Incident Response
When an incident occurs, security teams need to move fast—triaging alerts, understanding the scope of the attack, and uncovering how it unfolded. Whether you're responding to a live threat or conducting post-incident forensic analysis, access to timely and relevant intelligence is critical.
Google Threat Intelligence (Google TI) helps teams go beyond surface-level investigation. By combining curated frontline intelligence, vast crowd sourced data, and global infrastructure visibility, Google TI enables analysts to triage efficiently, pivot across related indicators, and reconstruct the full picture of an attack—all within a single platform.
How Google TI Helps During Incident Response
Google TI supports every phase of incident response, from initial triage to post-incident action:
Investigation & Triage
- Pivot from a single IoC (file hash, domain, IP, or URL) to discover related infrastructure and campaigns.
- Visualize relationships between indicators using the interactive Threat Graph.
- Access intelligence on malware families, threat actors, and campaign reports.
- Use YARA rules and Retrohunt to discover files across the dataset that exhibit similar structure or behavior to known malware.
- Map TTPs observed in the incident to better understand attacker behavior.
- Correlate with exploited CVEs using vulnerability intelligence to prioritize remediation.
Operationalizing Intelligence
- Feed high-confidence IoCs into SIEM, SOAR, and EDR tools to block ongoing activity.
- Update detection rules and blocklists across firewalls, proxies, DNS, etc.
- Use findings to guide threat hunting and detect similar activity in your environment.
- Improve policies and controls based on observed attacker TTPs and infrastructure.
Use Cases
From a Phishing Email to Uncovering a Targeted Campaign
An employee reports a suspicious email. Your goal: analyze the attachment to uncover whether it’s part of a larger campaign—and if so, who’s behind it.
How to do it
|
Updated about 13 hours ago