-
Notifications
You must be signed in to change notification settings - Fork 17
/
workflow-automation.yml
157 lines (123 loc) · 11.4 KB
/
workflow-automation.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
### YamlMime:HowTo
metadata:
title: Workflow automation
description: Learn how to create and automate workflows in Microsoft Defender for Cloud.
author: dcurwin
ms.author: dacurwin
ms.date: 06/18/2023
ms.topic: how-to
ms.custom:
- ge-structured-content-pilot
title: |
Automate remediation responses
introduction: |
Every security program includes multiple workflows for incident response. These processes might include notifying relevant stakeholders, launching a change management process, and applying specific remediation steps. Security experts recommend that you automate as many steps of those procedures as you can. Automation reduces overhead. It can also improve your security by ensuring the process steps are done quickly, consistently, and according to your predefined requirements.
This article describes the workflow automation feature of Microsoft Defender for Cloud. This feature can trigger consumption logic apps on security alerts, recommendations, and changes to regulatory compliance. For example, you might want Defender for Cloud to email a specific user when an alert occurs. You'll also learn how to create logic apps using [Azure Logic Apps](/azure/logic-apps/logic-apps-overview).
prerequisites:
summary: |
Before you start:
- You need **Security admin role** or **Owner** on the resource group.
- You must also have write permissions for the target resource.
- To work with Azure Logic Apps workflows, you must also have the following Logic Apps roles/permissions:
- [Logic App Operator](/azure/role-based-access-control/built-in-roles#logic-app-operator) permissions are required or Logic App read/trigger access (this role can't create or edit logic apps; only *run* existing ones)
- [Logic App Contributor](/azure/role-based-access-control/built-in-roles#logic-app-contributor) permissions are required for logic app creation and modification.
- If you want to use Logic Apps connectors, you might need other credentials to sign in to their respective services (for example, your Outlook/Teams/Slack instances).
procedureSection:
- title: |
Create a logic app and define when it should automatically run
summary: |
Follow these steps:
steps:
- |
From Defender for Cloud's sidebar, select **Workflow automation**.
:::image type="content" source="./media/workflow-automation/list-of-workflow-automations.png" alt-text="Screenshot of workflow automation page showing the list of defined automations." lightbox="./media/workflow-automation/list-of-workflow-automations.png":::
- |
From this page, create new automation rules, enable, disable, or delete existing ones. A scope refers to the subscription where the workflow automation is deployed.
- |
To define a new workflow, select **Add workflow automation**. The options pane for your new automation opens.
:::image type="content" source="./media/workflow-automation/add-workflow.png" alt-text="Add workflow automations pane." lightbox="media/workflow-automation/add-workflow.png":::
- |
Enter the following:
- A name and description for the automation.
- The triggers that will initiate this automatic workflow. For example, you might want your logic app to run when a security alert that contains "SQL" is generated.
If your trigger is a recommendation that has "sub-recommendations", for example **Vulnerability assessment findings on your SQL databases should be remediated**, the logic app will not trigger for every new security finding; only when the status of the parent recommendation changes.
- |
Specify the consumption logic app that will run when your trigger conditions are met.
- |
From the Actions section, select **visit the Logic Apps page** to begin the logic app creation process.
:::image type="content" source="media/workflow-automation/visit-logic.png" alt-text="Screenshot that shows the actions section of the add workflow automation screen and the link to visit Azure Logic Apps." border="true":::
You'll be taken to Azure Logic Apps.
- |
Select **(+) Add**.
:::image type="content" source="media/workflow-automation/logic-apps-create-new.png" alt-text="Screenshot of where to create a logic app." lightbox="media/workflow-automation/logic-apps-create-new.png":::
- |
Fill out all required fields and select **Review + Create**.
The message **Deployment is in progress** appears. Wait for the deployment complete notification to appear and select **Go to resource** from the notification.
- |
Review the information you entered and select **Create**.
In your new logic app, you can choose from built-in, predefined templates from the security category. Or you can define a custom flow of events to occur when this process is triggered.
> [!TIP]
> Sometimes in a logic app, parameters are included in the connector as part of a string and not in their own field. For an example of how to extract parameters, see step #14 of [Working with logic app parameters while building Microsoft Defender for Cloud workflow automations](https://techcommunity.microsoft.com/t5/azure-security-center/working-with-logic-app-parameters-while-building-azure-security/ba-p/1342121).
- title: |
Supported triggers
summary: |
The logic app designer supports the following Defender for Cloud triggers:
- **When a Microsoft Defender for Cloud Recommendation is created or triggered** - If your logic app relies on a recommendation that gets deprecated or replaced, your automation stops working and you need to update the trigger. To track changes to recommendations, use the [release notes](release-notes.md).
