{"id":308,"date":"2019-05-17T16:18:33","date_gmt":"2019-05-17T15:18:33","guid":{"rendered":"http:\/\/18.191.143.171\/wordpress\/?p=308"},"modified":"2023-08-16T15:05:36","modified_gmt":"2023-08-16T15:05:36","slug":"soar-your-way-to-effective-orchestration-automation-and-response","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/soar-your-way-to-effective-orchestration-automation-and-response\/","title":{"rendered":"SOAR Your Way To Effective Orchestration, Automation and Response"},"content":{"rendered":"
Security Orchestration, Automation and Response (SOAR) is a familiar term to most cybersecurity professionals but despite the widespread awareness and hype, it\u2019s still relatively new to mainstream security.<\/b><\/p>\n
According to Gartner, \u201cBy 2021, 70% of deployments that are overly expensive for the value enterprise organisations with a dedicated SOC will include SOAR capabilities, up from less than 5% in 2018 and only 1% in 2017.\u201d With its ability to address some of the major challenges that security teams face today \u2013 alert overload, disparate tools, manual processes and the cybersecurity skills shortage \u2013 SOAR is undeniably a solution that enterprise security teams should be considering to assist in responding to cyber-threats across any environment.<\/p>\n
But, SOAR is not simply an opportunity to save time and cost by automating existing processes. SOAR should be considered a transformational technology that will alter the way security services are delivered. Orchestration and automation are well proven within the wider IT industry and a good SOAR product, implemented well, will deliver significant benefits to a security function and their business.<\/p>\n
Well-managed organisations implement and maintain control systems that reduce residual risk to be within their defined appetite. These control systems typically consist of people and technology performing a series of tasks in a pre-defined order to deliver a process that achieves specific outcomes.<\/p>\n
Within security it makes sense to maximise the use of technology to orchestrate and automate tasks because of the limited number of appropriately skilled people and also because people can be prone to error. Technology can also operate faster and at a larger scale, which can reduce costs as well as improve efficiency and effectiveness.<\/p>\n
However, it is important to recognise that technology cannot fully replace people. Not all tasks or processes can be codified into logic that captures all scenarios \u2013 the ability of people to apply judgement, recognise where standard process no longer applies or indeed operate without any process, cannot be replicated by technology alone. Therefore, the application of SOAR needs to be appropriate, focused and feasible to maximise value.<\/p>\n
The reality is that businesses and their IT environments are typically very complex, so deploying orchestration and automation will very quickly become complicated and deliver limited value unless managed well. Complexity results in SOAR they deliver or that ultimately fail. Successful deployments typically come from sound planning and design, and incremental implementation that proves change or, where necessary, fails fast.<\/p>\n
The tasks that SOAR might be used to execute and the scope of the ecosystem that SOAR will exist with- in should be considered prior to implementation. SOAR will be used to orchestrate and automate tasks within a complex environment where repeated tasks are per- formed to acquire intelligence and where appropriate actions are taken based on that intelligence.<\/p>\n
Moving from manually performed processes to processes that are, at least in part, executed by SOAR requires a detailed understanding of what the manual operator does. People have an incredible ability to take imperfect instruction or imperfect results during task execution and still be able to successfully complete a process. A SOAR system, like any IT system, is considerably less likely to successfully complete a task or process under these circumstances, which means that detailed analysis, design and testing must be part of successful implementation.<\/p>\n
The environment that SOAR exists within will have many different entities that contribute to intelligence acquisition or the actions that are executed based on acquired intelligence. The entities will be of many dif- ferent types including (but not limited to) people, oper- ating systems, databases and applications, and within each of these high-level types there could be distinct sub-types. To further add to this challenge, each of these entities might also have one or more interfaces, each of which could require different authentication methods, permissions and protocols for interaction.<\/p>\n
Adarma recommend a well-planned, modular approach to SOAR deployment. We would welcome the opportunity to work with you to understand your SOAR requirements.<\/p>\n","protected":false},"excerpt":{"rendered":"
Security Orchestration, Automation and Response (SOAR) is a familiar term to most cybersecurity professionals but despite the widespread awareness and hype, it\u2019s still relatively new to mainstream security. According to Gartner, \u201cBy 2021, 70% of deployments that are overly expensive for the value enterprise organisations with a dedicated SOC will include SOAR capabilities, up from […]<\/p>\n","protected":false},"author":1,"featured_media":589,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[196],"tags":[],"acf":[],"yoast_head":"\n