SOAR A4 Methodology

Ryan McAlister

The A4 method (Apps, Assets, Actions, and Artifacts) provides a structured framework for developing automated response capabilities within SOAR, helping you build effective, scalable, and efficient incident response workflows.

1. Apps

Purpose: Apps enable connectivity to external systems, defining the logic for executing actions within those systems.

Usage:

2. Assets

Purpose: Assets are configured instances of apps with specific connection details, enabling them to securely connect to systems.

Usage:

3. Actions

Purpose: Actions are the tasks SOAR can execute on assets, which are defined within the apps.

Usage:

4. Artifacts

Purpose: Artifacts are data objects related to security incidents, providing context and enabling data enrichment in response workflows.

Usage:

A4 Methodology Example

Category Example Description Additional Details
Apps Proofpoint TAP An email security integration app that allows interaction with Proofpoint’s Threat Protection API for detecting and responding to phishing attacks. Available actions: Fetch Threat Logs, Block Sender, Isolate User.
Apps SentinelOne An endpoint protection and response app that allows managing SentinelOne’s threat intelligence and response capabilities. Available actions: Quarantine Device, Retrieve Threat Details, Terminate Process.
Apps VirusTotal Threat intelligence platform integration for performing file and URL reputation checks. Available actions: Enrich File Hash, Enrich URL, Scan File.
Assets Proofpoint TAP - Production A configured instance of the Proofpoint TAP app with production environment API credentials. Base URL: https://api.proofpoint.com
Assets SentinelOne - Dev A development instance of the SentinelOne app for testing workflows securely. Details stored securely; no sensitive information in table.
Assets VirusTotal Public A public asset for VirusTotal with limited API access for URL and file scanning. API Key stored securely within asset configuration.
Actions Block Sender Blocks the specified sender in Proofpoint TAP, preventing further emails from the sender. Required parameters: Sender Email Address
Actions Quarantine Device Isolates an endpoint from the network via SentinelOne, allowing further investigation. Required parameters: Device ID
Actions Enrich File Hash Checks a file hash against VirusTotal’s database to retrieve reputation and threat intelligence. Required parameters: File Hash
Artifacts IP Address An IP address associated with a suspicious event or incident. Common Sources: Firewall Logs, Threat Intelligence Feeds
Artifacts File Hash A hash representing a potentially malicious file that needs analysis. Common Sources: EDR Logs, Sandbox Analysis
Artifacts URL A URL flagged as suspicious that requires threat intelligence enrichment. Common Sources: Web Proxy Logs, Email Gateways