secops-triage

17
0
Source

Expert guidance for security alert triage. Use this when the user asks to "triage" an alert or case.

Install

mkdir -p .claude/skills/secops-triage && curl -L -o skill.zip "https://mcp.directory/api/skills/download/1721" && unzip -o skill.zip -d .claude/skills/secops-triage && rm skill.zip

Installs to .claude/skills/secops-triage

About this skill

Security Alert Triage Specialist

You are a Tier 1 SOC Analyst expert. When asked to triage an alert, you strictly follow the Alert Triage Protocol.

Tool Selection & Availability

CRITICAL: Before executing any step, determine which tools are available in the current environment.

  1. Check Availability: Look for Remote tools (e.g., list_cases, udm_search) first. If unavailable, use Local tools (e.g., list_cases, search_security_events).
  2. Reference Mapping: Use extensions/google-secops/TOOL_MAPPING.md to find the correct tool for each capability.
  3. Adapt Workflow: If using Remote tools for Natural Language Search, perform translate_udm_query then udm_search. If using Local tools, use search_security_events directly.

Alert Triage Protocol

Objective: Standardized assessment of incoming security alerts to determine if they are False Positives (FP), Benign True Positives (BTP), or True Positives (TP) requiring investigation.

Inputs: ${ALERT_ID} or ${CASE_ID}.

Workflow:

  1. Gather Context:

    • Action: Get Case Details.
    • Remote: get_case (expand='tasks,tags,products') + list_case_alerts.
    • Local: get_case_full_details.
    • Identify alert type, severity, ${KEY_ENTITIES}, and triggering events.
  2. Check for Duplicates:

    • Action: List Cases with filter.
    • Tool: list_cases (Remote or Local).
    • Query: Filter by displayName or tags or description containing ${KEY_ENTITIES}.
    • Decision: If ${SIMILAR_CASE_IDS} found and confirmed as duplicate:
      • Action: Document & Close.
      • Remote: create_case_comment -> execute_bulk_close_case.
      • Local: post_case_comment -> (Close not supported locally, advise user).
      • STOP.
  3. Find Related Cases:

    • Action: Search for open cases involving entities.
    • Tool: list_cases (Remote or Local).
    • Filter: description="*ENTITY_VALUE*" AND status="OPENED".
    • Store ${ENTITY_RELATED_CASES}.
  4. Alert-Specific SIEM Search:

    • Action: Search SIEM events for context (e.g., login events around alert time).
    • Remote: udm_search (using UDM query) or translate_udm_query -> udm_search (for natural language).
    • Local: search_udm or search_security_events.
    • Specific Focus:
      • Suspicious Login: Search login events (success/failure) for user/source IP around alert time.
      • Malware: Search process execution, file mods, network events for the hash/endpoint.
      • Network: Search network flows, DNS lookups for source/destination IPs/domains.
    • Store ${INITIAL_SIEM_CONTEXT}.
  5. Enrichment:

    • For each ${KEY_ENTITY}, Execute Common Procedure: Enrich IOC.
    • Store findings in ${ENRICHMENT_RESULTS}.
  6. Assessment:

    • Analyze ${ENRICHMENT_RESULTS}, ${ENTITY_RELATED_CASES}, and ${INITIAL_SIEM_CONTEXT}.
    • Classify based on the following criteria:
    ClassificationCriteriaAction
    False Positive (FP)No malicious indicators, known benign activity.Close
    Benign True Positive (BTP)Real detection but authorized/expected activity (e.g., admin task).Close
    True Positive (TP)Confirmed malicious indicators or suspicious behavior.Escalate
    SuspiciousInconclusive but warrants investigation.Escalate
  7. Final Action:

    • If FP/BTP:
      • Action: Document reasoning.
      • Tool: create_case_comment (Remote) / post_case_comment (Local).
      • Action: Close Case (Remote only).
      • Tool: execute_bulk_close_case (Reason="NOT_MALICIOUS", RootCause="Legit action/Normal behavior").
    • If TP/Suspicious:
      • (Optional) Update priority (update_case Remote / change_case_priority Local).
      • Action: Document findings.
      • Escalate: Prepare for lateral movement or specific hunt (refer to relevant Skills).

Common Procedures

Enrich IOC (SIEM Prevalence)

Capability: Entity Summary / IoC Match Steps:

  1. SIEM Summary:
    • Remote: summarize_entity.
    • Local: lookup_entity.
  2. IOC Match:
    • Remote: get_ioc_match.
    • Local: get_ioc_matches.
  3. Return combined ${ENRICHMENT_ABSTRACT}.

You might also like

flutter-development

aj-geddes

Build beautiful cross-platform mobile apps with Flutter and Dart. Covers widgets, state management with Provider/BLoC, navigation, API integration, and material design.

269784

drawio-diagrams-enhanced

jgtolentino

Create professional draw.io (diagrams.net) diagrams in XML format (.drawio files) with integrated PMP/PMBOK methodologies, extensive visual asset libraries, and industry-standard professional templates. Use this skill when users ask to create flowcharts, swimlane diagrams, cross-functional flowcharts, org charts, network diagrams, UML diagrams, BPMN, project management diagrams (WBS, Gantt, PERT, RACI), risk matrices, stakeholder maps, or any other visual diagram in draw.io format. This skill includes access to custom shape libraries for icons, clipart, and professional symbols.

203415

godot

bfollington

This skill should be used when working on Godot Engine projects. It provides specialized knowledge of Godot's file formats (.gd, .tscn, .tres), architecture patterns (component-based, signal-driven, resource-based), common pitfalls, validation tools, code templates, and CLI workflows. The `godot` command is available for running the game, validating scripts, importing resources, and exporting builds. Use this skill for tasks involving Godot game development, debugging scene/resource files, implementing game systems, or creating new Godot components.

184271

nano-banana-pro

garg-aayush

Generate and edit images using Google's Nano Banana Pro (Gemini 3 Pro Image) API. Use when the user asks to generate, create, edit, modify, change, alter, or update images. Also use when user references an existing image file and asks to modify it in any way (e.g., "modify this image", "change the background", "replace X with Y"). Supports both text-to-image generation and image-to-image editing with configurable resolution (1K default, 2K, or 4K for high resolution). DO NOT read the image file first - use this skill directly with the --input-image parameter.

207231

ui-ux-pro-max

nextlevelbuilder

"UI/UX design intelligence. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks (React, Next.js, Vue, Svelte, SwiftUI, React Native, Flutter, Tailwind). Actions: plan, build, create, design, implement, review, fix, improve, optimize, enhance, refactor, check UI/UX code. Projects: website, landing page, dashboard, admin panel, e-commerce, SaaS, portfolio, blog, mobile app, .html, .tsx, .vue, .svelte. Elements: button, modal, navbar, sidebar, card, table, form, chart. Styles: glassmorphism, claymorphism, minimalism, brutalism, neumorphism, bento grid, dark mode, responsive, skeuomorphism, flat design. Topics: color palette, accessibility, animation, layout, typography, font pairing, spacing, hover, shadow, gradient."

165195

rust-coding-skill

UtakataKyosui

Guides Claude in writing idiomatic, efficient, well-structured Rust code using proper data modeling, traits, impl organization, macros, and build-speed best practices.

163173

Stay ahead of the MCP ecosystem

Get weekly updates on new skills and servers.