Summary
In this chapter, you learned about the concept of integration and orchestration using different solutions known as SOAR, as well as the components needed to optimize and streamline IR processes.
You analyzed a use case of an IR of a suspicious communication from a device on the network to command and control (C2) on the internet.
You learned how to set up a SOAR environment, integrating the Security Onion (monitoring), TheHive (IR), n8n (workflows), and Velociraptor (artifacts collection, digital forensics, and investigation) open source tools.
You also learned how to escalate security incidents from alerts generated in a SOC and how to open a case from the IR platform to initiate the IR and investigation process.
In the next chapter, you will learn about detection engineering concepts and how to apply different analytics in IR to proactively uncover malicious behavior.