{"id":13134,"date":"2019-09-05T17:36:45","date_gmt":"2019-09-05T21:36:45","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=13134"},"modified":"2019-10-17T12:39:32","modified_gmt":"2019-10-17T16:39:32","slug":"splunk-phantom-playbook-masking","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/","title":{"rendered":"A Splunk Phantom Playbook for Masking Sensitive Data"},"content":{"rendered":"<h4><b>Introduction<\/b><\/h4>\n<p><a href=\"https:\/\/www.splunk.com\/en_us\/software\/splunk-security-orchestration-and-automation.html\"><span style=\"font-weight: 400;\">Splunk Phantom<\/span><\/a><span style=\"font-weight: 400;\"> is an orchestration, automation, and response technology for running \u201cPlaybooks\u201d to respond to various conditions. Phantom connects to Splunk Enterprise using the <\/span><i><span style=\"font-weight: 400;\">Phantom App for Splunk<\/span><\/i><span style=\"font-weight: 400;\">, so that actions can be taken on knowledge derived from data indexed in Splunk.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><span style=\"font-weight: 400;\">IRI DarkShield<\/span><\/a><span style=\"font-weight: 400;\"> is a powerful data masking package that can discover, delete, de-identify, and\/or deliver PII hidden in a wide range of unstructured data sources. In v3, a command line interface (CLI) was added, allowing third-party applications to embed or run remediation (masking) jobs configured for DarkShield, including Phantom.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is thus now possible to automate security responses to PII vulnerabilities in dark data uncovered in DarkShield PII searches. Specifically, Phantom can automatically run DarkShield to plug those holes through playbooks that used Splunk to evaluate the data that DarkShield found. Compare this to sending an alert email, described in our <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-alerts-from-splunk\/\"><span style=\"font-weight: 400;\">prior article<\/span><\/a><span style=\"font-weight: 400;\"> on using the Splunk Adaptive Response Framework with DarkShield. <\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-graphic.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13265 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-graphic.png\" alt=\"\" width=\"354\" height=\"359\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-graphic.png 354w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-graphic-296x300.png 296w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/a><\/p>\n<h4><b>Prerequisites<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Here are the underlying components used for this turnkey solution:\u00a0\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Splunk\u00ae Phantom Version 4.5+<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">IRI DarkShield Version 3.0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">IRI DarkShield CLI (included)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Splunk Enterprise Version 7.3+<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">SSH server-enabled host<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Virtualization software\u00a0 such as VMware Fusion\u00ae, VMware Fusion Pro\u00ae, VMware Workstation Player\u00ae, VMware Workstation Pro\u00ae, or Oracle\u00ae VirtualBox.<\/span><\/li>\n<\/ul>\n<h4><b>Phantom Setup<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">To start, create a Splunk Phantom account at <\/span><a href=\"https:\/\/my.phantom.us\/\"><span style=\"font-weight: 400;\">https:\/\/my.phantom.us\/<\/span><\/a><span style=\"font-weight: 400;\"> if you don\u2019t already have one. Once signed into the Phantom Community site, the Splunk Phantom Community Edition virtual appliance is available for download from the\u00a0 \u201cProducts\u201d section of the website. The virtual appliance can be utilized with a large variety of virtualization software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this example, I use Oracle VirtualBox. The Splunk Phantom virtual appliance needs to be running to access the Splunk Phantom server. Follow the instructions found on the Phantom Community site, and you should reach a point where you can see what IP the server has been set up on. Access this IP address from your web browser, and sign in to Splunk Phantom.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Splunk Phantom is a CentOS Linux virtual machine that sets up a server to host Phantom. Because of this, SSH needs to be used to run command line actions on your host machine.\u00a0<\/span><span style=\"font-weight: 400;\">While this necessitates more information to run the IRI DarkShield Remediation Playbook, it also makes the playbook more versatile. The host that holds the DarkShield CLI and<\/span> <span style=\"font-weight: 400;\">the DarkShield <\/span><i><span style=\"font-weight: 400;\">.search<\/span><\/i><span style=\"font-weight: 400;\"> file can be any machine in the world running SSH.<\/span><\/p>\n<h4><b>DarkShield CLI Setup<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The DarkShield CLI runs DarkShield externally to mask data; i.e., it allows the masking jobs to run outside the graphical development and execution environment of IRI Workbench. The CLI<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/09\/darkshield-cmd.