Skip to content

Commit f04dfe3

Browse files
committed
Updated the overall docs and release notes for version 1.0.1
Signed-off-by: S3B4SZ17 <[email protected]>
1 parent bd06ce3 commit f04dfe3

File tree

8 files changed

+108
-26
lines changed

8 files changed

+108
-26
lines changed

Packs/Sysdig/.pack-ignore

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,7 @@
11
[file:README.md]
2-
ignore=RM108
2+
ignore=RM108
3+
4+
[known_words]
5+
Mappers
6+
Mapper
7+
Runtime
File renamed without changes.

Packs/Sysdig/Integrations/SysdigResponseActions/README.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,11 @@ This is the default integration for this content pack when configured by the Dat
1212
| Trust any certificate (not secure) | False |
1313
| Use system proxy settings | False |
1414
| Classifier | False |
15-
| Incident type (if classifier doesn't exist) | False |
1615
| Mapper (incoming) | False |
16+
| Fetch incidents | |
17+
| Incident type | |
18+
| The maximum number of incidents per fetch | |
19+
| First fetch timestamp (&lt;number&gt; &lt;time unit&gt;, e.g., 12 hours, 7 days) | False |
1720

1821
## Commands
1922

@@ -23,7 +26,7 @@ After you successfully execute a command, a DBot message appears in the War Room
2326
### execute-response-action
2427

2528
***
26-
Execute response actions through the Sysdig API
29+
Execute response actions through the Sysdig API.
2730

2831
#### Base Command
2932

@@ -37,14 +40,14 @@ Execute response actions through the Sysdig API
3740
| callerId | The caller ID, it must be unique every time. | Required |
3841
| container_id | The container ID to apply the action. Example "container.id": "123456789123". | Optional |
3942
| path_absolute | The path of the file to quarantine. Example "/etc/sensitive". Required for the `FILE_QUARANTINE` action. | Optional |
40-
| host_id | The host ID. Example "laksjdf1923u90snca893". | Optional |
43+
| host_id | The host ID. Example "gke-host-1234". | Optional |
4144
| process_id | The process ID. Example "1234". Required for the `KILL_PROCESS` action. | Optional |
4245

4346
#### Context Output
4447

4548
| **Path** | **Type** | **Description** |
4649
| --- | --- | --- |
47-
| execute_response_action.Output | Dict | Output of the response-actions API |
50+
| execute_response_action.Output | Dict | Output of the response-actions API. |
4851

4952
### create-system-capture
5053

@@ -72,7 +75,7 @@ Command to trigger a system capture, it will record all system calls at the host
7275

7376
| **Path** | **Type** | **Description** |
7477
| --- | --- | --- |
75-
| create_system_capture.Output | Dict | Output of the system capture created |
78+
| create_system_capture.Output | Dict | Output of the system capture created. |
7679

7780
### get-capture-file
7881

@@ -93,12 +96,12 @@ Command to get a system capture based on the capture ID.
9396

9497
| **Path** | **Type** | **Description** |
9598
| --- | --- | --- |
96-
| get_capture_file.Output | Dict | Output of the system capture downloaded |
99+
| get_capture_file.Output | Dict | Output of the system capture downloaded. |
97100

98101
### get-action-execution
99102

100103
***
101-
Get the status and information of a triggered action execution
104+
Get the status and information of a triggered action execution.
102105

103106
#### Base Command
104107

@@ -114,4 +117,4 @@ Get the status and information of a triggered action execution
114117

115118
| **Path** | **Type** | **Description** |
116119
| --- | --- | --- |
117-
| get_action_execution.Output | Dict | Output of the action execution info |
120+
| get_action_execution.Output | Dict | Output of the action execution info. |

Packs/Sysdig/Integrations/SysdigResponseActions/SysdigResponseActions_description.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@
44

55
For the **URL** parameter use your Sysdig SaaS url, refer to the [documentation](https://docs.sysdig.com/en/docs/administration/saas-regions-and-ip-ranges/#sysdig-platform-regions) for a list of them based on the region.
66

7-
For the **API Key** field refer to the [documentation](https://docs.sysdig.com/en/retrieve-the-sysdig-api-token/) on how to retrieve it
7+
For the **API Key** field refer to the [documentation](https://docs.sysdig.com/en/retrieve-the-sysdig-api-token/) on how to retrieve it
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
!get-capture-file capture_id="123456-123456"
2-
!execute-response-action actionType=KILL_CONTAINER callerId="test_kill_container_07" container_id="123456789012" process_id=12345
3-
!create-system-capture agent_id="123456" capture_name="test_capture" container_id="123456789012" customer_id="223344" host_name="ip-1-2-3-4.us-west-1.compute.internal" machine_id="aa:bb:cc:11:22:33" scan_duration=15
2+
!execute-response-action actionType=KILL_CONTAINER callerId="test_kill_container_07" container_id="123456789012"
3+
!create-system-capture container_id="accc" host_name="i-0caaaa" capture_name="xsoar-capture-1234" agent_id="1234567" customer_id="1234" machine_id="00:11:22:33:44" scan_duration="15"
44
!get-action-execution action_execution_id="987654321"

