Creating Intelligent SOCs Cortex XSOAR Top Machine Learning Use Cases “Machine learning” is a term awash with both endless potential and considerable skepticism. As a security orchestration, automation, and response (SOAR) platform built from the ground up with a foundation of machine learning, Cortex® XSOAR brings customers verifiable benefits in their security operations centers (SOCs) across geographies, maturity, and scope of operations. The machine learning capabilities of Cortex XSOAR increase responder productivity, accelerate playbook development, and enable leaner, more efficient security operations. This paper presents a series of use cases that describe the challenges SOCs face, how Cortex XSOAR helps, and the benefits these capabilities provide. Cortex by Palo Alto Networks | Creating Intelligent SOCs | Use Case 1 Use Case 1: Incident Owner Recommendations Challenge As SOCs scale, they end up following a “whoever’s available” approach for assigning incident owners. This not only leads to uneven workloads for analysts who are already overburdened but also results in analyst expertise getting ignored with respect to assignments. Improperly assigned incidents will eventually lead to improperly handled incidents. Solution Whenever incident owners are to be assigned, Cortex XSOAR studies details of all past incidents in the system, including incident types and a variety of fields. Using machine learning, Cortex XSOAR cross-references this data with existing analyst loads to suggest the top three analysts best suited to own the incident. Figure 1: Intelligent analyst recommendations Cortex XSOAR studies incident fields and analyst loads b ­ efore recommending incident ownership. Benefit These suggestions ensure that workload is not the only ­criterion considered during incident assignment. By studying incident types and fields, Cortex XSOAR is able to suggest analysts who are best suited to own incidents with respect to both time and expertise. Cortex by Palo Alto Networks | Creating Intelligent SOCs | Use Case 2 Use Case 2: Security Expert Suggestions Challenge End-to-end handling of incident response is rarely an i­ solated process. Unfortunately, SOC analysts often operate in silos while performing investigations, oblivious to their colleagues’ specific skill sets that might come in handy for complex incidents. Junior analysts especially operate in the dark here, left to contend with incidents alone as senior analysts are occupied with other day-to-day operations. Solution Cortex XSOAR War Room enables collaborative investigations wherein analysts can invite their teammates to conduct joint investigations. Here, Cortex XSOAR uses machine learning to study the history of all closed incidents, specifically looking at manual actions performed by analysts in the past. After parsing this data, Cortex XSOAR suggests the top three analysts who can provide relevant assistance for a particular incident. Figure 2: Decisions based on historical analysis Cortex XSOAR looks at manual actions performed in the War Room and the history of closed ­incidents before­­recommending security experts to join the ­investigation. Benefit By both enabling joint investigations and facilitating intelligent team composition, Cortex XSOAR War Room heralds a consistent decrease in resolution times and increase in resolution quality. This feature also acts as a guiding hand for junior analysts by highlighting which experts can help them through ­specific incidents, thus reducing error rate and analyst anxiety. Cortex by Palo Alto Networks | Creating Intelligent SOCs | Use Case 3 Use Case 3: Commonly Used ­Security Commands Challenge While conducting real-time investigations after incident triage, analysts literally have hundreds of possible security a ­ ctions to choose from. As SOCs keep expanding their product stacks, there is an observed divergence in the type, order, and fidelity of security actions taken from analyst to analyst. This leads to varying resolution times and quality for similar incidents, which can negatively impact service-level agreements (SLAs) and metrics tracking. Solution When analysts begin to type in a security command in Cortex XSOAR War Room, the platform studies manual commands used for all incidents of that type in the past. This data enables recommendations on which security commands to run first. Even if analysts have already run some commands and are stuck in the middle of an investigation, these suggestions can set them on the right path with commands they might have missed. Figure 3: Intelligent command recommendations Cortex XSOAR looks at manual commands performed for particular incident types to recommend commonly used commands for that incident type. Benefit Security command suggestions move analysts toward standardized incident response and guarantee that no commonly used actions are missed for any isolated incident. U ­ ltimately, the Cortex XSOAR platform helps maintain and improve SOC SLA health by preventing rogue investigation processes that miss critical actions. This also aids in organic knowledge management and retaining expertise within the SOC. Cortex by Palo Alto Networks | Creating Intelligent SOCs | Use Case 4 Use Case 4: Visualizing ­Related Incidents Challenge The speed and intensity with which incidents crop up in the SOC frequently lead to analyst myopia. While concentrating on the incident at hand, analysts may fail to connect it to the bigger picture and draw patterns with similar incidents that have already occurred on the system. This results in redundant rework for response processes that are already stored—but untapped—in the platform. Solution For each Cortex XSOAR incident, the Related Incidents section presents a visual, time-based map of similar incidents that have occurred on the system. Cortex XSOAR studies the incident’s data and indicator details, identifies patterns and similarities, and visualizes that data in actionable form. Figure 4: