Insight Type: Blog
Why SOAR is important… How is it different… How it helps your organisation

Many organisations today want to harness the power of automation to rid themselves of redundant and tedious tasks. Triaging alerts into incidents or initiating the overly complex process of blocking a known threat actor on the perimeter, take a lot of time, and these tasks can easily be done by an automation solution that frees up security teams’ valuable resources.

Irrespective of how complex the SOC believes a process is, any manual task can become an SLA blocker. Similarly, communicating a single task between more than one team can take up too much time and too many resources. Moreover, it’s counterproductive, because the whole idea of having cyber security in place is to ensure that we either beat the attacker to it – in an ideal world – or at least reduce the risk to a minimum. The longer this process takes, the higher the risk.

Thankfully there is a solution to this problem, we just need to know where and how to use it. Security orchestration, automation, and response (SOAR) was not built to replace any existing cyber security solutions. It is there to enhance the controls and processes built around those technologies by enabling them to collaborate automatically. The idea behind this ingenious tool is to enable cyber security practitioners to only apply their minds once, and thereafter this becomes part of an orchestrated, automatic response. This enables the team to focus on new and emerging threats and not constantly have to circle back to the legacy threats that keep rearing their ugly heads. In turn, this improves SLAs and increases the proactiveness of the organisation’s controls.

Now, let’s talk more about where SOAR plays its part

The primary, focused component of today’s next-generation SOC is SOAR, because of its ability to automatically execute a process (workflow) as well as having the necessary integration into the various solutions attached to the process. This allows SOAR to make decisions based on playbooks, which essentially reduces the mean time to respond. This is key if we consider the process an analyst needs to follow during a single incident, and how much time is spent in terms of notifying the team of the event, logging a change to block a malicious host, or executing a scan. How much easier would it be for the SOC to simply generate a feedback report instead of having to manually execute the entire incident response process?

SOAR integrates with various solutions, as mentioned before, to enable a single point of collaboration, making it easy to follow through on a fully-fledged “automated” process.

What is SOAR NOT?

SOAR is not a SIEM (security information and event management) even though SIEM technologies today attempt to build SOAR capabilities on top of their solution. Why do I say that? Many organisations employ SIEM for its log management capabilities, as much as for its baselining ability to enhance situational awareness. However, SOAR does not solve for SIEM capability, it is merely an enhancement to SIEM, allowing the SOC to evolve from a reactive stance to a pro-active one, by adding that responsiveness to the incident management process. SIEM still remains the foundation of information and security event consolidation and equips SOAR with enough context to be able to respond effectively.

Share Articles

Insights

News Centre

Media Type
Why SOAR is important… How is it different… How it helps your org...
How a Security Operations Centre Enhances Your Security Awareness...
In today’s digital landscape, organisations face a constant barrage of cyber threats that can disrupt operations, compromise sensitive data, and damage reputations. To safeguard against these risks, businesses em...
Artificial Intelligence in The Security Operations Center (SOC): ...
In today’s rapidly evolving digital landscape, businesses face constant threats from cybercriminals seeking to exploit vulnerabilities in their systems. As organisations strive to protect their sensitive data and...
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability...
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, a...
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability...
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, a...
Maidar Secure Advisory: 0‑days exploit Vulnerability CVE‑2023‑419...
Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0‑day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is us...
Hope is not a security strategy. Get proactive about your defence today with Maidar Secure.