Responding & Remediating
IN SPYCLOUD COMPASS
Once you’ve investigated an alert, SpyCloud Compass makes it easy to take next steps – whether you’re remediating manually or integrating alert flows into your SIEM/SOAR tools.
This page outlines how to respond to alerts, escalate exposures, and automate key workflows based on risk level.
🔁 Standard Remediation Workflow
- 🕵️ Investigate the alert using metadata and selector pivots
- 📣 Notify the exposed user or responsible team (via ticket or email)
- 🔐 Remediate with password resets, MFA enforcement, or device isolation
- 🧾 Record the resolution in your ticketing system or internal tracker
- ♻️ Reassess similar alerts by domain, log_id, or password reuse
Your steps may vary slightly by source type, user role, or automation level.
🔧 Suggested Playbooks
| Scenario | Recommended Action | 
|---|---|
| Malware alert + cracked password + corp email | Immediate remediation + device isolation | 
| Third-party exposure + external domain | Triage or monitor — no action required | 
| Reused password across multiple employees | Escalate to SecOps or IAM for rotation enforcement | 
| VIP exposure + phished credentials | Notify CISO or IR lead immediately | 
| Repeated alerts tied to same log_id | Investigate campaign-level exposure | 
🤖 Automation Recommendations
You can build automated response flows with Compass alert exports or API integrations.
Suggested Automations
- If severity≥ 20 anddomain_owner_match= true → create Jira ticket
- If source_type= "malware" → isolate device via CrowdStrike API
- If password_plaintextis reused → trigger IAM workflow for rotation
- Send alert metadata to Splunk or Sentinel for enrichment and alert correlation
📎 Example Ticket Payload (JSON)
{
  "event_type": "compass_alert",
  "email": "[email protected]",
  "source_type": "malware",
  "severity": 25,
  "password_plaintext": "summer2023!",
  "malware_family": "Redline",
  "domain_owner_match": true,
  "log_id": "9ac0...123"
}🔌 Integration Targets
Compass integrates with a wide range of platforms. Use alerts as automation triggers or context enrichments across your stack:
🔍 SIEM
Send Compass alerts to:
- Splunk
- Microsoft Sentinel
- IBM QRadar
⚙️ SOAR
Trigger remediation playbooks via:
- Cortex XSOAR
- Tines
- Swimlane
🛡️ EDR
Use alert context for device isolation or tagging in:
- Microsoft Defender for Endpoint
- CrowdStrike Falcon
📝 ITSM / Ticketing
Create auto-tickets in:
- Jira
- ServiceNow
Updated 2 months ago