instances) on which a Threat Finding as been identified.
For more details about Bot configuration refer to our documentation on BotFactory & Automation. In general Bots can be created in one of three ways:
- From the BotFactory landing page via the Create Bot button
- From an Insight
- Through a template as outlined below (InsightCloudSec does not have out-of-the-box Bot templates but this section includes one example below.)
JSON Threat Findings Bot Template
json
1{2"resource_id": "divvybot:1:1234",3"name": "Threat Findings Bot",4"description": "",5"notes": null,6"insight_id": null,7"source": null,8"insight_name": null,9"insight_severity": null,10"owner": "divvyuser:1234:",11"owner_name": "Rapid7",12"state": "RUNNING",13"date_created": "2022-12-14 11:00:15",14"date_modified": "2022-12-21 14:29:28",15"category": "Security",16"badge_scope_operator": null,17"instructions": {18"resource_types": [19"threatfinding"20],21"filters": [22{23"name": "divvy.filter.threat_finding_by_category_and_confidence",24"config": {25"confidence": [26"low",27"medium",28"high"29],30"category": [31"incident",32"anomaly"33]34}35}36],37"actions": [38{39"name": "divvy.action.send_bulk_email",40"config": {41"message_subject": "Found a threat!",42"preamble": "start",43"message_body": "{{resource.serialize(indent=2)}}",44"conclusion": "end",45"recipient_list": [46"john_smith@rapid7.com"47],48"recipient_tag_keys": [],49"walk_resource_group": false,50"recipient_badge_keys": [],51"separator": "",52"send_via_bcc": false,53"html_message": false,54"skip_duplicates": true,55"send_empty_email": false,56"replacement_strings": []57},58"run_when_result_is": true59},60{61"name": "divvy.action.mark_non_compliant",62"config": {},63"run_when_result_is": true64}65],66"groups": [67"divvyorganizationservice:1",68"divvyorganizationservice:2"69],70"badges": [],71"exclusion_badges": null,72"hookpoints": [73"divvycloud.resource.created",74"divvycloud.resource.modified"75],76"schedule": null,77"schedule_description": null78},79"valid": true,80"errors": [],81"severity": "low",82"detailed_logging": false,83"scope": [84"divvyorganizationservice:1",85"divvyorganizationservice:2"86]87}88
Creating a Threat Findings Bot from a Template
Import an automation template
- In InsightCloudSec, go to Automation > BotFactory.
- On the Templates tab, select the Import Template option.
- In the JSON window, paste the JSON automation template, provided above.
- Click Submit to verify and store the template for future use.
- Review Creating Bots for more information on next steps.