Fully Integrated Defense Operation (FIDO) – Automated Incident Response

Keep on Guard!


FIDO is an orchestration layer which enables an automated incident response process by evaluating, assessing and responding to malware. FIDO’s primary purpose is to handle the heavy manual effort needed to evaluate threats coming from today’s security stack and the large number of alerts generated by them.

FIDO - Automated Incident Response

As an orchestration platform FIDO can make using your existing security tools more efficient and accurate by heavily reducing the manual effort needed to detect, notify and respond to attacks against a network.

Fully Integrated Defense Operation (FIDO) plays a important role in the defense of the Netflix corporate network. The premise of FIDO is simple… each year companies are receiving an ever increasing amount of security related alerts. Instead of hiring more analyst to comb through the endless stream of alerts we automate the analysis to combat the barrage of information.

Simply put, they integrate and then automate the manual human processes by codifying the logic and process used by threat analysts to provide consistent and reliable results. And by making the code configurable you can customize the categorization, scoring and results of FIDO to accommodate a companies needs.

Detection Support

It supports various sources for detection such as:

  • Carbon Black
  • Cyphort
  • ProtectWise
  • SentinelOne
  • Palo Alto
  • Bit9
  • FireEye MPS/MAS
  • Sourcefire
  • Sophos
  • Bro
  • Snort

FIDO Architecture

The below describes in the 9 steps FIDO takes upon receiving an alert from a detector. These are high-level definitions.

  • Detectors – The initial trigger to create a FIDO event.
  • Host Discovery and Detection – Finding out what is being the source IP in each event/alert.
  • Data Sources – Active Directory, LANDesk etc.
  • Threat Feeds – VirusTotal, ThreatGRID & AlienVault.
  • Event Correlation – Cross verification across end-points + prevention tools.
  • Scoring – Threat feeds + detectors + historical info + posture + asset value.
  • Enforcement – Currently work in progress (disable accounts, reset passwords, kill NIC etc).
  • Notification and Storage – Conversion of detector alerts into readable info.
  • Update Detectors – Import data into detectors that missed the threat.

You can download FIDO here:

FIDO-master.zip

Or read more here.

Learn about Countermeasures



Posted in: Countermeasures, Hacking News, Security Software

Latest Posts:


AWSBucketDump - AWS S3 Security Scanning Tool AWSBucketDump – AWS S3 Security Scanning Tool
AWSBucketDump is an AWS S3 Security Scanning Tool, which allows you to quickly enumerate AWS S3 buckets to look for interesting or confidential files.
nbtscan Download - NetBIOS Scanner For Windows & Linux nbtscan Download – NetBIOS Scanner For Windows & Linux
nbtscan is a command-line NetBIOS scanner for Windows that is SUPER fast, it scans for open NetBIOS nameservers on a local or remote TCP/IP network.
Equifax Data Breach - Hack Due To Missed Apache Patch Equifax Data Breach – Hack Due To Missed Apache Patch
The Equifax data breach is pretty huge with 143 million records leaked from the hack in the US alone with unknown more in Canada and the UK.
Seth - RDP Man In The Middle Attack Tool Seth – RDP Man In The Middle Attack Tool
Seth is an RDP Man In The Middle attack tool written in Python to MiTM RDP connections by attempting to downgrade the connection to extract clear text creds
dcrawl - Web Crawler For Unique Domains dcrawl – Web Crawler For Unique Domains
dcrawl is a simple, but smart, multithreaded web crawler for randomly gathering huge lists of unique domain names. It will branch out indefinitely.
Time Warner Hacked - AWS Config Exposes 4M Subscribers Time Warner Hacked – AWS Config Exposes 4M Subscribers
What's the latest on the web, Time Warner Hacked is what it's about now as a bad AWS S3 config (once again) exposes the details of approximately 4M subs.


Comments are closed.