Security Incident Response - Workshop Presentation
Security Incident Response - Workshop Presentation
Workshop Presentation
To help our community of ServiceNow implementers i.e. Business Process Analysts, Platform
Architects, and Technical Consultants
Across our customers, partners and internal Expert Services teams
To deliver effective workshops for gathering requirements for setting up the tool
Review the slides for any interactive animations
Hide slides you do not intend to present
Provide feedback and subscribe on Now Create content
Are we breaking any copyright laws if we use these slides?
– No. We designed this deck to be used by the entire ServiceNow ecosystem
Use Slide Master to update or remove “Partner Logo” in the footer image
Add Demo slides where needed
Workshop Kickoff
Demo
Requirement Gathering
• We’ll aim to start and finish on time • If you are comfortable, please keep • Maintain a positive atmosphere –
your Webcam on everyone’s ideas are valued
• Breaks will be taken as needed;
approximately every 1-2 hours • Please let the host know if you • Please wait for one speaker to
need to leave the workshop, via finish. Feel free to raise your
• Please return from breaks and the chat (virtual) hand if you would like to
lunch promptly; if late, please make a point
catch-up during breaks or after the • Avoid temptation to multitask while
workshop in the workshop • Discussion topics needing greater
detail will be recorded in a “Parking
• More than 3 second’s silence = Lot” for later resolution
concurrence with the point made
• Everyone’s ideas are valued
• All phones on vibrate and make
sure you mute your microphone • Have fun!
when not contributing to the
discussion
Security Incident
Response
Manage and automate the life cycle of your
security incidents from initial prioritization to
containment and resolution. Use the automated
workflows to respond quickly and consistently
and understand the trends and bottlenecks with
analytics-driven dashboards and comprehensive
reporting systems.
Goals and Use Cases
Runbook Used to create an association between published Knowledge Base Articles and
Security Incident Response Task
Workspace Collections of curated, task-based workflows which empower users to complete
their work easily and effectively
Event Observable occurrence that does not or has not yet affected the confidentiality,
integrity, or availability of ServiceNow information systems, or information
systems network but requires action
Product Integration
Detection SIEM
Orchestration
Analytics
Automation
CMDB
Vulnerabilities Threat
and Intelligenc
Misconfiguration e
s
Exploit & Solutions Intel
Logos are trademarks or registered trademarks of their respective owners and not ServiceNow
Automated security incident response process
– Security incident escalation path Domain separation enables service providers (SPs)
– Security incident SLAs
to standardize SOC (Security Operations Center)
and Security Incident Response (SIR) procedures
– Security incident process definitions across the customer base
– Security incident post-incident review
processes
Security Incident Response
Maturity model
3
Orchestrated
CAPABILITIES Security Reporting & Business Risk & Impact Reporting & Int. with Incident, Threat Sharing Automated
Incidents Dashboards Prioritization Awareness Dashboards Problem & Change Remediation
1 2 3
Create and Document Operationalize Govern
• Create a process guide/KB • Utilize Workspaces • Establish Ownership
Article
• Maintain integrations • Reporting
• Document in a Process guide
• Maintain a Healthy CMDB • Assure processes are followed
– Workflows processes
• Maintain Roles/Responsibilities • Create RACI
– Security incident response
tasks • Keep product updated to use • Meet business objectives
latest features
• Communicate the new
processes
Current state – What’s working/what’s not?
