ZaunDocs

SOAR / Incident Response

Integration setup guides for SOAR and incident response platforms.

Connect your SOAR and incident response tools to Zaun for automated workflows, case management, and threat orchestration.

Cyware

Category: CTIX / Threat Intelligence & Orchestration | Auth: API Key

Required Credentials

FieldDescription
Access IDFrom CTIX settings
Secret KeyPaired with Access ID
CTIX Endpoint URLYour instance URL

Capabilities

ModuleDescription
CTIXQuery threat data using Cyware Query Language (CQL), retrieve IOCs by type
OrchestrateList, view, and create security events with time and source filters
CSAPList and view alerts from Cyware Situational Awareness Platform

Setup Steps

  1. Settings > General Settings > API Credentials.
  2. Click Generate Open API Credentials. Copy Access ID and Secret Key.
  3. Paste Access ID, Secret Key, and endpoint URL into Zaun.

DFIR-IRIS

Category: Incident Response Platform | Auth: API Key

Required Credentials

FieldDescription
IRIS Server URLYour IRIS instance base URL
API KeyBearer token from user profile

Auth: Authorization: Bearer <key>

Capabilities

FeatureDescription
Case ManagementFull case lifecycle: create, update, search, manage notes and timeline events
IOC TrackingAdd, update, and search indicators of compromise
Assets & EvidenceManage case assets, evidence items, and file datastore
TasksCreate and assign investigation tasks within cases

Zaun connects to 160+ DFIR-IRIS API endpoints for comprehensive case management.

Setup Steps

  1. Create a dedicated service account in DFIR-IRIS.
  2. Log in > My Settings > API Key > generate and copy the key.
  3. Paste with the server URL into Zaun.

Expel Workbench

Category: MDR & Security Operations | Auth: API Key

Required Credentials

FieldDescription
API KeyFrom a Service Account (no expiration, no MFA needed)

Auth: Authorization: Bearer <key>. Uses JSON:API format with filtering, includes, and pagination.

Capabilities

FeatureDescription
AlertsList, view, and track alert history timelines
InvestigationsSearch, view, update status and ownership of investigations
Findings & ThreatsAccess security findings, threat actors, and linked evidence
Event SearchSearch raw security events across connected devices

Setup Steps

  1. In Workbench > Organization Settings > Service Accounts.
  2. Create a service account, assign analyst role (read-only is sufficient for monitoring).
  3. Generate an API key. Copy and paste into Zaun.

Swimlane

Category: Security Orchestration & Automation | Auth: PAT

Required Credentials

FieldDescription
Swimlane URLYour Turbine instance URL
Personal Access TokenPAT from Swimlane Turbine

For Turbine deployments, tokens are created via POST /auth/token/create. Classic Swimlane uses POST /api/user/login.

Capabilities

FeatureDescription
App DiscoveryEnumerate applications and their field mappings
RecordsCreate, read, update records by tracking ID or record ID
CommentsAdd and update comments on records
SearchKeyword-based search across records

Setup Steps

  1. Create a service account in Swimlane Turbine with appropriate app-level permissions.
  2. Generate a Personal Access Token (PAT) for the service account.
  3. Paste URL and PAT into Zaun.