Packs/Sysdig/README.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,15 @@
1-
# Sysdig Response Actions
2-
3-
This integration utilizes the Sysdig agent and the Sysdig Response Actions API to facilitate automated and manual remediation of security incidents. It enables security teams to take precise actions at the host or container level, such as terminating compromised containers, quarantining suspicious files, or capturing detailed system activity for forensic analysis. These capabilities are designed to enhance incident response workflows and improve overall security operations.
1+
The Sysdig Cortex XSOAR content pack features runtime security insights and automated response capabilities that integrate seamlessly with Cortex XSOAR analytics.
2+
Use this Content Pack to detect, investigate, and respond to security threats across your containerized and cloud-native environments.
43

54
## What does this pack do?
65

7-
This pack leverages the Sysdig Response Actions API to enable automated and manual responses to security incidents. Key features include:
6+
Provide integrations that will help you to:
87

9-
- **Container Management**: Terminate malicious containers to prevent further damage.
10-
- **File Quarantine**: Isolate suspicious files to mitigate potential threats.
11-
- **System Capture**: Perform detailed system captures for forensic analysis.
12-
- **Host-Level Actions**: Execute commands or scripts on hosts to remediate issues.
8+
- **Container Management**: Terminate malicious containers to prevent further damage and stop lateral movement.
9+
- **File Quarantine**: Isolate suspicious files to mitigate potential threats and preserve evidence for investigation.
10+
- **System Capture**: Perform detailed system captures for forensic analysis and root cause investigation.
11+
- **Real-time Response**: Leverage Sysdig's Response Actions API for immediate automated and manual incident response.
1312

14-
These capabilities help streamline incident response and enhance security posture.
13+
These capabilities help streamline incident response workflows and enhance your overall security posture through precise, targeted actions at the host and container level.
1514

1615
_For more information, visit [Sysdig](https://sysdig.com)_.
17-
18-
[![Sysdig Overview](doc_files/Author_image.png)](https://sysdig.com)

Packs/Sysdig/ReleaseNotes/1_0_1.md

Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
2+
#### Incident Fields
3+
4+
<!--
5+
##### Sysdig Container ID
6+
7+
- Added a new incident field- Sysdig Container ID that The Sysdig Container ID.
8+
-->
9+
##### Sysdig Agent Version
10+
11+
- Added a new incident field- Sysdig Agent Version.
12+
13+
##### Sysdig Category
14+
15+
- Added a new incident field- Sysdig Category.
16+
17+
##### Sysdig Rule Name
18+
19+
- Added a new incident field- Sysdig Rule Name.
20+
21+
##### Sysdig Event ID
22+
23+
- Added a new incident field- Sysdig Event ID.
24+
25+
##### Sysdig Severity
26+
27+
- Added a new incident field- Sysdig Severity.
28+
29+
##### Sysdig Agent ID
30+
31+
- Updated the incident field- Sysdig Agent ID to new `number` type.
32+
33+
##### Sysdig Customer ID
34+
35+
- Updated the incident field- Sysdig Customer ID to new `number` type.
36+
37+
##### Sysdig Policy
38+
39+
- Added a new incident field- Sysdig Policy.
40+
41+
#### Layouts
42+
43+
##### Sysdig Incident
44+
45+
- Updated the layout- Sysdig Incident that to include the new Sysdig Fields.
46+
47+
#### Mappers
48+
49+
##### Sysdig Mapper Runtime Event
50+
51+
- Updated the mapper- Sysdig Mapper Runtime Event to include new Sysdig incident fields.
52+
53+
<!--
54+
#### Playbooks
55+
56+
##### Sysdig Trigger System Capture
57+
58+
Added a new Example playbook on how to manage different response actions based on incident fields.
59+
60+
#### Incident Types
61+
62+
##### Sysdig Runtime Event
63+
64+
- Added a new incident type- Sysdig Runtime Event for incidents.
65+
66+
#### Integrations
67+
68+
##### Sysdig Response Actions
69+
70+
- Added a new integration- SysdigResponseActions that This is an integration that will use Sysdig agent to respond to malicious activity by triggering different actions at the host or container level like killing a container, quarantine a file or perform a system capture.
71+
72+
- Added the following commands:
73+
- ***execute-response-action***
74+
- ***create-system-capture***
75+
- ***get-capture-file***
76+
- ***get-action-execution***
77+
-->

Packs/Sysdig/pack_metadata.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
{
2-
"name": "Sysdig Response Actions",
3-
"description": "This is an integration that will use Sysdig agent to respond to malicious activity by triggering different actions at the host or container level like killing a container, quarantine a file or perform a system capture",
2+
"name": "Sysdig",
3+
"description": "Integrates with Sysdig to provide incident enrichment and response capabilities to threat events.",
44
"support": "partner",
5-
"currentVersion": "1.0.0",
5+
"currentVersion": "1.0.1",
66
"author": "Sysdig",
77
"url": "https://sysdig.com/support/",
88
"email": "[email protected]",

0 commit comments

Comments
 (0)