• Identify key SIR Roles • Identify groups for SIR and SIRT
User Personas • Apply Roles to Groups Assignment • Configure Assignment Rules and Escalations
• NIST Stateful, NIST Open, SANS Knowledge Base • Identify who can view and who can contribute
Process Definitions • Lifecyle for SIR and SIRT • Configure knowledge base access
Access
• Manual, Inbound Email, Service Catalog • Identify key processes that need monitoring
Record Creation • Identify key data fields for record creation SLA • Configure SLA Flow
• Identify key data points that impact the score • Identify critical reports for the dashboards by
Scoring • Configure Risk Score Calculator Dashboard persona
Configuration • Configure dashboards
Instructions:
Remove Hide
Install Plug-ins – SIR App and Workspace Slides if not
needed
Ensure that the following plugins are installed on your instance:
Security Incident Response UI (sn_app_secops_ui)
• When the Security Incident plugin is activated, the following plugins
are also activated:
• Security Incident Response
– Security Support Orchestration
• Compatibility
– Utah+
Setup Users/Group/Roles
Incident Escalations
Configure:
Criticality and Priority
Risk Score
Service Level Agreements
Security Incident Process
Definitions
Review Processes
Email Settings
Playbook Settings
Capability Configurations
Review installed Properties
Property Usage Recommendation
Default start time for all Type: string Leave as is or have
agents when no schedule is Default value: 08:00 business case to change
set, formatted as Location: Security Incident > Administration > Properties
08:00sn_si.default.start.tim
e
Default end time for all Type: string Leave as is or have
agents when no schedule is Default value: 17:00 business case to change
set, formatted as Location: Security Incident > Administration > Properties
17:00sn_si.default.end.time
Allow customization when When a problem or change is created, this property opens a pop-up window to Decision required
creating a Problem or modify the request.
Change Request from a If this properties are set to false, the problem or change request has the same
Security priority, short description, and description as the security incident without the
Incidentsn_si.popup option to add or edit those fields.
Type: true | false
Default value: true
Location: Security Incident > Administration > Properties
Calculate the Impacted Affected Services/Impacted CIs related list is generated through events. When Decision required, best
services in enabled the refresh gets executed in the background and security tags are added used if CIs are mapped to
background.sn_si.refresh_i to the incident. Set the value to true to perform the operation in background. Services.
mpacted.event Type: true | false
Default value: false
Location: Security Incident > Administration > Properties
More properties
here
Users, Groups,
and Roles
User groups and persona access
Inputs Outputs
• List of groups and users • Detailed requirements in stories
• Security access levels required • Created groups, add roles, and
add members to the group
• Current processes
• Right sized access to security
• Required Restrictions (sys admin,
incident details
incident record attributes)
Security: Roles & responsibilities discussion
Who fulfills these roles for the applications?
Management
Process
Process Owner Requester
Manager
SOC Management
Approvers SOC Managers
Responders
Security Analyst
Roles and Personas
Role Description Tasks
Security Incident Administrator • Full control over all Security Incident Users that will administer the
Response data. Also administers Territories entire application suite of
[sn_si.admin]
and Skills, as needed Security Incident and
• Security roles are only assignable by a User Vulnerability Response
with the sn_si.admin role
• Note: This role can restrict access to the
Security Incident application from the
System Administrator
Security Analyst • Creates and updates Security Incidents, Agents that will be assigned and
requests, and tasks, as well as problems, work on tasks
[sn_si.analyst] More
changes, and outages related to their
information
Incidents
• Typically assigned to tier 1 and tier 2 agents
who will work on Security Incidents
Security Basic • Creates and updates Security Incidents, Agents that will be assigned and
requests, and tasks, as well as problems, work on tasks
[sn_si.basic]
changes, and outages related to their
Incidents
• Security Basic is the underlying role for Basic
Security access
Security Manager • Has the same access as Security Agents, Users that can work/update
with the additional ability to adjust business tasks and manage Group
[sn_si.manager]
criticality calculators and view the Manager memberships
Dashboard (based on licensed PA Content)
Roles and Personas
Role Description Tasks
Read • Has read-only access to Security Incidents. Users that only need read-only
[sn_si.read] access to Security Incident
and/or Vulnerability Response.
External • Role for external users to view and work tasks Users that need read access to
assigned to them View and work response tasks
[sn_si.external]
• Note: Users with just the External role will be that are not part of your
able to view Tasks, but will be restricted from organization (e.g., Vendors).
viewing the Security Incident record
CISO • Has read and write access to Security Incidents Executive access to Dashboards More
and can view and manipulate the CISO and security incidents for review. information
[sn_si.ciso]
Dashboard.
Security Knowledge Admin • Manages, updates, and deletes information in Users that will administer and
the Security Incident Knowledge Base. maintain the Knowledge Base for
[sn_si.knowledge_admin]
Security Incident and
Vulnerability Response.