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13268 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/darkshield-cmd.png\" alt=\"\" width=\"677\" height=\"343\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/darkshield-cmd.png 677w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/darkshield-cmd-300x152.png 300w\" sizes=\"(max-width: 677px) 100vw, 677px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Download the <\/span><a href=\"https:\/\/www.iri.com\/download\/56388e7b74750d3e64db8bb41710780c3bb5a50e\"><i><span style=\"font-weight: 400;\">DarkShield <\/span><\/i><span style=\"font-weight: 400;\">CLI<\/span><\/a><span style=\"font-weight: 400;\">, which requires a DarkShield or Voracity license to run.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once downloaded, unzip the contents of the <\/span><i><span style=\"font-weight: 400;\">darkshield.zip <\/span><\/i><span style=\"font-weight: 400;\">archive. You should have the following structure:<\/span><\/p>\n<p style=\"margin-bottom: 0px;\"><span style=\"font-weight: 400;\">darkshield\\<\/span><\/p>\n<p style=\"margin-bottom: 0px;\"><span style=\"font-weight: 400;\">\u251c\u2500\u2500 darkshield<\/span><\/p>\n<p style=\"margin-bottom: 0px;\"><span style=\"font-weight: 400;\">\u251c\u2500\u2500 darkshield.bat<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u251c\u2500\u2500 darkshield.jar<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The darkshield folder should be added to the system path so that <\/span><i><span style=\"font-weight: 400;\">darkshield <\/span><\/i><span style=\"font-weight: 400;\">can run from anywhere, such as in the DarkShield Remediation Phantom Playbook described in this article.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using the DarkShield CLI requires the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Java 8 (<\/span><a href=\"https:\/\/www.oracle.com\/technetwork\/java\/javase\/downloads\/jre8-downloads-2133155.html\"><span style=\"font-weight: 400;\">JRE<\/span><\/a><span style=\"font-weight: 400;\">) or <\/span><a href=\"https:\/\/jdk.java.net\/\"><span style=\"font-weight: 400;\">OpenJDK<\/span><\/a><span style=\"font-weight: 400;\"> 11<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Windows \/ Linux \/ Mac OS X host running on premise or in the cloud<\/span><\/li>\n<li style=\"font-weight: 400;\"><i><span style=\"font-weight: 400;\">.search\/.darkdata <\/span><\/i><span style=\"font-weight: 400;\">files (see the <\/span><a href=\"https:\/\/www.iri.com\/ftp9\/?dir=pdf\/DarkShield\"><span style=\"font-weight: 400;\">DarkShield Product Overview<\/span><\/a><span style=\"font-weight: 400;\"> booklet)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Valid DarkShield or Voracity license<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Like most IRI software, DarkShield relies on a core data processing program called <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><span style=\"font-weight: 400;\">SortCL<\/span><\/a><span style=\"font-weight: 400;\"> to, in this case, mask data. By default, DarkShield uses the $COSORT_HOME environment variable to find its bin directory and use the <\/span><i><span style=\"font-weight: 400;\">sortcl <\/span><\/i><span style=\"font-weight: 400;\">executable within. <\/span><\/p>\n<h4><b>Install and Configure the Phantom App for Splunk<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">In this case, I will be transferring data from Splunk Enterprise to Splunk Phantom. I can even speed that flow through Splunk Universal Forwarder, though Splunk Phantom supports many other data sources.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Note that the use of the word \u2018Search\u2019 in this article should be understood in each context in which it occurs. The Splunk \u2018Search\u2019 referred to above is performed subsequent to, and through DarkShield .search file data, which is produced by running the Dark Data Discovery Wizard in IRI Workbench.<\/span><\/i><span style=\"font-weight: 400;\"> The *.search file can be used with the DarkShield CLI to search for (and optionally remediate) instances of PII in unstructured file types.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You must have a Splunk account and a current instance of Splunk Enterprise or Splunk Enterprise Security in order to download\u00a0 and use the Phantom App for Splunk. Within Splunk, make sure that both the <\/span><i><span style=\"font-weight: 400;\">Phantom App for Splunk<\/span><\/i><span style=\"font-weight: 400;\"> and the <\/span><i><span style=\"font-weight: 400;\">Phantom Remote Search app<\/span><\/i><span style=\"font-weight: 400;\"> have been installed. These apps send Splunk search results to Phantom as an event.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Go to the Phantom Server configuration tab from the Phantom App for Splunk navbar to specify the server details needed to connect to your Splunk Phantom instance. This includes the IP address of the Phantom instance, and an authorization token called a ph-auth token that authorizes the connection.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Create a server, entering the IP address and ph-auth token of the Splunk Phantom instance.\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">The ph-auth token can be found by clicking on the automation user from <\/span><i><span style=\"font-weight: 400;\">administration &gt; user management &gt; users<\/span><\/i><span style=\"font-weight: 400;\"> from the Splunk Phantom menu. Copy the full Authorization Configuration for REST API from here, as shown here:<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/09\/spl-phantom-ph-auth-token.