Automating With Splunk Phantom: How Norlys Does It

Security Splunk
Some tasks are better off automated. Paying bills on time? Automated payments. Orchestrating a coordinated response to security alerts and triaging security events? There’s Splunk Phantom for that. Monotonous tasks, in our work and personal lives, should and can be automated in order to free up time and energy to focus on the things that matter.

One organization that has embraced automation is Norlys, Denmark’s largest power, utility and telecommunications company servicing 1.5 million customers. They turned to Splunk Phantom, Splunk’s security orchestration, automation and response (SOAR) technology, to automate manual workflows, repetitive tasks and difficult-to-maintain processes. As a result, Splunk Phantom has helped the Norlys team save 35 hours per week. Processes that once took 30 minutes to complete manually now take a mere 30 seconds.

Norlys Uses Automation to Accelerate and Simplify Their Security Operations in These Five Ways:

1. Forwarding notables from Splunk Enterprise Security to Splunk Phantom: By forwarding notables from your SIEM to your automation platform, the security team can centralize (and easily automate) post-alert enrichment, threat hunting and containment. For Norlys, forwarding notables manually can take three minutes per event. The Norlys team performs this action 50 times a week. Using automation, this action takes two seconds instead of three minutes, saving the team 2.5 hours per week while reducing mean time to detect (MTTD).

2. Investigating antivirus (AV) alerts: Manually reviewing an antivirus alert is tedious and time-consuming;- it takes Norlys about 40 minutes per investigation. By automating the investigation of AV alerts, the process takes approximately 10 minutes per alert, without the need for human interaction. The automated action collects information immediately after the event occurs, reducing forensic data loss and mean time to respond (MTTR).

3. Investigating IOCs from a threat feed: Investigating indicators of compromise (IoCs) from a threat feed can take the Norlys team 15 minutes per event, if performed manually. For instance, if investigating IP reputation, the team may need to cross reference IP intelligence, query for related IPs and eventually add the IP to a block list (among other tasks). By automating these actions using Splunk Phantom, Norlys has transformed a 15-minute exercise into a 10-second exercise.

4. Obtain browser history and other important artifacts from an endpoint: Manually obtaining artifacts from an endpoint during an investigation takes time, effort and countless clicks from the UI of your endpoint security technology (EDR or EPP). Furthermore, this workflow can be messy and prone to error. It took Norlys 30 minutes on average to perform this task manually. Using Splunk Phantom automation, it now takes 20 seconds.

5. Opening tickets in external systems: Manually opening tickets is one of the main causes of analyst burnout in a high-volume alert environment. In some cases where the security alert is ambiguous, an analyst can choose not to open a ticket simply because of the inconvenience. By automating this process, Norlys reduced the time to open tickets from 10 minutes to 10 seconds.

Want to dig deeper to see how Norlys achieved these results using automated playbooks? Check out our webinar, “The Top 5 Boring Tasks Every Security Team Should Automate,” to see how automated playbooks can revolutionize your security operations.

----------------------------------------------------
Thanks!
Olivia Courtney

Related Articles

Boss of the SOC (BOTS) Investigation Workshop for Splunk
Security
3 Minute Read

Boss of the SOC (BOTS) Investigation Workshop for Splunk

You've played BOTS with Splunk, now learn the how it all happened? This post discusses a new tutorial app that you can run on the BOTS v1 dataset to learn more about BOTS and have an educational workshop at home (or office)
Dark Crystal RAT Agent Deep Dive
Security
9 Minute Read

Dark Crystal RAT Agent Deep Dive

The Splunk Threat Research Team (STRT) analyzed and developed Splunk analytics for this RAT to help defenders identify signs of compromise within their networks.
Open Cybersecurity Schema Framework (OCSF) Takes Flight with v1.0 Schema Release
Security
3 Minute Read

Open Cybersecurity Schema Framework (OCSF) Takes Flight with v1.0 Schema Release

The Open Cybersecurity Schema Framework (OCSF) celebrates its first anniversary with the launch of a new open data schema.