Security Incident Integration User External tools can provide new security incident System role so that integrations
[sn_si.integration_user] records and update security incident records. can create security incidents.
Assignment Groups
Review out of
box security
tags
Available security tag groups
Term Definition
Enrichment allow list/deny This group defines whether a record is to be treated as an allow list or deny list record. Allow list records are
list generally of less significance, so they can be ignored. Deny list records are generally of higher interest.
Metatag: This group is provided as demo data. You can use it to create custom classification tags that are used by
security operations applications.
Traffic Light Protocol This group is used to ensure that sensitive information is shared with the correct audience. It employs four
colors (White, Green, Amber, and Red) to indicate different degrees of sensitivity. For each color, you can
assign the appropriate read/write access roles. When sharing observables to a trusted security circle, the tag
assigned to the trusted security circle profile determines which TLP-tagged observables can be shared with the
circle, as follows:
• TLP: WHITE: Only observables with TLP: WHITE can be shared with a TLP: WHITE profile.
• TLP: GREEN: Observables with TLP: GREEN and TLP: WHITE can be shared to a TLP: GREEN profile.
• TLP: AMBER: Observables with TLP: AMBER, TLP: GREEN, and TLP: WHITE can be shared to a TLP:
AMBER profile.
• TLP: RED: All observables, regardless of their TLP tag, can be shared with a TLP: RED profile since
TLP: RED is the highest-ranked TLP tag.
Note: You can add other TLP colors, but any in addition to the four colors included are considered not valid by
the Forum for Incident Response and Security Teams
Discuss your Security Requirements
Security Analyst
[sn_si.analyst]
Security Analyst
[sn_si.analyst]
Security Basic
[sn_si.basic]
Security Manager
[sn_si.manager]
Read
[sn_si.read]
External
[sn_si.external]
Workshop Activity
Roles Mapping Exercise
Inputs Outputs
• 3rd party Sources • Integration source and related CIs
• Protocols and Triggers • Integration capabilities by 3rd
party
• CMDB Updates
• Detailed story requirements for
configuration
Product Integration
Detection SIEM
Orchestration
Analytics
Automation
CMDB
Vulnerabilities Threat
and Intelligenc
Misconfiguration e
s
Exploit & Solutions Intel
Logos are trademarks or registered trademarks of their respective owners and not ServiceNow
Integration Plugin Installs
Setup Assistant
• Select the
integration based
on Capabilities
• Download
Plugins from the
ServiceNow Store
• Install
Get Network Statistics Retrieves a list of active network connections from a Host or Endpoint
Get Running Processes Retrieves a list of running processes on a Configuration Item (CI) from a Host or Endpoint
Sightings Search Determines the presence of malicious Observables in your environment, finds any integrations that support a Sightings
Search, then executes these searches
Threat Look Up Performs threat intelligence lookups to determine whether one or more observables are associated with known security
threats
Email Search and Delete Returns the number of threat emails from an email server search and, optionally, returns details for each email found. After
the email search is completed, you can delete the emails.
Enrich CI Enrich data for configuration items associated with a security incident
Enrich Observable Allows you to enrich observables with additional information from a variety of sources using implementation workflow
Isolate Host Restricts system connections to other devices. Isolate host is executed against a configuration item (CI)
MISP Enrichment Results Enrich observables with additional information from various MISP sources during incident response investigations
*(Threat Intelligence)
Transaction
Integration Type Contacts
Estimates
Communication
Location Documentation
Direction
Process/Sequence
Integration Methods Data Mapping
Flow
Security Incident Response (SIR) Store Apps
Sample integrations with SIR
BitSight Security
Agari Phishing Defense ArcSight ESM Armis
Ratings
Enrich Observable
• Download
Plugins from the Get Network Statistics
ServiceNow Store Get Running Processes
Publish to Watchlist
Sightings Search
Threat Lookup
CMDB and Security Incident Response
Detection
Logical CIs
• Business Applications Wizard
• Application Services Driven
• Services Mail Server End
• Service Offerings User Reported Phish
Integration
Discoverable CIs
Inputs Outputs
• Review Process Definitions • Detailed story requirements for
configuration
• Select Process Definitions (NIST
Stateful, NIST Open) • Activate and/or update current
state flows
• Understand current state flow
Security Incident Process definition
Review and
Create SIR Update SIR
Close SIR
Record Record
Record
This process definition enables analysts to move from one state to another in a
sequential order without skipping any step NIST-800 based, states vary based on
current state.