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13269 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/spl-phantom-ph-auth-token.png\" alt=\"\" width=\"646\" height=\"511\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/spl-phantom-ph-auth-token.png 759w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/spl-phantom-ph-auth-token-300x237.png 300w\" sizes=\"(max-width: 646px) 100vw, 646px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Once the Phantom Server is configured in the Phantom App for Splunk, it should be possible to test the connection. <\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/spl-enterprise-phantom-app-server-config.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-13270 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/spl-enterprise-phantom-app-server-config-1024x188.png\" alt=\"\" width=\"1024\" height=\"188\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/spl-enterprise-phantom-app-server-config-1024x188.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/spl-enterprise-phantom-app-server-config-300x55.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/spl-enterprise-phantom-app-server-config-768x141.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/spl-enterprise-phantom-app-server-config.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h4><b>Export DarkShield Search Results to Phantom via Splunk<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Phantom allows Splunk searches from Splunk Enterprise and Splunk ES (as well as many other SIEMs and sources) to be exported to Phantom. A practical use of this is to set searches that yield results only for a certain parameter, value, or threshold.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The DarkShield Remediation playbook is designed to act when a certain value or threshold of PII vulnerability as discovered in the DarkShield search process (the <\/span><i><span style=\"font-weight: 400;\">.search<\/span><\/i><span style=\"font-weight: 400;\"> file results) is reached. The playbook will run DarkShield through its CLI to mask that PII when Splunk finds a specified number of unprotected instances in the indexed results.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The source of the Splunk Search information in this case are the results of a PII scan (requiring a .search file from the Dark Data Discovery WIzard) that outputs to a .txt file which contains detailed information pertaining to instances of unprotected PII in unstructured files. This<\/span><i><span style=\"font-weight: 400;\"> .txt <\/span><\/i><span style=\"font-weight: 400;\">file can be indexed into Splunk either manually or through the Splunk Universal Forwarder.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To get this data that has been indexed into Splunk from the DarkShield .txt file into Phantom, set up a search in Splunk that will only yield results when you want a Phantom playbook to run. In this case, I am going to search through the DarkShield .txt log file to discover when the DarkShield found more than 3 instances of unprotected PII in a document (such as a PDF).<span id='easy-footnote-1-13134' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#easy-footnote-bottom-1-13134' title='Note that with this file indexed into Splunk, it would also be possible to create a search that triggers this or another playbook when new DarkShield log file entries were detected.'><sup>1<\/sup><\/a><\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Save the search as a report via the \u201cSave As\u201d dropdown. Then click o<\/span><i><span style=\"font-weight: 400;\">n Settings &gt; Searches, Reports, and Alerts<\/span><\/i><span style=\"font-weight: 400;\">. Make sure the search is stored under the Phantom App. Once the Splunk search has been saved as a report under the Phantom App, navigate to the Event Forwarding page in the Phantom App:<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/event-forwarding.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-13271 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/event-forwarding-1024x212.png\" alt=\"\" width=\"1024\" height=\"212\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/event-forwarding-1024x212.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/event-forwarding-300x62.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/event-forwarding-768x159.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/event-forwarding.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Click the green button for a \u201cNew Saved Search Export\u201d. This screen will appear:<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-edit-config.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13272 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-edit-config.png\" alt=\"\" width=\"650\" height=\"427\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-edit-config.png 778w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-edit-config-300x197.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-edit-config-768x504.png 768w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Fill out the necessary details such as name of the search, specified saved search, destination (phantom server) receiving the search, and the level of significance of the alert.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Clicking the green \u201cSave and Close\u201d button will automatically send the Splunk search results to Phantom. Clicking \u201cSave and Preview\u201d will allow you to audit which of those search result entries to send to Phantom.<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-results.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13273 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-results-1024x500.png\" alt=\"\" width=\"825\" height=\"403\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-results-1024x500.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-results-300x146.