Zero Trust Security by Jason Garbis & Jerry W. Chapman
Author:Jason Garbis & Jerry W. Chapman
Language: eng
Format: epub
ISBN: 9781484267028
Publisher: Apress
Security Orchestration, Automation, and Response
SOARs are often used in conjunction with SIEMs; in fact, sometimes, theyâre provided by the same vendor as part of an integrated platform. A SOAR will consume information (and detected events, or threshold alerts) reported from a SIEM and provide a model and mechanism for automating a series of response actions, often guided by machine learning.
This is helpful, because as SOARs sift through the large number of events emitted by a SIEM, they provide a common context for events, and ultimately automate processes or workflow in response to the event. This integrated automation helps reduce the number of false positives in an environment, so that true incidents can be reviewed by security engineers.
SOARâs value is not just automation but also the modeling of the logical analysis and response flows. These workflows contain information about enterprises networks, systems, dependencies, and how to work with themâwhich is too frequently just âtribal knowledgeâ that solely exists in senior analystsâ heads. With a SOAR, this knowledge can be built into an automated, repeatable, and reliable platform, which never needs to take a day off work. This codified knowledge can (and should) elevate a SOC into a seamless integration of people, process, and technology. From a Zero Trust perspective, achieving these principles requires more than standalone technologiesâit requires integration and coordination, as well as âreachâ to effect changes across the enterprise security infrastructureâsomething that a SOAR is well suited to achieve when connected with a Zero Trust platform. In particular, SOARs help SOCs achieve their mission, by providing automation of repeatable, predictable processes. Most SOARs will recognize decision patterns and help manage the entire incident response lifecycle while also actively gathering threat intelligence, and reacting and providing context to data. Additionally, vulnerability management2 and threat intelligence are core responsibilities in a SOCâwith the SOAR providing a good workflow and incident response pattern to support these, and their results contributing to the continued growth and learning of the SOAR solution.
The analysis and actions that SIEM and SOAR provide are very important components of an effective Zero Trust systemâas additional context into and catalysts for decisions to be made by the PDP, which weâll explore further in the next section.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6821)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6819)
Running Windows Containers on AWS by Marcio Morales(6342)
Kotlin in Action by Dmitry Jemerov(5090)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5060)
Combating Crime on the Dark Web by Nearchos Nearchou(4634)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4592)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4325)
The Age of Surveillance Capitalism by Shoshana Zuboff(3979)
Python for Security and Networking - Third Edition by José Manuel Ortega(3886)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3544)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3512)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3324)