NIST Analyst starts with the Draft state, then the sequential order of this process
Stateful definition is Draft>Analysis>Contain>Eradicate>Recover
(DEFAULT) The NIST Stateful process definition is unidirectional and enables analysts only
to progress only to the forward states.
This process definition enables analysts to move from one state to another, either
forward or backward. NIST-800 based flow, with states always available for easy
workflow integration
NIST Open Analyst starts with the Analysis state, then the order of the process definition can
either be Analysis>Contain>Eradicate>Recover or Analysis>Draft.
NIST Open process definition is bidirectional and enables analysts to move to the
forward or backward states depending on their requirements.
Security Incident Response States
• The following recommended state model options are available which follow generally
accepted Security Frameworks from NIST and SANS:
Draft Draft The request initiator adds information about the security incident.
Identificatio
Analysis The incident has been assigned and the issue is being analyzed.
n
The issue has been identified and the security staff is working to contain it and perform
Contain Contain damage control actions (taking servers offline, disconnecting from the Internet, verifying
that backups exist).
Eradicate Eradicate The issue has been contained and the security staff is taking steps to fix the issue.
The issue is resolved, and the operational readiness of the affected systems is being
Recover Recover
verified.
The security incident is complete, and all systems are back to normal function, however, a
Review Review
post incident review is still needed.
The incident is complete but before a security incident can be closed, you must fill out the
Closed Closed
information on the Closure Information tab.
Cancelled Cancelled The incident was cancelled.
Process Definition Selector
Inputs Outputs
• Incident creation methods • Detailed story requirements for
configuration
• Email Parsing details – Inbound
email ingestion • Configure incident creation
methods
• Current processes
• Email ingestion
• Define Security Catalog items
needed • Configure catalog items
Security Incident Creation Methods
Event
Management
Decision
Needed
Create Security Incident button is
not in Service Workspace Incident
Add or Hide the
Form
Create Security
Incident Button?
Security Incident Catalog
What variables/questions do
we need for each Catalog
Item?
Inbound Email Parsing
Setup Assistant
• Generate new security
incidents or events from
email alerts
• Integrates information
from external tools, such
as SIEMs, firewalls, and
threat intelligence
platforms
• Destination table –
Security Incident Table
User Reported Phish
• Select the
methods of
creation
• Review
integrations
capabilities
Discuss your current Security Incident
processes
What teams perform Security monitoring to detect potential
1 Security Incidents?
3 What rules for identifying emails are forwarded from your mail
server carrying user reported phishing?
Inputs Outputs
• Incident criticality and priority • Detailed story requirements for
configuration
• Score and Calculations of
Business Impact • Configure incident Severity
calculators
• Define Security Catalog items
needed • Define Risk Scores
• Configure catalog items
Incident Calculator Group
Configure the criteria that determine incident criticality and priority
• Set Priority with category and • Get user criticality • Aggregate from Severity
services Calculators
• Get user group criticality
Incident • Set priority with observables
Calculators • Critical service Changes
1 – High
2 - High 2 - High 2 – Medium
3 – Low
1 – High
3 - Moderate 3 – Medium 2 – Medium
3 – Low
Security Security
Incident Incident
Priority Severity
Security
Incident Users Business
Business Impact
Impact
Configuration Vulnerable
Item Business Risk Score Item Business
Impact Impact
Review Available Risk Scores
Field Description
Select the type of risk score
Type
you are defining.