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-results-768x375.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/splunk-phantom-results.png 1600w\" sizes=\"(max-width: 825px) 100vw, 825px\" \/><\/a><\/p>\n<h4><b>Running the Playbook<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">From Splunk Phantom, playbooks such as the IRI DarkShield Remediation Playbook can be run to remedy the unprotected files that contain personally identifiable information.<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13274 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps-1024x472.png\" alt=\"\" width=\"824\" height=\"380\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps-1024x472.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps-300x138.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps-768x354.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png 1600w\" sizes=\"(max-width: 824px) 100vw, 824px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The DarkShield Remediation Playbook works by using SSH to access the machine with the <\/span><i><span style=\"font-weight: 400;\">.search<\/span><\/i><span style=\"font-weight: 400;\"> file produced by DarkShield.<\/span><\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-IRI-Run-Playbook.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13275 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-IRI-Run-Playbook.png\" alt=\"\" width=\"650\" height=\"336\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-IRI-Run-Playbook.png 749w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-IRI-Run-Playbook-300x155.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">When this playbook runs, it will prompt the user for the IP address (hostname) of the machine with the<\/span><i><span style=\"font-weight: 400;\"> .search<\/span><\/i><span style=\"font-weight: 400;\"> file on it. After that prompt is answered, other prompts will follow:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The next prompt is the username of the machine to connect to with SSH, followed by the password. The final prompt asks for the absolute file location of the .search file, so the DarkShield CLI will know which<\/span><i><span style=\"font-weight: 400;\"> .search <\/span><\/i><span style=\"font-weight: 400;\">file to execute (lest it mask the wrong files!).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After all 4 prompts have been answered by the Phantom administrator, the DarkShield CLI will launch a remediation (data masking) job on the computer specified by IP address. This should mask the entries of PII which DarkShield identified and were indexed into Splunk.<\/span><\/p>\n<h4><b>Download this Playbook<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">You can use the same IRI DarkShield Remediation Playbook I did. Download the <\/span><a href=\"https:\/\/www.iri.com\/download\/5651bdb766c44cb15d41bf1d180c529b9febcaa3\"><span style=\"font-weight: 400;\">archive here<\/span><\/a><span style=\"font-weight: 400;\">, which includes notes and the playbook. You can modify the playbook using Phantom\u2019s Python Playbook <\/span><a href=\"https:\/\/www.splunk.com\/en_us\/training\/courses\/developing-phantom-playbooks.html\"><span style=\"font-weight: 400;\">editor<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h4><b>Looking Forward<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This example presents a turnkey solution to automating the protection of sensitive information hidden in unstructured files on an event-driven basis. It takes some familiarity with the IRI DarkShield command line interface, Splunk Enterprise, and Splunk Phantom, but once built, it\u2019s something that can run for years.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is potential for integrations with other IRI products and Phantom playbooks. If certain values are detected through a regular Splunk instance after Voracity produces them &#8212; for example in customer transaction or IoT sensor data &#8212; actions can be taken. These actions can be executed remotely, which allows for smooth automation procedures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">See the article <\/span><a href=\"https:\/\/www.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\"><span style=\"font-weight: 400;\">IRI Voracity Data Munging and Masking App for Splunk <\/span><\/a><span style=\"font-weight: 400;\">\u00a0for more ideas. Contact <\/span><a href=\"mailto:info@iri.com\"><span style=\"font-weight: 400;\">info@iri.com<\/span><\/a><span style=\"font-weight: 400;\"> if you want to automate data discovery and manipulation jobs in Splunk Phantom.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Splunk Phantom is an orchestration, automation, and response technology for running \u201cPlaybooks\u201d to respond to various conditions. Phantom connects to Splunk Enterprise using the Phantom App for Splunk, so that actions can be taken on knowledge derived from data indexed in Splunk.