Summary
Automating alert triage is a logical step in advancing your SOC environment and allows you to cover more alerts and actions. It will also lead to a faster time to detection, which will help you achieve better metrics and can make a major difference in identifying and responding to an incident. You can use the flowcharts, templates, and examples from this chapter and find others to quickly expand your SOC’s capabilities and make it more scalable.
From this chapter, you should have picked up skills on creating and implementing playbooks and will be able to immediately implement these skills in your environment to help make it more efficient.
In the next chapter, we’ll cover implementing different controls to cover for the MITRE ATT&CK framework in both your SOC environment as well as for functions of other teams, such as the network operation center (NOC), and mappings to compliance frameworks.