Ryan McAlister
The A4 method (Apps, Assets, Actions, and Artifacts) provides a structured framework for developing automated response capabilities within SOAR, helping you build effective, scalable, and efficient incident response workflows.
Purpose: Apps enable connectivity to external systems, defining the logic for executing actions within those systems.
Usage:
Purpose: Assets are configured instances of apps with specific connection details, enabling them to securely connect to systems.
Usage:
Purpose: Actions are the tasks SOAR can execute on assets, which are defined within the apps.
Usage:
Purpose: Artifacts are data objects related to security incidents, providing context and enabling data enrichment in response workflows.
Usage:
| Category | Example | Description | Additional Details |
|---|---|---|---|
| Apps | Proofpoint TAP | An email security integration app that allows interaction with Proofpoint’s Threat Protection API for detecting and responding to phishing attacks. | Available actions: Fetch Threat Logs, Block Sender, Isolate User. |
| Apps | SentinelOne | An endpoint protection and response app that allows managing SentinelOne’s threat intelligence and response capabilities. | Available actions: Quarantine Device, Retrieve Threat Details, Terminate Process. |
| Apps | VirusTotal | Threat intelligence platform integration for performing file and URL reputation checks. | Available actions: Enrich File Hash, Enrich URL, Scan File. |
| Assets | Proofpoint TAP - Production | A configured instance of the Proofpoint TAP app with production environment API credentials. | Base URL: https://api.proofpoint.com |
| Assets | SentinelOne - Dev | A development instance of the SentinelOne app for testing workflows securely. | Details stored securely; no sensitive information in table. |
| Assets | VirusTotal Public | A public asset for VirusTotal with limited API access for URL and file scanning. | API Key stored securely within asset configuration. |
| Actions | Block Sender | Blocks the specified sender in Proofpoint TAP, preventing further emails from the sender. | Required parameters: Sender Email Address |
| Actions | Quarantine Device | Isolates an endpoint from the network via SentinelOne, allowing further investigation. | Required parameters: Device ID |
| Actions | Enrich File Hash | Checks a file hash against VirusTotal’s database to retrieve reputation and threat intelligence. | Required parameters: File Hash |
| Artifacts | IP Address | An IP address associated with a suspicious event or incident. | Common Sources: Firewall Logs, Threat Intelligence Feeds |
| Artifacts | File Hash | A hash representing a potentially malicious file that needs analysis. | Common Sources: EDR Logs, Sandbox Analysis |
| Artifacts | URL | A URL flagged as suspicious that requires threat intelligence enrichment. | Common Sources: Web Proxy Logs, Email Gateways |