<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Example of how to protect an EC2 group from malicious traffic with Splunk Phantom? in Splunk SOAR</title>
    <link>https://community.splunk.com/t5/Splunk-SOAR/Example-of-how-to-protect-an-EC2-group-from-malicious-traffic/m-p/499330#M367</link>
    <description>&lt;P&gt;Does anyone have examples of how to use Splunk Phantom to protect an EC2 group from malicious traffic?&lt;/P&gt;</description>
    <pubDate>Sun, 07 Jun 2020 16:35:16 GMT</pubDate>
    <dc:creator>sloshburch</dc:creator>
    <dc:date>2020-06-07T16:35:16Z</dc:date>
    <item>
      <title>Example of how to protect an EC2 group from malicious traffic with Splunk Phantom?</title>
      <link>https://community.splunk.com/t5/Splunk-SOAR/Example-of-how-to-protect-an-EC2-group-from-malicious-traffic/m-p/499330#M367</link>
      <description>&lt;P&gt;Does anyone have examples of how to use Splunk Phantom to protect an EC2 group from malicious traffic?&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jun 2020 16:35:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-SOAR/Example-of-how-to-protect-an-EC2-group-from-malicious-traffic/m-p/499330#M367</guid>
      <dc:creator>sloshburch</dc:creator>
      <dc:date>2020-06-07T16:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Example of how to protect an EC2 group from malicious traffic with Splunk Phantom?</title>
      <link>https://community.splunk.com/t5/Splunk-SOAR/Example-of-how-to-protect-an-EC2-group-from-malicious-traffic/m-p/499331#M368</link>
      <description>&lt;P&gt;&lt;EM&gt;The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the &lt;A href="https://docs.splunk.com/Documentation/UseCases"&gt;Splunk Platform Use Cases&lt;/A&gt; manual.&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;For more information on this and other examples, download the free &lt;A href="https://splunkbase.splunk.com/app/3435"&gt;Splunk Security Essentials&lt;/A&gt; app on Splunkbase.&lt;/EM&gt;&lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;Compromised Amazon EC2 credentials can give a malicious actor access to currently running instances and configurations, and the ability to start new instances and services. Detect suspicious behavior early so you can react quickly and further investigate suspicious behavior. &lt;/P&gt;

&lt;H1&gt;Load data&lt;/H1&gt;

&lt;P&gt;&lt;STRONG&gt;How to implement:&lt;/STRONG&gt; To run the Splunk Phantom EC2 Instance Isolation playbook, you need a Splunk Enterprise instance from which Phantom can draw data that ingests AWS and audit trail events.&lt;/P&gt;

&lt;P&gt;Although there are several ways to get data into Phantom, this example uses the &lt;A href="https://splunkbase.splunk.com/app/3411/"&gt;Phantom App for Splunk on Splunkbase&lt;/A&gt;. Verify that the playbook is configured to operate on &lt;CODE&gt;splunk_events&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;Before you run the playbook, verify that Splunk Phantom is receiving data from Splunk Enterprise. Also, verify your asset configurations on the &lt;STRONG&gt;Phantom Asset Configuration&lt;/STRONG&gt; page, and that all assets are resolved on the &lt;STRONG&gt;Phantom Resolved Assets&lt;/STRONG&gt; page.&lt;/P&gt;

&lt;H1&gt;Get insights&lt;/H1&gt;

&lt;P&gt;Isolate an EC2 instance by changing its security group in order to protect it from malicious traffic. You can start the EC2 Instance Isolation playbook alone or from another playbook.&lt;/P&gt;

&lt;P&gt;To find the playbook, go to the Phantom main menu, select Playbooks, and search for &lt;CODE&gt;ec2_instance_isolation&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;How to respond:&lt;/STRONG&gt; You can modify the Splunk Phantom EC2 Instance Isolation using several of the available Phantom apps to increase the scope of the actions you can take. For example, you can add actions based on the type of alert that was triggered using the Phantom AWS WAF or AWS IAM app.&lt;/P&gt;

&lt;H1&gt;Help&lt;/H1&gt;

&lt;P&gt;For more support, &lt;A href="https://answers.splunk.com/answers/ask.html?topics=usecase"&gt;post a question to the Splunk Answers community&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 22:31:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-SOAR/Example-of-how-to-protect-an-EC2-group-from-malicious-traffic/m-p/499331#M368</guid>
      <dc:creator>sloshburch</dc:creator>
      <dc:date>2020-01-30T22:31:57Z</dc:date>
    </item>
  </channel>
</rss>

