NCSCNLShareSTIXBundle

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook gets triggered every hour and perform the following actions: 1. Get all the threat intelligence indicators from Microsoft Sentinel Workspace with given tag. 2. Filter all the indicators whose export in not completed. 3. Share the STIX Bundle, that includes the 'Indicator, corresponding Identities, Markings and optional Sighting' with the to provided TAXII server.

Attribute Value
Type Playbook
Solution NCSC-NL NDN Cyber Threat Intelligence Sharing
Source View on GitHub

Additional Documentation

📄 Source: NCSCNLShareSTIXBundle/readme.md

NCSC-NL NDN Cyber Threat Intelligence Sharing


Summary

This playbook is inspired on the previous ACSC codecase and is enhanced with an additional Sighting feature and API key support. It gets triggered every day and perform the following actions:

  1. Get all the threat intelligence indicators from Microsoft Sentinel Workspace with given tag.
  2. Filter all the indicators whose export in not completed.
  3. Optional wil include a sighting object to report.
  4. Verify/Add TLP labels to indicators.
  5. Add Grouping and Identity Objects to indicators.
  6. Export the bundle to provided TAXII server.

Prerequisites

  1. Have TAXII Server Url, Collection ID, your Organization STIX Identity and API Key available before the deployment of the Playbook.

Deployment instructions

  1. To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
  2. Fill in the required parameters:
    • Playbook Name
    • TAXII Server Url
    • TAXII Server API Key
    • Collection ID
    • Organization Name
    • Organization ID (UUID)
    • Microsoft Sentinel Workspace
    • Tag for indicators to be exported
    • Tag for indicators after export completion
    • Default TLP Label
  3. Optional you can set the following parameters:
    • Include Sighting Object (default is yes)
    • TAXII Server Username (default is using API Key)
    • TAXII Server Password (default is using API Key)

Deploy to Azure

Post-Deployment instructions

a. Authorize Playbook to access Log Analytics Workspace

Once deployment is complete, assign playbook Log Analytics contributor role.

  1. Go to Log Analytics Workspace resource
  2. Select Access control (IAM) tab
  3. Add role assignments
  4. Select Contributor role
  5. In the Members tab choose "Assign access to" Managed Identity
  6. Click on "Select members"
  7. Provide correct Subscription and Managed Identity
  8. Provide the playbook name in "Search by name" textbox
  9. Select the correct identity and click on Select
  10. Click on "Review + assign"

References


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to NCSC-NL NDN Cyber Threat Intelligence Sharing