TruSTAR Intel Workflows Series: Automating Data Workflows to Unlock Investments in SIEM, SOAR and XDR

We recently introduced TruSTAR Intel Workflows.This blog series explains our motivations for building this feature, how it works, and how users can better inform security operations. This is Part 2: How TruSTAR Intel Workflows Work.

Cybersecurity teams face serious challenges when it comes to intelligence data. From massive volumes of data being generated to how to integrate and share relevant data within the organization, with partners, and with industry groups. To learn more about modern data challenges, read part 1 of our TruSTAR Intel Workflows series here.

The TruSTAR platform sets itself apart by taking a data-centric approach to improving cybersecurity processes and operations. TruSTAR believes our data-centric approach to managing intelligence is the key to unlocking investments in SIEM, SOAR and XDR.

We’re excited to introduce TruSTAR Intel Workflows to our platform, a no-code way to create pipelines that automatically transform and curate data from your intel sources to make it actionable for automation in detection and response. TruSTAR Intel Workflows accelerate automation by providing a visual way to select intel sources, transform intel to make it more actionable and improve collaboration among teams by supporting a wide variety of destinations.

To answer the needs of security teams, there are two standard TruSTAR Intel Workflows: Indicator Prioritization and Phishing Triage.

Indicator Prioritization Workflow

The TruSTAR Indicator Prioritization Workflow is a specific Workflow set up to collect multiple sources of intelligence data, transform it, and send it on to one or more destinations, from teams to tools to collaborators. This Workflow is easily customizable to bring the power of intelligence data automation to any organization. This is done through the following:

Sources

The TruSTAR platform integrated with premium intelligence curated by well-known players in the cybersecurity space, open source lists, ISAO/ISAC data, and internal, historical data. TruSTAR offers more than two dozen external intelligence sources that can be used to assess whether a piece of data is malicious or benign. The platform allows users to specify a weighting factor for each source using a scale of 1 (low) to 5 (high).

Transformations

Transformations refer to how to handle data named as sources. Some of these transformations are automatic in TruSTAR, such as cleaning and normalizing the data. Other actions are optional, such filtering by attribute, tags, or safelists.

Scoring Normalization

Using third-party intelligence sources provides external validation as to whether a piece of data is bad or good, but each source uses its own scoring system. TruSTAR’s scoring normalization process automatically converts external scores to a simple 0-3 scale by looking at the source’s scoring system and then mapping it to our scale. Source scores become equivalent to each other without any need for human intervention.

Priority Scoring

The total of all of an Indicator’s normalized scores is the Indicator’s Priority Score. Any weighting added to sources when selecting them is used in calculating priority scores. For example, if Source A is assigned a weight of 5 (the highest possible value), then that source will have more influence over the priority score than a source with no weighting or with a lower-value weight.

Destinations

Destinations provide the flexibility to send vetted data to almost anywhere imaginable, from internal security tools, ISAC/ISAO sharing groups, or external companies. TruSTAR provides workflow apps that integrate with dozens of third-party detection, SIEM, SOAR, XDR and other security tools, as well as the ability to leverage one of our Managed Connectors to direct a single data stream to third-party software. TruSTAR also provides a fully functional REST API and Python SDK for building custom interfaces.

Simpler Approach and Better Outcomes for Previously Tedious Processes

An analyst working to reduce false positives in a detection tool can customize a TruSTAR Indicator Prioritization Workflow to create a data set of indicators vetted as malicious by at least two external sources and then feed that data set into their detection tool. This not only reduces false positives, it also reduces mean Time to Resolution.

An automation engineer looking to reduce the complexity of their organization’s playbooks and reduce the overhead of managing a half-dozen external intelligence sources can use TruSTAR’s integration with SOAR tools to customize the TruSTAR Indicator Prioritization Workflow, as well as specify sources and tag indicators to later analyze how useful each source is in identifying malicious content.

"One of the biggest wins that we have the ability to automate and push indicators out of tickets... We've built a workflow to push those indicators into a vetted TruSTAR Enclave and back into Splunk, which then tells the team if they see these indicators again." — Kyle Bailey, Manager, Threat Operations, Box

The Power of Intel Workflows

Moving from application-centric workflows to data-centric, automated workflows provides clear advantages to security teams dealing with terabytes of data. TruSTAR’s Intel Workflows take care of the onerous tasks of gathering, cleaning, and prioritizing data sources, as well as shipping that data off to multiple destinations. TruSTAR provides the ability to filter data by indicator type, scores, attributes, sources, and other features to produce a high-fidelity vetted data set specific to the needs of any organization. TruSTAR Intel Workflows help manage data and get to detection (MTTD) and resolution (MTTR) faster.

In part 3 of this blog series, we’ll take a deep dive into how the Prioritized Indicators Intel Workflow handles data, from sources to transformations and destinations.

----------------------------------------------------
Thanks!
Elvis Hovor

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.