Implementing SOAR techniques and recommendations
Cloud platforms are exposed to a great many security threats in the modern computing landscape. However, organizations have finite resources to respond to or protect their virtual computing environments from these risks. The traditional security approach of developing a perimeter of defenses around assets is not effective in ensuring security for a wide range of attacks. There are complexities with cloud computing that are introduced by roaming endpoints, applications owned by third parties, and a lack of transparency and control over the underlying hardware. Hence, security teams are turning to a new approach to security that involves the adoption of SOAR.
SOAR involves the convergence of three categories of security:
- Security orchestration and automation
- Threat intelligence
- Security IR
Security orchestration and automation involves the use of systems that monitor workflows and internal processes...