- **When a Defender for Cloud Alert is created or triggered** - You can customize the trigger so that it relates only to alerts with the severity levels that interest you.
- **When a Defender for Cloud regulatory compliance assessment is created or triggered** - Trigger automations based on updates to regulatory compliance assessments.
> [!NOTE]
> If you're using the legacy trigger **When a response to a Microsoft Defender for Cloud alert is triggered**, your logic apps won't be launched by the Workflow Automation feature. Instead, use either of the triggers mentioned above.
steps:
- |
After you've defined your logic app, return to the workflow automation definition pane ("Add workflow automation").
- |
Select **Refresh** to ensure your new logic app is available for selection.
- |
Select your logic app and save the automation. The logic app dropdown only shows those with supporting Defender for Cloud connectors mentioned above.
- title: |
Manually trigger a logic app
summary: |
You can also run logic apps manually when viewing any security alert or recommendation.
To manually run a logic app, open an alert, or a recommendation and select **Trigger logic app**.
[![Manually trigger a logic app.](media/workflow-automation/manually-trigger-logic-app.png)](media/workflow-automation/manually-trigger-logic-app.png#lightbox)
## Configure workflow automation at scale
Automating your organization's monitoring and incident response processes can greatly improve the time it takes to investigate and mitigate security incidents.
To deploy your automation configurations across your organization, use the supplied Azure Policy 'DeployIfNotExist' policies described below to create and configure workflow automation procedures.
Get started with [workflow automation templates](https://github.com/Azure/Azure-Security-Center/tree/master/Workflow%20automation).
To implement these policies:
steps:
- |
From the table below, select the policy you want to apply:
|Goal |Policy |Policy ID |
|---------|---------|---------|
|Workflow automation for security alerts |[Deploy Workflow Automation for Microsoft Defender for Cloud alerts](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff1525828-9a90-4fcf-be48-268cdd02361e)|f1525828-9a90-4fcf-be48-268cdd02361e|
|Workflow automation for security recommendations |[Deploy Workflow Automation for Microsoft Defender for Cloud recommendations](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F73d6ab6c-2475-4850-afd6-43795f3492ef)|73d6ab6c-2475-4850-afd6-43795f3492ef|
|Workflow automation for regulatory compliance changes|[Deploy Workflow Automation for Microsoft Defender for Cloud regulatory compliance](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F509122b9-ddd9-47ba-a5f1-d0dac20be63c)|509122b9-ddd9-47ba-a5f1-d0dac20be63c|
You can also find these by searching Azure Policy. In Azure Policy, select **Definitions** and search for them by name.
- |
From the relevant Azure Policy page, select **Assign**.
:::image type="content" source="./media/workflow-automation/export-policy-assign.png" alt-text="Assigning the Azure Policy.":::
- |
In the **Basics** tab, set the scope for the policy. To use centralized management, assign the policy to the Management Group containing the subscriptions that will use the workflow automation configuration.
- |
In the **Parameters** tab, enter the required information.
:::image type="content" source="media/workflow-automation/parameters-tab.png" alt-text="Screenshot of the parameters tab.":::
- |
Optionally apply this assignment to an existing subscription in the **Remediation** tab and select the option to create a remediation task.
- |
Review the summary page and select **Create**.
### Data types schemas
To view the raw event schemas of the security alerts or recommendations events passed to the logic app, visit the [Workflow automation data types schemas](https://aka.ms/ASCAutomationSchemas). This can be useful in cases where you aren't using Defender for Cloud's built-in Logic Apps connectors mentioned above, but instead are using the generic HTTP connector - you could use the event JSON schema to manually parse it as you see fit.
relatedContent:
- text: Use workflow automation to automate a security response
url: /training/modules/resolve-threats-with-azure-security-center/
- text: Security recommendations in Microsoft Defender for Cloud
url: review-security-recommendations.md
- text: Security alerts in Microsoft Defender for Cloud
url: alerts-overview.md
#In this article, you learned about creating logic apps, automating their execution in Defender for Cloud, and running them manually. For more information, see the following documentation:
#- [Use workflow automation to automate a security response](/training/modules/resolve-threats-with-azure-security-center/)
#- [Security recommendations in Microsoft Defender for Cloud](review-security-recommendations.md)
#- [Security alerts in Microsoft Defender for Cloud](alerts-overview.md)
#- [Workflow automation data types schemas](https://aka.ms/ASCAutomationSchemas)
#- Check out [common questions](faq-general.yml) about Defender for Cloud.