Business
Priority Risk Score
Impact
2 - High
3-
Moderate 50
Value 2 = Weight of 60 Value 3 = Weight of 40 (60 + 40)/2 = a risk score of 50
Configuration Item Security Incident Security Incident Security Incident Users Business Vulnerable Item
Business Impact Business Impact Priority Severity Impact Business Impact
1- Most Critical 1
1 1 1 1
2
2 - Somewhat
Critical
2 3 2 2 2
3 - Less Critical
4
3 3 3 3
4 – Not Critical 5
Security
Incident
Workspace
Demo
Security Incident Response
Workspace
Workspace navigation
Inputs Outputs
• Navigational requirements • Detailed story requirements for
configuration
• UX Menu lists and categories
• Configure menus or lists
• Highlighted values
• Align current processes to new
out of box
Workspace Navigation
Home
Lists
Dashboards
Administration
Security Incident Response Workspace
Security analysts and
Toggle between
managers perform their
Lists of Opened, Response Tasks and
day-to-day operations Closed, Assigned Security Incidents
to: Security Incidents
Find team’s work and
• Complete incident Unassigned work
investigation
• Get an overview of
the security
incidents, response
tasks and SLAs
assigned to the
security analyst and
team.
Toggle between Card
• Analyst can view and list view
Triage, own,
toggle between
investigate and list view
remediate security and card view
incidents and open filtered
list in new Drill down to the
tab within Security
workspace Incident Record,
in list view
Security Incident Response Interface overview
Widgets to filter
by group,
priority, etc
Requires [sn_si.admin]
role
UX List menu configuration
Dependencies required
for enabling this
feature:
• ‘Security Incident
Response
Workspace’
(sn_si_aw)
• ‘Reporting UI
Component for
Workspace’
(sn_sec_reporting)
• ‘Rich Text Editor
Component for By default, two non-editable templates have been
bundled with this feature.
Security Operations’
(sn_escm_rte)
Report Templates
• Create new
template by
providing Name
and Description.
• Select field(s) to
include in the
report.
• Preview report
template as
PDF.
• Publish
template for
leveraging it
during report
creation.
Reports
• Create a new Report
from Security
Incident Response
record.
• Publish report.
• Download report as
needed.
Conference
Call
Integrations
Conference Call Integration
Prerequisites
Prerequisites
Prerequisites
Insights:
ServiceNow Documentation
Security
Incident
Details
Follows NIST
• Send emails Stateful
Knowledge Articles
• Document work
• Find KB Articles
• Categorize security
incidents
Security incident form recommended fields
Below are descriptions of the best practice recommended fields for the Security Incident Response Form. Utilize the form
below to detail whether to include the field in your form, and whether the field is mandatory
Field Name Description Field Name Description
Short Description A description of the Security Incident Priority Order in which to address this incident
Description Detailed description of the Security incident Business impact Importance to your business
Number Auto generated Security Incident number Risk Score The risk score as calculated
Risk score
Opened Date time that Security Incident was opened Override the automatic update
override
Draft, Analysis, Contain, Eradicate, Recover,
State Source Security control that raised the alert
Review, Closed
Pending Problem, Pending Change,
Substate Alert Sensor SIEM or another sensor
Pending Incident
Assignment
Category Security Incident Category Group responsible for working this task
Group
Sub-Category List of case state conditions Assigned To Person responsible for working this task
Configuration Configuration item affected by the Security Enforce
Check box
Item Incident Restriction
Affected User User affected by the Security Incident Secure Notes (Encrypted notes)
Location Where the caller or service is located Related Records Part of Security Operations Workspace
Requested By The person that raised the Security Incident Other Records Part of Security Operations Workspace
Security Incident Record Header
Secondary Values
under the header
are configurable
Criminal Activity/Investigation
Equipment Loss
• Lost equipment
• Stolen equipment
Security Incident Response subcategories
Malicious Code Activity
• Botnet • Rootkit
• Key logger • Worm, virus, Trojan
Malware
No Incident
• When investigation of suspicious activity finds no evidence of a Security Incident
Security Incident Response subcategories
Phishing
• Large Campaign
• Scam e-mail activity
• Spear phishing
Policy Violation
Privilege Escalation
• Active Directory Domain Admin
• Application Admin
Security Incident Response subcategories
Reconnaissance Activity
• Botnet controller
• Phishing scam web server
• Rogue file/FTP server for music, movies, pirated software etc.