Visualized, actionable data Cortex XSOAR correlates indicators and incident data to present a real-time radial map of related ­incidents for each case. Benefit Rather than reduce MTTR or alert fatigue—which are ­standard SOAR benefits—the Related Incidents feature goes a step further and increases analysts’ investigative c ­ apabilities by providing them with visual tools to better understand the broader picture of the SOC and how incidents are related across a host of factors. Cortex by Palo Alto Networks | Creating Intelligent SOCs | Use Case 5 Use Case 5: Simplifying ­Playbook Task Creation Challenge After playbooks make the initial journey from paper (or the analysts’ minds) onto SOAR platforms, they facilitate automated response but may not undergo any further measurement and review. Unless analysts capture better knowledge from elsewhere and feed it into the platform, the benefits of these playbooks plateau eventually. Solution Cortex XSOAR not only facilitates creation of custom playbook tasks but also uses machine learning to accelerate conception of verifiably relevant tasks. While creating playbook tasks and selecting inputs, analysts can see suggestions for arguments and parameters that fit best with those inputs. Figure 5: Best-fit input recommendations Cortex XSOAR digs across playbook tasks to study commonly used automation arguments and recommends these inputs during the creation of new playbook tasks. Benefit Rather than stopping at alert fatigue reduction and quicker incident triage, Cortex XSOAR playbooks use machine learning to always traverse the path of improvement through more efficient tasks. This helps tackle the eventual stagnation in efficacy of static playbooks. Cortex by Palo Alto Networks | Creating Intelligent SOCs | Use Case 6 Use Case 6: Extracting ­Duplicate Incidents Challenge High alert volume usually leads to a high occurrence of ­duplicates as well. However, due to varying attack vectors, different target endpoints, or subtle morphing, these incidents register independently on the SOC’s security i­ nformation and event management (SIEM) or SOAR platform. This leads to tiresome, repetitive work for the analysts as they comb through duplicate incidents. Solution Cortex XSOAR users can take advantage of out-of-the-box automation to generate a list of duplicate incidents, either as a playbook task or interactively in the War Room. Cortex XSOAR machine learning studies both predefined data and customer environments, looks for similar labels, email labels (relevant for phishing incidents), incident occurrence times, and common indicators to generate this list. Figure 6: Automation to identify duplicate incidents Cortex XSOAR builds a duplicate incident list by comparing labels, time stamps and other ­common traits among incidents. Benefit Easy identification and documentation of duplicate incidents eliminate huge chunks of menial work for analysts, freeing them to concentrate on more critical problem-solving and meaningful tasks. Cortex by Palo Alto Networks | Creating Intelligent SOCs | Use Case 7 Use Case 7: Automate Phishing Response Challenge Reviewing potential phishing incidents consumes a significant portion of time for many SOC teams. ­Analysts spend an exorbitant amount of time and energy manually investigating potential phishing ­attacks, using various tools and services that provide enriched data on indicators found within the emails to see if any proof of malice exists. Such a high volume of phishing attack incidents usually requires a ­manual review step, in which many of the suspected phishing incidents turn out to be false positives. Solution Cortex XSOAR’s machine learning (ML) model capabilities can solve this manual review process with a high degree of accuracy and efficiency using the phishing classifier feature. The phishing classifier is a deep learning model that enables Cortex XSOAR to analyze and predict behavior through incident types and fields. Machine learning models are used mainly for phishing incidents and can be trained to automatically recognize, for example, phishing emails or URL information that is legitimate or contains spam and predicts if there is a potential phishing attack. Figure 7: Sample phishing classifier model results Cortex XSOAR provides detailed evaluations and enables analysts to get a sense of how the model should perform from different aspects to better understand the expected implications of applying it in a certain way. Benefit Cortex XSOAR enables users to leverage ML effectively in the investigation process of phishing incidents. In a few short steps, SOCs can configure the ML model training using either out-of-the-box or custom models and scripts to identify and analyze specific indicators, get a detailed analysis of the results, and receive a recommendation for using it in production. It is yet another step in the SOC automation journey that eliminates unnecessary manual work. Cortex by Palo Alto Networks | Creating Intelligent SOCs | Use Case 8 Conclusion For Cortex XSOAR, automation is just one of many means to an end: an attack-proof SOC. By harmonizing actions across products, managing incidents within the platform, collaborating in real time, and learning from all the data at your disposal, you can truly extract the greatest value for your SOC. Staying true to the “learning” half of machine learning, Cortex XSOAR is always searching for new avenues to leverage its ML base and advance a platform that gets smarter with each incident, in turn making the SOC smarter as well. Want to See Cortex XSOAR in A ­ ction? Schedule a demo. Sign up for Cortex XSOAR Free Edition. 3000 Tannery Way Santa Clara, CA 95054 Main: Sales: +1.408.753.4000 +1.866.320.4788 Support: +1.866.898.9087 www.paloaltonetworks.com © 2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered ­ trademark of Palo Alto Networks. A list of our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. cortex_creating-intelligent-socs_uc_032222