Book Image

Security Orchestration, Automation, and Response for Security Analysts

By : Benjamin Kovacevic
5 (1)
Book Image

Security Orchestration, Automation, and Response for Security Analysts

5 (1)
By: Benjamin Kovacevic

Overview of this book

What your journey will look like With the help of this expert-led book, you’ll become well versed with SOAR, acquire new skills, and make your organization's security posture more robust. You’ll start with a refresher on the importance of understanding cyber security, diving into why traditional tools are no longer helpful and how SOAR can help. Next, you’ll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations. You’ll also get to grips with advanced automated scenarios and explore useful tools such as Microsoft Sentinel, Splunk SOAR, and Google Chronicle SOAR. The final portion of this book will guide you through best practices and case studies that you can implement in real-world scenarios. By the end of this book, you will be able to successfully automate security tasks, overcome challenges, and stay ahead of threats.
Table of Contents (14 chapters)
1
Part 1: Intro to SOAR and Its Elements
5
Part 2: SOAR Tools and Automation Hands-On Examples

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

Advanced Threat Protection (ATP) 279

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) 27

alerts 46

Amazon Web Services (AWS) 60

anomalies 46

Application Programming Interfaces (APIs) 46

Artificial Intelligence (AI) 6, 34

auto-closing incidents, with automation rules 250

automation rule, creating 250-252

automation rule, testing 252, 253

automated false-positive incident closure, with watchlist 211

AllowedIP watchlist, querying 218-224

Entities - Get IPs action, adding to playbook 218

False stream, configuring 229

IP from incident, versus IP from watchlist 225-227

permissions, assigning to managed entity 230

playbook, creating 212

playbook, initializing 213-218

playbook, testing 231-234

trigger, adding to playbook 213-218...