Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

EXPANDR-1576 CortexXpanse Remediation Guidance changes #30712

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -1372,7 +1372,7 @@ def main() -> None:
'asm-list-asset-internet-exposure': list_asset_internet_exposure_command,
'asm-get-asset-internet-exposure': get_asset_internet_exposure_command,
'asm-list-alerts': list_alerts_command,
'asm-list-attack-surface-rules': list_attack_surface_rules_command,
'asm-get-attack-surface-rule': list_attack_surface_rules_command,
'asm-tag-asset-assign': assign_tag_to_assets_command,
'asm-tag-asset-remove': remove_tag_to_assets_command,
'asm-tag-range-assign': assign_tag_to_ranges_command,
Expand Down
4 changes: 2 additions & 2 deletions Packs/CortexXpanse/Integrations/CortexXpanse/CortexXpanse.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
category: Vulnerability Management

Check failure on line 1 in Packs/CortexXpanse/Integrations/CortexXpanse/CortexXpanse.yml

View workflow job for this annotation

GitHub Actions / pre-commit

Validation Error BC102

Possible backwards compatibility break, You've changed the context in the file,please undo. the command is: asm-list-attack-surface-rules

Check failure on line 1 in Packs/CortexXpanse/Integrations/CortexXpanse/CortexXpanse.yml

View workflow job for this annotation

GitHub Actions / pre-commit

Validation Error BC104

Possible backwards compatibility break, Your updates to this file contains changes to a name or an argument of an existing command(s). Please undo you changes to the following command(s): asm-list-attack-surface-rules
commonfields:
id: Cortex Xpanse
version: -1
Expand Down Expand Up @@ -473,7 +473,7 @@
- contextPath: ASM.Alert.detection_timestamp
description: Date the alert was created.
type: Date
- name: asm-list-attack-surface-rules
- name: asm-get-attack-surface-rule
arguments:
- name: enabled_status
auto: PREDEFINED
Expand Down Expand Up @@ -836,7 +836,7 @@
description: User-provided notes related to the incident.
type: string
description: Returns additional details about a specific incident.
dockerimage: demisto/python3:3.10.13.78960
dockerimage: demisto/python3:3.10.13.80593
isFetchSamples: true
isfetch: true
script: ''
Expand Down
6 changes: 3 additions & 3 deletions Packs/CortexXpanse/Integrations/CortexXpanse/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -1438,14 +1438,14 @@ Get a list of all your ASM alerts filtered by alert IDs, severity and/or creatio
>| NOT_AVAILABLE | N/A | NO_HOST | 33 | Unclassified | Networking and security infrastructure, such as firewalls and routers, generally should not have their administration panels open to public Internet. Compromise of these devices, often though password guessing or vulnerability exploitation, provides privileged access to an enterprise network. | 1659452809020 | {'agent_install_type': 'NA', 'agent_host_boot_time': None, 'event_sub_type': None, 'module_id': None, 'association_strength': None, 'dst_association_strength': None, 'story_id': None, 'event_id': None, 'event_type': None, 'event_timestamp': 1659452809020, 'actor_process_instance_id': None, 'actor_process_image_path': None, 'actor_process_image_name': None, 'actor_process_command_line': None, 'actor_process_signature_status': 'N/A', 'actor_process_signature_vendor': None, 'actor_process_image_sha256': None, 'actor_process_image_md5': None, 'actor_process_causality_id': None, 'actor_causality_id': None, 'actor_process_os_pid': None, 'actor_thread_thread_id': None, 'causality_actor_process_image_name': None, 'causality_actor_process_command_line': None, 'causality_actor_process_image_path': None, 'causality_actor_process_signature_vendor': None, 'causality_actor_process_signature_status': 'N/A', 'causality_actor_causality_id': None, 'causality_actor_process_execution_time': None, 'causality_actor_process_image_md5': None, 'causality_actor_process_image_sha256': None, 'action_file_path': None, 'action_file_name': None, 'action_file_md5': None, 'action_file_sha256': None, 'action_file_macro_sha256': None, 'action_registry_data': None, 'action_registry_key_name': None, 'action_registry_value_name': None, 'action_registry_full_key': None, 'action_local_ip': None, 'action_local_ip_v6': None, 'action_local_port': None, 'action_remote_ip': None, 'action_remote_ip_v6': None, 'action_remote_port': 80, 'action_external_hostname': None, 'action_country': 'UNKNOWN', 'action_process_instance_id': None, 'action_process_causality_id': None, 'action_process_image_name': None, 'action_process_image_sha256': None, 'action_process_image_command_line': None, 'action_process_signature_status': 'N/A', 'action_process_signature_vendor': None, 'os_actor_effective_username': None, 'os_actor_process_instance_id': None, 'os_actor_process_image_path': None, 'os_actor_process_image_name': None, 'os_actor_process_command_line': None, 'os_actor_process_signature_status': 'N/A', 'os_actor_process_signature_vendor': None, 'os_actor_process_image_sha256': None, 'os_actor_process_causality_id': None, 'os_actor_causality_id': None, 'os_actor_process_os_pid': None, 'os_actor_thread_thread_id': None, 'fw_app_id': None, 'fw_interface_from': None, 'fw_interface_to': None, 'fw_rule': None, 'fw_rule_id': None, 'fw_device_name': None, 'fw_serial_number': None, 'fw_url_domain': None, 'fw_email_subject': None, 'fw_email_sender': None, 'fw_email_recipient': None, 'fw_app_subcategory': None, 'fw_app_category': None, 'fw_app_technology': None, 'fw_vsys': None, 'fw_xff': None, 'fw_misc': None, 'fw_is_phishing': 'N/A', 'dst_agent_id': None, 'dst_causality_actor_process_execution_time': None, 'dns_query_name': None, 'dst_action_external_hostname': None, 'dst_action_country': None, 'dst_action_external_port': None, 'contains_featured_host': 'NO', 'contains_featured_user': 'NO', 'contains_featured_ip': 'NO', 'image_name': None, 'container_id': None, 'cluster_name': None, 'referenced_resource': None, 'operation_name': None, 'identity_sub_type': None, 'identity_type': None, 'project': None, 'cloud_provider': None, 'resource_type': None, 'resource_sub_type': None, 'user_agent': None, 'user_name': None} | FAKE-GUID | false | false | 1660240426055 | 1659455246812 | MATCHED | Networking Infrastructure | ASM alert resolution | STATUS_070_RESOLVED_OTHER | high | ASM | false |