\u00a0 IRI DarkShield is a powerful data masking package that can discover, delete,<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\" title=\"A Splunk Phantom Playbook for Masking Sensitive Data\">Read More<\/a><\/div>\n","protected":false},"author":119,"featured_media":13274,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[108,8],"tags":[1441,14,13,1388,1444,149,68,574,1445],"class_list":["post-13134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-big-data-2","category-data-protection","tag-cli","tag-data-masking","tag-data-protection-2","tag-iri-darkshield","tag-phantom","tag-pii","tag-sortcl","tag-splunk","tag-splunk-phantom"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Splunk Phantom Playbook for Masking Sensitive Data - IRI<\/title>\n<meta name=\"description\" content=\"Splunk Phantom is an orchestration, automation, and response technology for running \u201cPlaybooks\u201d to respond to various conditions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Splunk Phantom Playbook for Masking Sensitive Data\" \/>\n<meta property=\"og:description\" content=\"Splunk Phantom is an orchestration, automation, and response technology for running \u201cPlaybooks\u201d to respond to various conditions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T21:36:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-17T16:39:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"737\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Devon Kozenieski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devon Kozenieski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\"},\"author\":{\"name\":\"Devon Kozenieski\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1\"},\"headline\":\"A Splunk Phantom Playbook for Masking Sensitive Data\",\"datePublished\":\"2019-09-05T21:36:45+00:00\",\"dateModified\":\"2019-10-17T16:39:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\"},\"wordCount\":1612,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png\",\"keywords\":[\"CLI\",\"data masking\",\"data protection\",\"IRI DarkShield\",\"Phantom\",\"PII\",\"SortCL\",\"Splunk\",\"Splunk Phantom\"],\"articleSection\":[\"Big Data\",\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\",\"name\":\"A Splunk Phantom Playbook for Masking Sensitive Data - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png\",\"datePublished\":\"2019-09-05T21:36:45+00:00\",\"dateModified\":\"2019-10-17T16:39:32+00:00\",\"description\":\"Splunk Phantom is an orchestration, automation, and response technology for running \u201cPlaybooks\u201d to respond to various conditions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png\",\"width\":1600,\"height\":737},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Splunk Phantom Playbook for Masking Sensitive Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1\",\"name\":\"Devon Kozenieski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4c421588c1a85dd9a76146fe15528f7?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4c421588c1a85dd9a76146fe15528f7?s=96&d=blank&r=g\",\"caption\":\"Devon Kozenieski\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/devonk\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Splunk Phantom Playbook for Masking Sensitive Data - IRI","description":"Splunk Phantom is an orchestration, automation, and response technology for running \u201cPlaybooks\u201d to respond to various conditions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/","og_locale":"en_US","og_type":"article","og_title":"A Splunk Phantom Playbook for Masking Sensitive Data","og_description":"Splunk Phantom is an orchestration, automation, and response technology for running \u201cPlaybooks\u201d to respond to various conditions.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/","og_site_name":"IRI","article_published_time":"2019-09-05T21:36:45+00:00","article_modified_time":"2019-10-17T16:39:32+00:00","og_image":[{"width":1600,"height":737,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png","type":"image\/png"}],"author":"Devon Kozenieski","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Devon Kozenieski","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/"},"author":{"name":"Devon Kozenieski","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1"},"headline":"A Splunk Phantom Playbook for Masking Sensitive Data","datePublished":"2019-09-05T21:36:45+00:00","dateModified":"2019-10-17T16:39:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/"},"wordCount":1612,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png","keywords":["CLI","data masking","data protection","IRI DarkShield","Phantom","PII","SortCL","Splunk","Splunk Phantom"],"articleSection":["Big Data","Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/","name":"A Splunk Phantom Playbook for Masking Sensitive Data - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png","datePublished":"2019-09-05T21:36:45+00:00","dateModified":"2019-10-17T16:39:32+00:00","description":"Splunk Phantom is an orchestration, automation, and response technology for running \u201cPlaybooks\u201d to respond to various conditions.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png","width":1600,"height":737},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Splunk Phantom Playbook for Masking Sensitive Data"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1","name":"Devon Kozenieski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4c421588c1a85dd9a76146fe15528f7?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4c421588c1a85dd9a76146fe15528f7?s=96&d=blank&r=g","caption":"Devon Kozenieski"},"url":"https:\/\/www.iri.com\/blog\/author\/devonk\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/09\/Spl-Phantom-Playbook-steps.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13134"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=13134"}],"version-history":[{"count":13,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13134\/revisions"}],"predecessor-version":[{"id":13266,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13134\/revisions\/13266"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/13274"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=13134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=13134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=13134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}