Many organisations today want to harness the power of automation to rid themselves of redundant and tedious tasks. Triaging alerts into incidents or initiating the overly complex process of blocking a known threat actor on the perimeter, take a lot of time, and these tasks can easily be done by an automation solution that frees up security teams’ valuable resources.
Irrespective of how complex the SOC believes a process is, any manual task can become an SLA blocker. Similarly, communicating a single task between more than one team can take up too much time and too many resources. Moreover, it’s counterproductive, because the whole idea of having cyber security in place is to ensure that we either beat the attacker to it – in an ideal world – or at least reduce the risk to a minimum. The longer this process takes, the higher the risk.
Thankfully there is a solution to this problem, we just need to know where and how to use it. Security orchestration, automation, and response (SOAR) was not built to replace any existing cyber security solutions. It is there to enhance the controls and processes built around those technologies by enabling them to collaborate automatically. The idea behind this ingenious tool is to enable cyber security practitioners to only apply their minds once, and thereafter this becomes part of an orchestrated, automatic response. This enables the team to focus on new and emerging threats and not constantly have to circle back to the legacy threats that keep rearing their ugly heads. In turn, this improves SLAs and increases the proactiveness of the organisation’s controls.
The primary, focused component of today’s next-generation SOC is SOAR, because of its ability to automatically execute a process (workflow) as well as having the necessary integration into the various solutions attached to the process. This allows SOAR to make decisions based on playbooks, which essentially reduces the mean time to respond. This is key if we consider the process an analyst needs to follow during a single incident, and how much time is spent in terms of notifying the team of the event, logging a change to block a malicious host, or executing a scan. How much easier would it be for the SOC to simply generate a feedback report instead of having to manually execute the entire incident response process?
SOAR integrates with various solutions, as mentioned before, to enable a single point of collaboration, making it easy to follow through on a fully-fledged “automated” process.
SOAR is not a SIEM (security information and event management) even though SIEM technologies today attempt to build SOAR capabilities on top of their solution. Why do I say that? Many organisations employ SIEM for its log management capabilities, as much as for its baselining ability to enhance situational awareness. However, SOAR does not solve for SIEM capability, it is merely an enhancement to SIEM, allowing the SOC to evolve from a reactive stance to a pro-active one, by adding that responsiveness to the incident management process. SIEM still remains the foundation of information and security event consolidation and equips SOAR with enough context to be able to respond effectively.
We use cookies to improve your experience, personalise content and ads, to provide social media features and to analyse our traffic.By accepting this notice, you agree to our use of cookies.
These cookies are essential for the website to function properly. They help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies. They usually set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, or filling in forms.
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in. They may be set through our site by our advertising partners. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Helps analyze site usage to improve user experience. Assists us to understand how visitors interact with the website by collecting and reporting information anonymously. These may be set by us or by third party providers whose services we have added to our pages.
Used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.