Ransomware Host Isolation (Ransomware host isolation)
Playbook Overview
The Ransomware host isolation playbook matches the Host Isolation - Malware workflow. This playbook automatically adds the host that triggers the alert whose Alarm Type is Ransomware to a VPC security group, and SecMaster automatically blocks the outbound (access from the host to third parties) and inbound (access from third parties to the host) access. For more details about VPC security groups, see Security Group Overview.
Trigger condition: The alarm source is HSS, and the alarm type is ransomware.
You need to enable this playbook for it to take effect.
Prerequisites
- Your SecMaster professional edition is available.
- The HSS security alarm log has been connected to SecMaster, and the Auto Alert Conversion button has been enabled. For details about how to connect logs to SecMaster, see Enabling Log Access.
- You have created a model using the built-in host ransomware template and enabled the model. For details about how to create and enable a model, see Creating an Alert Model Using a Preconfigured Model Template and Managing Models, respectively.
Enabling a Playbook
- Log in to the SecMaster console.
- In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.
Figure 1 Workspace management page
- In the navigation pane on the left, choose Security Orchestration > Playbooks.
Figure 2 Accessing the Playbooks tab
- On the Playbooks page, search for the Ransomware host isolation playbook and click Enable in the Operation column of the Ransomware host isolation playbook.
- In the dialog box displayed, select the initial playbook version v1 and click OK. If the Playbook Status of the Ransomware host isolation playbook changes to Enabled, the playbook has been enabled successfully.
Implementation Effect
The Ransomware host isolation playbook automatically adds the host that triggers the alert whose Alarm Type is Ransomware to a VPC security group, and SecMaster automatically blocks the outbound (access from the host to third parties) and inbound (access from third parties to the host) access.
- If an HSS alarm whose Alarm Type is Ransomware is reported, the Ransomware host isolation playbook automatically generates a to-do task for O&M engineers to isolate the host. In the navigation pane on the left of the SecMaster workspace, choose . On the To-Dos page, you can view the task whose name is Review Server Isolation and the Associated Object is Ransomware host isolation.
- On the To-Dos page, locate the task whose name is Review Server Isolation and Associated Object is Ransomware host isolation and click Review in the Operation column. On the Playbook - Node Review pane displayed on the right, select Continue.
- If the isolation is approved, SecMaster automatically adds the host to the VPC security group. SecMaster automatically blocks the outbound (host access to third parties) and inbound (third parties access to the host) access. You can view the security group named SecMaster_One-Click_Host_Isolation in the VPC service. For details about how to view a security group, see Viewing a Security Group.
Figure 4 SecMaster_One-Click_Host_Isolation security group
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot