4.7 Explain the importance of automation and orchestration related to secure operations Flashcards

1
Q

Automation and Orchestration General Concepts

A
  • Automation - Executes tasks without manual effort
  • Orchestration - Coordinates multiple automated tasks for a smooth workflow
  • SOAR (Security Orchestration, Automation, and Response)
    • Purpose: Orchestrates and automates runbooks, enriches data
    • Example: SIEM and SOAR integration for enhanced security
  • Playbook - Checklist of actions for detecting/responding to incidents
    • Role: Guides incident response
    • Example: Steps for phishing response
  • Runbook - Automated playbook with defined human interaction points
    • Role: Executes automated tasks with analyst decision points
    • Example: Automated incident response with analyst input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When to Automate and Orchestrate

A

Decision Factors for Automation and Orchestration

  • Complexity:
    • Use automation for routine tasks (e.g., backups); orchestration for complex workflows
  • Cost:
    • Conduct cost-benefit analysis (consider development, implementation, maintenance)
  • Single Points of Failure:
    • Use backup systems or manual processes to mitigate failures
    • Ensure redundancy and failover mechanisms (technical/manual) for uninterrupted operations
  • Technical Debt:
  • Ongoing Supportability:
    • Systems need maintenance and adaptation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Benefits of Automation and Orchestration

A
  • Increased Efficiency and Time Savings
  • Enforcement of Baselines
    • Establishes standardized configurations and policies
  • Implementation of Standard Infrastructure Configurations
    • Creates and enforces standardized setups across systems
    • Detects deviations and triggers corrective actions automatically
  • Secure Scaling
    • Scales IT infrastructure securely as organizations grow
    • Adjusts resources (e.g., VMs, network resources) dynamically, with security protocols in place
  • Increased Employee Retention
    • Boosts job satisfaction and minimizes burnout, improving retention rates
  • Faster Reaction Times
  • Workforce Multiplier
    • Expands team capabilities, allowing smaller teams to handle complex infrastructures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Automating Security

A

Involves configuring guardrails, security groups, service access management, and permissions

Ways to Automate Security

  • Implementing Guardrails
    • Automated safety controls against insecure configurations
    • Monitors infrastructure, detects security violations, and performs corrective actions
  • Managing Security Groups
    • Automates instance assignment to security groups and adjusts settings to meet threats
    • Analyzes traffic for unauthorized access attempts
  • Enabling and Disabling Services and Access
    • Automates service access management to prevent unnecessary risks
    • Regular reviews of access, monitoring for unusual activity
    • Restricts or disables access if suspicious activity detected
    • Enables/disables services on schedule for efficiency
  • Automating Permissions Management
    • Uses Role-based Access Controls (RBAC) for permissions
    • Automates provisioning and de-provisioning of access rights
    • Regularly checks permissions to ensure policy compliance
    • Adjusts settings to maintain security over time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly