Skip to main content

Google SecOps SOAR MCP server

Project description

Chronicle SecOps SOAR MCP Server

This is an MCP (Model Context Protocol) server for interacting with Google's Chronicle Security Operations SOAR suite. MCP Info

Features

Core Tools (Case Management & Entities)

  • list_cases() - Lists available cases in the SOAR platform.
  • post_case_comment(case_id, comment) - Adds a textual comment to a specific case.
  • list_alerts_by_case(case_id) - Lists all alerts associated with a specific case ID.
  • list_alert_group_identifiers_by_case(case_id) - Lists the unique group identifiers for alerts within a specific case.
  • list_events_by_alert(case_id, alert_id) - Lists the events associated with a particular alert within a given case.
  • change_case_priority(case_id, case_priority) - Modifies the priority level of a specific case.
  • get_entities_by_alert_group_identifiers(case_id, alert_group_identifiers) - Retrieves entities involved in one or more alert groups.
  • get_entity_details(entity_identifier, entity_type, entity_environment) - Fetches detailed information about a specific entity.
  • search_entity(term=None, type=None, is_suspicious=None, is_internal_asset=None, is_enriched=None, network_name=None, environment_name=None) - Searches for entities within the SOAR platform.
  • get_case_full_details(case_id) - Retrieves comprehensive details for a single case.

Dynamic Integration Tools (Marketplace)

This server can dynamically load additional tools based on integrations enabled via the --integrations command-line flag when the server is started. These tools correspond to modules found in the marketplace/ directory.

Available integrations include:

  • ServiceNow
  • CSV
  • Jira
  • Slack
  • Email
  • VirusTotal
  • Active Directory
  • Microsoft Defender ATP
  • And many more

Installing in Claude Desktop

To use this MCP server with Claude Desktop:

  1. Install Claude Desktop

  2. Open Claude Desktop and select "Settings" from the Claude menu

  3. Click on "Developer" in the lefthand bar, then click "Edit Config"

  4. Update your claude_desktop_config.json with the following configuration (replace paths with your actual paths):

    NOTE: For OSX users, if you used this one-liner to install uv, use the full path to the uv binary for the "command" value below, as uv will not be placed in the system path for Claude to use! For example: /Users/yourusername/.local/bin/uv instead of just uv.

    Additionally, for the secops-soar MCP server, you will need use the CA list bundled with the certifi package. This can be done via the following command. Change the Python minor version to match whatever version you are currently running. (ex. Python\ 3.11): /Applications/Python\ 3.12/Install\ Certificates.command

{
  "mcpServers": {
    "secops-soar": {
      "command": "uv",
      "args": [
        "--env-file=/path/to/your/env",
        "--directory",
        "/path/to/the/repo/server/secops-soar/secops_soar_mcp",
        "run",
        "server.py"
      ],
      "env": {
        "SOAR_URL": "${SOAR_URL}",
        "SOAR_APP_KEY": "${SOAR_APP_KEY}"
      },
      "disabled": false,
      "autoApprove": []
    }
  }
}

To have the MCP server provide tools for specific marketplace integrations, use the integrations flag followed by a comma-separated string of the desired integration names. For example, for the ServiceNow, CSV, and Siemplify integrations:

{
  "mcpServers": {
    "secops-soar": {
      "command": "uv",
      "args": [
        "--env-file=/path/to/your/env",
        "--directory",
        "/path/to/the/repo/server/secops-soar/secops_soar_mcp",
        "run",
        "server.py",
        "--integrations",
        "ServiceNow,CSV,Siemplify"
      ],
      "env": {
        "SOAR_URL": "${SOAR_URL}",
        "SOAR_APP_KEY": "${SOAR_APP_KEY}"
      },
      "disabled": false,
      "autoApprove": []
    }
  }
}

Environment Variable Setup

Set up these environment variables in your system:

For macOS/Linux:

export SOAR_URL="your-soar-url"
export SOAR_APP_KEY="your-soar-app-key"
export SOAR_INTEGRATIONS="ServiceNow,CSV,Siemplify"

For Windows PowerShell:

$Env:SOAR_URL = "your-soar-url"
$Env:SOAR_APP_KEY = "your-soar-app-key"
$Env:SOAR_INTEGRATIONS = "ServiceNow,CSV,Siemplify"

Requirements

  • Python 3.11+
  • SOAR URL and AppKey

License

Apache 2.0

Development

The project is structured as follows:

  • server.py: Main MCP server implementation
  • marketplace/: Directory containing integration modules

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

secops_soar_mcp-0.1.0.tar.gz (523.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

secops_soar_mcp-0.1.0-py3-none-any.whl (1.0 MB view details)

Uploaded Python 3

File details

Details for the file secops_soar_mcp-0.1.0.tar.gz.

File metadata

  • Download URL: secops_soar_mcp-0.1.0.tar.gz
  • Upload date:
  • Size: 523.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.13

File hashes

Hashes for secops_soar_mcp-0.1.0.tar.gz
Algorithm Hash digest
SHA256 d3b51ef306685b48fbdb72be409a5d3d688648d84b609f7781b1cae2b5285fc6
MD5 e010e51ec6b9ffe361fd7508bafc5dc8
BLAKE2b-256 81573868c4b90075b25b87e3a32c43ab6fc3b79e811455107971eb0ad127e656

See more details on using hashes here.

File details

Details for the file secops_soar_mcp-0.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for secops_soar_mcp-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7cdd5dc3eb8569f8e5b06f8e651219db3e25af5cb15f9b59f7b2230fdcb4a038
MD5 4b84994bdbe1d5ffa03863bc56d28160
BLAKE2b-256 4237786035b4ffdb48fecda14f2bc0b6114d05ae9ff0c7c9929a78591fa1e0f3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page