Elevate your security posture and operational efficiency with bespoke automation solutions designed by Kocho. We specialize in crafting and implementing security workflows that integrate seamlessly with your existing environment, particularly leveraging Azure Logic Apps and Azure Functions.
Our custom automation services focus on streamlining critical security tasks, allowing your team to respond faster and more consistently to threats. Examples of security workflows we build include:
We believe in a partnership approach. Our experts work closely with your team to understand your specific security challenges and operational needs. We then design and build robust automation solutions, primarily using:
This combination provides flexibility and power, ensuring the automation fits your exact requirements.
Below is a conceptual representation of a Logic App we might build to automatically create a "Block" indicator in Microsoft Defender for Endpoint when triggered by a new security incident (e.g., from Microsoft Sentinel).
// This Logic App is triggered by an HTTP request (e.g., from Sentinel) // It receives incident details and the indicator to block. // Action: HTTP POST to Microsoft Defender API { "inputs": { "uri": "https://api.securitycenter.windows.com/api/indicators", "method": "POST", "headers": { "Content-Type": "application/json" }, "body": { "action": "AlertAndBlock", "application": "Created by: Sentinel Playbook", "description": "Blocked from Incident ID: @{triggerBody()?['incidentNo']}", "expirationTime": "@{addDays(utcNow(), 90)}", // Block for 90 days "indicatorType": "@{triggerBody()?['artifactType']}", // e.g., "IpAddress", "Url" "indicatorValue": "@{triggerBody()?['indicatorValue']}", // The actual IP or URL "severity": "Informational", "title": "Block: @{triggerBody()?['indicatorValue']} (Incident: @{triggerBody()?['incidentNo']})" }, "authentication": { // Uses Managed Identity for secure authentication "audience": "https://api.securitycenter.windows.com", "type": "ManagedServiceIdentity" } } } // The Logic App then checks the response and can notify or log the outcome.
This snippet illustrates the core action of the Logic App defined in your example.json
. The full Logic App includes triggers, parsing, and conditional responses.
Lumina acts as the crucial user interface for these powerful automations, bringing notifications, approval requests, and status updates directly into your Microsoft Teams environment. This ensures your security team can make informed decisions and take action swiftly, right where they collaborate.
Here's how Kocho SOC, Lumina, and our custom automation work together to respond to a threat (e.g., a malicious IP 123.45.67.89
). Click the buttons to navigate the flow:
An alert is triggered (e.g., from Microsoft Sentinel). The Kocho Security Operations Center (SOC) first investigates and validates the alert. We ensure it's a true positive and warrants action before initiating any automated response or requesting client approval. This crucial human validation step prevents unnecessary actions and ensures accuracy.
123.45.67.89
... Confirmed malicious activity. Preparing for client notification and action."
Following an alert (e.g., from Microsoft Sentinel), Lumina posts an interactive card to Microsoft Teams, requesting approval from the SOC to block the malicious IP 123.45.67.89
.
123.45.67.89
123.45.67.89
communicating with SRV-FIN-01
.Upon approval via the Lumina card, Lumina triggers a pre-configured Azure Logic App. This Logic App takes the malicious IP and automatically creates a 'Deny' rule on your Azure Firewall.
// Action: Create or Update Azure Firewall Rule { "inputs": { "host": { "connection": { "name": "@parameters('$connections')['azurefirewall']['connectionId']" } }, "method": "put", "body": { "properties": { "priority": 150, // Example priority "action": { "type": "Deny" }, "rules": [ { "name": "Block_Malicious_IP_@{triggerBody()?['ipAddress']}", "protocols": [ "Any" ], "sourceAddresses": [ "@{triggerBody()?['ipAddress']}" ], "destinationAddresses": [ "*" ], // Or specific internal ranges "destinationPorts": [ "*" ] } ] } }, "path": "/subscriptions/@{appsetting('AzureSubscriptionId')}/resourceGroups/@{appsetting('FirewallResourceGroup')}/providers/Microsoft.Network/azureFirewalls/@{appsetting('AzureFirewallName')}/networkRuleCollections/AutomatedBlocks_Lumina?api-version=2023-05-01" } }
Once the firewall rule is successfully applied, the Logic App notifies Lumina. The original card in Teams is updated (or a new card is posted) confirming that the IP has been blocked, who approved it, and when the action was completed.
123.45.67.89
BlockedTo complement these automation workflows, we also design and build custom Microsoft Sentinel Workbooks. These interactive dashboards provide clear visibility into the performance and outcomes of your security automations, track key metrics, and help you demonstrate the value of your automated security operations.
Partner with Kocho to transform your security operations with intelligent, bespoke automation.