That is a lot of information to take in. Also, we have made many assumptions about the scenario. But if this spurs you into thinking about combining the various logs of your devices and servers into one central location and enabling automated alerting and defenses, we have done our job well.Â
As this chapter demonstrates, security automation is a bit like plumbing. As long as we can understand how a bunch of disparate systems can be made to communicate together, we can add them to our playbooks. In many cases, Ansible will already have a module in place for us to use and get going.Â
Now that we have whet your appetite for logging and attack detection, in the next chapter, let's dive into what it takes to set up an automated web security testing setup. We will pick the incredibly powerful and versatile OWASP ZAP scanner and intercepting proxy and use it to...