### asm-list-attack-surface-rules
### asm-get-attack-surface-rule

***
Fetches attack surface rules related to how Cortex Xpanse does assessment.

#### Base Command

`asm-list-attack-surface-rules`
`asm-get-attack-surface-rule`

#### Input

Expand All @@ -1472,7 +1472,7 @@ Fetches attack surface rules related to how Cortex Xpanse does assessment.
| ASM.AttackSurfaceRules.modified | unknown | Last modification of the attack surface rule. |

#### Command example
```!asm-list-attack-surface-rules enabled_status=On limit=1```
```!asm-get-attack-surface-rule enabled_status=On limit=1```
#### Context Example
```json
{
Expand Down
4 changes: 4 additions & 0 deletions Packs/CortexXpanse/ReleaseNotes/1_0_14.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
{
"breakingChanges": true,
"breakingChangesNotes": "Attack surface rule command changed from ***asm-list-attack-surface-rules*** to ***asm-get-attack-surface-rules***."
}
5 changes: 5 additions & 0 deletions Packs/CortexXpanse/ReleaseNotes/1_0_14.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
## CortexXpanse

Check failure on line 1 in Packs/CortexXpanse/ReleaseNotes/1_0_14.md

View workflow job for this annotation

GitHub Actions / pre-commit

Validation Error RN107

No release note entry was found for the integration "Cortex Xpanse" in the CortexXpanse pack. Please rerun the update-release-notes command without -u to generate an updated template. If you are trying to exclude an item from the release notes, please refer to the documentation found here - https://xsoar.pan.dev/docs/integrations/changelog#excluding-items

Check failure on line 1 in Packs/CortexXpanse/ReleaseNotes/1_0_14.md

View workflow job for this annotation

GitHub Actions / pre-commit

Validation Error RN115

Did not find content items headers under "Integrations" - might be duo to invalid format. Please use "demisto-sdk update-release-notes -i Packs/CortexXpanse" For more information, refer to the following documentation: https://xsoar.pan.dev/docs/documentation/release-notes

#### Integrations

**Breaking Change** Attack surface rule command changed from ***asm-list-attack-surface-rules*** to ***asm-get-attack-surface-rules***.
6 changes: 4 additions & 2 deletions Packs/CortexXpanse/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,14 +2,16 @@
"name": "Cortex Xpanse",
"description": "Content for working with Attack Surface Management (ASM).",
"support": "xsoar",
"currentVersion": "1.0.13",
"currentVersion": "1.0.14",
"author": "Cortex XSOAR",
"url": "https://www.paloaltonetworks.com/cortex",
"email": "",
"categories": [
"Data Enrichment & Threat Intelligence"
],
"tags": ["Palo Alto Networks Products"],
"tags": [
"Palo Alto Networks Products"
],
"useCases": [],
"keywords": [
"Attack Surface Management",
Expand Down