Skip to main content

Google SecOps SOAR MCP server

Project description

Chronicle SecOps SOAR MCP Server

This is an MCP (Model Context Protocol) server for interacting with Google's Chronicle Security Operations SOAR suite. MCP Info

Features

Core Tools (Case Management & Entities)

  • list_cases() - Lists available cases in the SOAR platform.
  • post_case_comment(case_id, comment) - Adds a textual comment to a specific case.
  • list_alerts_by_case(case_id) - Lists all alerts associated with a specific case ID.
  • list_alert_group_identifiers_by_case(case_id) - Lists the unique group identifiers for alerts within a specific case.
  • list_events_by_alert(case_id, alert_id) - Lists the events associated with a particular alert within a given case.
  • change_case_priority(case_id, case_priority) - Modifies the priority level of a specific case.
  • get_entities_by_alert_group_identifiers(case_id, alert_group_identifiers) - Retrieves entities involved in one or more alert groups.
  • get_entity_details(entity_identifier, entity_type, entity_environment) - Fetches detailed information about a specific entity.
  • search_entity(term=None, type=None, is_suspicious=None, is_internal_asset=None, is_enriched=None, network_name=None, environment_name=None) - Searches for entities within the SOAR platform.
  • get_case_full_details(case_id) - Retrieves comprehensive details for a single case.

Dynamic Integration Tools (Marketplace)

This server can dynamically load additional tools based on integrations enabled via the --integrations command-line flag when the server is started. These tools correspond to modules found in the marketplace/ directory.

Available integrations include:

  • ServiceNow
  • CSV
  • Jira
  • Slack
  • Email
  • VirusTotal
  • Active Directory
  • Microsoft Defender ATP
  • And many more

Installing in Claude Desktop

To use this MCP server with Claude Desktop:

  1. Install Claude Desktop

  2. Open Claude Desktop and select "Settings" from the Claude menu

  3. Click on "Developer" in the lefthand bar, then click "Edit Config"

  4. Update your claude_desktop_config.json with the following configuration (replace paths with your actual paths):

    NOTE: For OSX users, if you used this one-liner to install uv, use the full path to the uv binary for the "command" value below, as uv will not be placed in the system path for Claude to use! For example: /Users/yourusername/.local/bin/uv instead of just uv.

    Additionally, for the secops-soar MCP server, you will need use the CA list bundled with the certifi package. This can be done via the following command. Change the Python minor version to match whatever version you are currently running. (ex. Python\ 3.11): /Applications/Python\ 3.12/Install\ Certificates.command

{
  "mcpServers": {
    "secops-soar": {
      "command": "uv",
      "args": [
        "--env-file=/path/to/your/env",
        "--directory",
        "/path/to/the/repo/server/secops-soar/secops_soar_mcp",
        "run",
        "server.py"
      ],
      "env": {
        "SOAR_URL": "${SOAR_URL}",
        "SOAR_APP_KEY": "${SOAR_APP_KEY}"
      },
      "disabled": false,
      "autoApprove": []
    }
  }
}

To have the MCP server provide tools for specific marketplace integrations, use the integrations flag followed by a comma-separated string of the desired integration names. For example, for the ServiceNow, CSV, and Siemplify integrations:

{
  "mcpServers": {
    "secops-soar": {
      "command": "uv",
      "args": [
        "--env-file=/path/to/your/env",
        "--directory",
        "/path/to/the/repo/server/secops-soar/secops_soar_mcp",
        "run",
        "server.py",
        "--integrations",
        "ServiceNow,CSV,Siemplify"
      ],
      "env": {
        "SOAR_URL": "${SOAR_URL}",
        "SOAR_APP_KEY": "${SOAR_APP_KEY}"
      },
      "disabled": false,
      "autoApprove": []
    }
  }
}

Environment Variable Setup

Set up these environment variables in your system:

For macOS/Linux:

export SOAR_URL="your-soar-url"
export SOAR_APP_KEY="your-soar-app-key"
export SOAR_INTEGRATIONS="ServiceNow,CSV,Siemplify"

For Windows PowerShell:

$Env:SOAR_URL = "your-soar-url"
$Env:SOAR_APP_KEY = "your-soar-app-key"
$Env:SOAR_INTEGRATIONS = "ServiceNow,CSV,Siemplify"

Requirements

  • Python 3.11+
  • SOAR URL and AppKey

License

Apache 2.0

Development

The project is structured as follows:

  • server.py: Main MCP server implementation
  • marketplace/: Directory containing integration modules

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

secops_soar_mcp-0.1.1.tar.gz (522.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

secops_soar_mcp-0.1.1-py3-none-any.whl (1.0 MB view details)

Uploaded Python 3

File details

Details for the file secops_soar_mcp-0.1.1.tar.gz.

File metadata

  • Download URL: secops_soar_mcp-0.1.1.tar.gz
  • Upload date:
  • Size: 522.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.13

File hashes

Hashes for secops_soar_mcp-0.1.1.tar.gz
Algorithm Hash digest
SHA256 1c49a4e100d7a80b32a73c4333694964ee4b786c4e4bb1abde980d48307efd48
MD5 d558703805af9ae633e5fdd05bfd3057
BLAKE2b-256 838bf79f08804e0c4c3d5911c31db426297fc13194125df59d150bf5bbbd45d2

See more details on using hashes here.

File details

Details for the file secops_soar_mcp-0.1.1-py3-none-any.whl.

File metadata

File hashes

Hashes for secops_soar_mcp-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 7810f7390490556767f61521794427f09d87a6a074fbfff86b575096f389c305
MD5 55beb331b517151f3f8639a70ae866f4
BLAKE2b-256 27de3f6571ca516506f8c405c2f9b9f09ba78aace9495c5951ca4ac0d484e6c2

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page