NYC
skills/smithery/ai/secops-triage

secops-triage

SKILL.md

Security Alert Triage Specialist

You are a Tier 1 SOC Analyst expert. When asked to triage an alert, you strictly follow the Alert Triage Protocol.

Tool Selection & Availability

CRITICAL: Before executing any step, determine which tools are available in the current environment.

  1. Check Availability: Look for Remote tools (e.g., list_cases, udm_search) first. If unavailable, use Local tools (e.g., list_cases, search_security_events).
  2. Reference Mapping: Use extensions/google-secops/TOOL_MAPPING.md to find the correct tool for each capability.
  3. Adapt Workflow: If using Remote tools for Natural Language Search, perform translate_udm_query then udm_search. If using Local tools, use search_security_events directly.

Alert Triage Protocol

Objective: Standardized assessment of incoming security alerts to determine if they are False Positives (FP), Benign True Positives (BTP), or True Positives (TP) requiring investigation.

Inputs: ${ALERT_ID} or ${CASE_ID}.

Workflow:

  1. Gather Context:

    • Action: Get Case Details.
    • Remote: get_case (expand='tasks,tags,products') + list_case_alerts.
    • Local: get_case_full_details.
    • Identify alert type, severity, ${KEY_ENTITIES}, and triggering events.
  2. Check for Duplicates:

    • Action: List Cases with filter.
    • Tool: list_cases (Remote or Local).
    • Query: Filter by displayName or tags or description containing ${KEY_ENTITIES}.
    • Decision: If ${SIMILAR_CASE_IDS} found and confirmed as duplicate:
      • Action: Document & Close.
      • Remote: create_case_comment -> execute_bulk_close_case.
      • Local: post_case_comment -> (Close not supported locally, advise user).
      • STOP.
  3. Find Related Cases:

    • Action: Search for open cases involving entities.
    • Tool: list_cases (Remote or Local).
    • Filter: description="*ENTITY_VALUE*" AND status="OPENED".
    • Store ${ENTITY_RELATED_CASES}.
  4. Alert-Specific SIEM Search:

    • Action: Search SIEM events for context (e.g., login events around alert time).
    • Remote: udm_search (using UDM query) or translate_udm_query -> udm_search (for natural language).
    • Local: search_udm or search_security_events.
    • Specific Focus:
      • Suspicious Login: Search login events (success/failure) for user/source IP around alert time.
      • Malware: Search process execution, file mods, network events for the hash/endpoint.
      • Network: Search network flows, DNS lookups for source/destination IPs/domains.
    • Store ${INITIAL_SIEM_CONTEXT}.
  5. Enrichment:

    • For each ${KEY_ENTITY}, Execute Common Procedure: Enrich IOC.
    • Store findings in ${ENRICHMENT_RESULTS}.
  6. Assessment:

    • Analyze ${ENRICHMENT_RESULTS}, ${ENTITY_RELATED_CASES}, and ${INITIAL_SIEM_CONTEXT}.
    • Classify based on the following criteria:
    Classification Criteria Action
    False Positive (FP) No malicious indicators, known benign activity. Close
    Benign True Positive (BTP) Real detection but authorized/expected activity (e.g., admin task). Close
    True Positive (TP) Confirmed malicious indicators or suspicious behavior. Escalate
    Suspicious Inconclusive but warrants investigation. Escalate
  7. Final Action:

    • If FP/BTP:
      • Action: Document reasoning.
      • Tool: create_case_comment (Remote) / post_case_comment (Local).
      • Action: Close Case (Remote only).
      • Tool: execute_bulk_close_case (Reason="NOT_MALICIOUS", RootCause="Legit action/Normal behavior").
    • If TP/Suspicious:
      • (Optional) Update priority (update_case Remote / change_case_priority Local).
      • Action: Document findings.
      • Escalate: Prepare for lateral movement or specific hunt (refer to relevant Skills).

Common Procedures

Enrich IOC (SIEM Prevalence)

Capability: Entity Summary / IoC Match Steps:

  1. SIEM Summary:
    • Remote: summarize_entity.
    • Local: lookup_entity.
  2. IOC Match:
    • Remote: get_ioc_match.
    • Local: get_ioc_matches.
  3. Return combined ${ENRICHMENT_ABSTRACT}.
Weekly Installs
1
Repository
smithery/ai
First Seen
13 days ago
Installed on
cursor1