Skip to content

The WA SOC Repository for the WA SOC Overwatch Service

License

Notifications You must be signed in to change notification settings

wagov/overwatch

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

WA SOC Overwatch - BETA -

WA SOC Overwatch is a live external passive monitoring service based on Shodan Monitor that the WA SOC Threat Intelligence Team uses to track for changes of key internet facing assets. The goal of this service is to detect for high risk and potential threats that are associated to the following Overwatch Factors and to share this threat intelligence to our customers:

Overwatch Factors

  • verfied compromised or malware detected services
  • unverfied compromised or malware detected services
  • exposed databases
  • iot services detection
  • restricted ports detected
  • uncommon ports detected
  • vulnerable and unverfied services
  • new service detected
  • industrial control system detected
  • internet scanner activity
  • expired ssl certifciation detected

Onboarding and Installation

Prerequisite

Azure Permissions

  • Resource Group Owner
  • Azure Sentinel Contributor

Files

As part of the beta the following files will be required.

Steps File Description
Workflow overwatch_workflow.json The webhook logic app work flow template to pull WA SOC Overwatch detection into your Azure Tenant - This flow will proceed to push the detection into a MS Sentinel Workspace
Rules sentinel_rule_v1.json The pre-made Microsft Sentinel Rule that will trigger an incident based upon a new overwatch detected

Onboarding

NOTE: This service is for WA SOC Customers only.

To get access to the WA SOC Overwatch service - Please fill in the following application form and we will provide a link with further details.

Once your onboarding application form has been approved and finalised. Proceed with the Installation Steps

Installation Steps

Workflow

  1. Deploy the Workflow template to your Azure Tenant (Azure portal login required).

    Easy Deploy

    Click on the following Deploy to Azure buttom to deploy the cusom template.

    Deploy to Azure

    Manual Deployment

    Follow the manual deployment guides

  2. Once the Template has been deployed, select the Basic Tab, and fill the following parameters to complete the deployment of the playbook.

Parameters Description
Resource Group Select a Resource Group to host the logic app
Location Select a Azure region to host the logic app
Playbook Name The name of the Logic App Playbook -- Default Name: WASOCOverwatchWorkflow
Log Analytics Connection Name The connection name of the permission field for connection the logic app to log analytics. -- Default Name: WASOCOverwatchConnection
Log Analytics Workspace ID The workspace ID of the log analytic workspace connection. Further information found here
Log Analytics Workspace Key The workspace key of the log analytic workspace connection. Further information found here
Authentication Key The authentication key to prevent unauthorised ingest from webhook endpoint.
  1. Once the parameters has been filled, proceed to Review + Create step for azure to verify the template, and once the verify is completed, then Create the finalise the Logic App Workflow.

Rules

To detect the WA SOC Overwatch events to Microsoft Sentinel. Deploy this Rule template using the guide to import rules.

NOTE: This step should be completed once a WA SOC Overwatch event has been initially ingested into the Log Analytics Workspace. Initial ingested data may take an hour or more to appear as a querable table.

Support

For any inquires about the beta - Please foward your questions to [email protected]

About

The WA SOC Repository for the WA SOC Overwatch Service

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published