Spam Source
• Spam host
• Spam relay
Security Incident Response subcategories
Un-patched Vulnerability
Unauthorized Access
Web/BBS Defacement
• Defacement of web site • Redirected web site
• Inappropriate post to BBS, wiki, blog, etc.
Workspace and record modifications
• Select the
methods of
creation
• Review
integrations
capabilities
Security
Incident
Assignment
Business Process Decisions
Business Process Description Decision
Enable/Disable Onsite Arrival Check-in for Agents
In the Draft shift report editor, the In the My shift handover notes In the Consolidated shift report, In the published state, shift analysts and
Shift Owner and Shift Analyst can editor, the Shift Owner and Shift only the Shift Owner can review owners can see a preview of the Shift
update the details of the security Analyst can update the required the Shift Handover report and Handover report with the latest updates
incidents and users. They can format details for all the sections like make the required changes. If on the Preview pane.
the report with all the options in the security incident and user details. further updates are required then
editor, like fonts, colors, bullets, links, the Shift Owner can change the After publishing the Shift Handover
and attachments. state back to ‘In Progress’ report, the Shift owner can modify the
content, but they can’t change the record
state.
Security Incident Response – Now Assist
• Trigger incident
summarization and
resolution notes
within Now Assist
panel
• Receive immediate,
relevant answers to
specific questions
about security
incidents
Now Assist for Security Operations
Subscription Required
• Get Related
Record names,
links, and
description that
provides valuable
context for
investigations.
• Analysts are
empowered with
related record
data from the
last 30 days.
Configuring Now Assist Skills for Security
Operations
SIR Standard+
Note:
• Follow KB article KB1225842 for detailed steps to follow
for Step1, 2, and 3 above.
• Follow the link for Step 4:
Enable the Microsoft teams integration.
Security Incident Record Investigation
• Associated Observables
• Configuration Items
• Affected Users
• Associated Phish Emails
• Email Search
Get Network Statistics Retrieves a list of active network connections from a Host or Endpoint
Get Running Processes Retrieves a list of running processes on a Configuration Item (CI) from a Host or Endpoint
Sightings Search Determines the presence of malicious Observables in your environment, finds any integrations that support a Sightings
Search, then executes these searches
Threat Look Up Performs threat intelligence lookups to determine whether one or more observables are associated with known security
threats
Email Search and Delete Returns the number of threat emails from an email server search and, optionally, returns details for each email found. After
the email search is completed, you can delete the emails.
Enrich CI Enrich data for configuration items associated with a security incident
Enrich Observable Allows you to enrich observables with additional information from a variety of sources using implementation workflow
Isolate Host
Restricts system connections to other devices. Isolate host is executed against a configuration item (CI)
MISP Enrichment Results Enrich observables with additional information from various MISP sources during incident response investigations
*(Threat Intelligence)
Download action
Response tasks
Work in
The assigned agent is working on the task
Progress
Closed
The task is complete
Complete
Closed
The task was closed but not work not completed
Incomplete
• Add Playbook
• Open Associated Workflow(s)
• Create Other Records
• Email
• Create Incident
• Create Change Request
• Create Problem
• Create Outage
• Calculate Severity
• Associate MITRE ATT&CK
Technique
Using the MITRE-ATT&CK framework can help your organization do the following:
• Equip Security Analysts with MITRE-ATT&CK tactics, techniques, and procedures (TTPs) to better analyze
and respond to Security Incidents
• Automate the Incident Workflows using the Playbook for detecting and containing threats in the context
of the MITRE-ATT&CK framework
• Prioritize Indicators of Compromise (IoC) and threat hunting with MITRE-ATT&CK information
• Understand the high-level security posture of your organization in the context of the MITRE-
ATT&CK framework
Discuss your Security Requirements
Horizontal This is default layout. Related list view configured for the current user
role will be rendered as Horizontal tabs
Stacked Related list view configured for the current user role will be rendered
in "Related Records" tab using content tree experience
Grouped Related lists will be categorized into groups and rendered in "Related
Records" tab using content tree experience
Related
list are on
top and
not on the
side
Stacked Related List Layout
Related
Lists are on
the side,
and the
records are
listed in a
list view
Related Lists Experience (Stacked & Grouped)
Knowledge records or
emails may be added
to the security
incident record
throughout the life of
• Link Incident, Problem, Outage and Change
the security incident records
• Knowledge Records
Email Quick Messages and Response
Templates
Within the Email form, click Quick
Messages to view the quick
messages which is displayed on the
right side of the Compose
Emails section.
Did the full system scan remediate infections associated with the
attack ?
Security Incident Templates
• Review the pre-created
templates
ServiceNow
documentation
Security Incident Response provides a rich set of Playbook resources that include a comprehensive
library of Playbooks, Sub flows, and Actions. You can create or configure Playbooks quickly and easily
without writing complicated code. You can use these Playbooks to resolve Security threats in a step-
by-step manner.
Playbook resources include the following:
Security Incident Response Playbooks Security Incident Response Playbook Action
s
The Playbooks provided with the base system are designed Complex actions that are critical for building Playbooks are
to accelerate the Security Incident investigation process by available as Action Libraries. These Action Libraries
automating complex and mundane tasks. enable Security Administrators to create Playbooks without
Playbooks are highly configurable and are built using writing any complicated code.
ServiceNow's Flow Designer technology. To configure, copy
the Playbook provided with the base system and modify it
using the simple drag-and-drop graphical interface.
Integration Use cases and Playbook templates
Confidential Data Exposure Legal Request Reset password for affected user
• Manually
• Automatically
Process Definitions
Stage
Lane/Process
Phases
When a Security Incident has transitioned to the Review state, it is possible to close it and
enter an appropriate closure code
• Investigation Completed • Invalid Vulnerability
• Threat Mitigated • Not Resolved
• Patched Vulnerability • False Positive
Post Incident Review
• Assessments
• Reports
• Assessments can be
configured to collect
critical response
information from
various teams
• Assessment results
automatically added to
Post Incident Review
• Assessment responses
are related to the
Security Incident
record
Configure Post Incident Review Assessments
The OOTB Post Incident Review configuration automatically assigns a Post Incident
assessment to the Security Incident assignee for every Security Incident
The final product of the Post Incident review is the Post Incident report. When closing the
Security Incident, a PDF of the report is created and attached to the Security Incident
Are there any situations where you do not the want the Post
1 Incident assessment automatically assigned?
Click here to view Incident: ${URI_REF} <hr/> Click here to view Incident: ${URI_REF} <hr/>
Severity: ${severity}
Category: ${category}
Category: ${category}
Comments: ${comments} Comments: ${comments}
Notification criterion
Enable creating conditional notifications – special handling notes that apply to a Security
Incident that meets a set of conditions:
• Category
• State change or dwell time
• High-value assets
• Enrichment data available
• Asset group
• Time
Discuss your current Security Incident
processes
How should a Group/User be notified if a Security Incident is
1 assigned to them?
25%
Security Incident Response SLA
Define a Service Level Agreement (SLA) for Security Incident Response
Inputs Outputs
• Existing report samples • Detailed requirements in stories
to build out a Dashboard using
• Decision to purchase
“Reports”
Performance Analytics
• Pre-configured CISO, Security
Incident Manager
Available Base Reports
This dashboard
reveals the overall
security posture of
your organization,
including security
vulnerability and
incidents
Security Operation Efficiency Dashboard
Ensure Document
data to metric
support requirement
metrics s
(Stories)
Current Security Incident Response metrics
that you track?
• Mean time to (process stage)
• Average dwell time per process stage
• Average reassignments
• Detection to Assignment
• Detection to Resolution
• False Positive rate by detecting device
• Individual handler statistics:
– Assignment to close
– Average volume by week
– Volume by severity
Security Incident Response process metrics
• Provide visibility to changes that require oversight and/or management intervention to
ensure efficiency and effectiveness of the process
• Are best represented as trend lines and tracked over time
Metric Purpose
Security
Incident
Response
Health
Resources
Now Create
3 Review stories
5
Thank you