4.7 Explain the importance of automation and orchestration related to secure operations Flashcards
1
Q
Automation and Orchestration General Concepts
A
- Automation - Executes tasks without manual effort
- Orchestration - Coordinates multiple automated tasks for a smooth workflow
-
SOAR (Security Orchestration, Automation, and Response)
- Purpose: Orchestrates and automates runbooks, enriches data
- Example: SIEM and SOAR integration for enhanced security
-
Playbook - Checklist of actions for detecting/responding to incidents
- Role: Guides incident response
- Example: Steps for phishing response
-
Runbook - Automated playbook with defined human interaction points
- Role: Executes automated tasks with analyst decision points
- Example: Automated incident response with analyst input
2
Q
When to Automate and Orchestrate
A
Decision Factors for Automation and Orchestration
-
Complexity:
- Use automation for routine tasks (e.g., backups); orchestration for complex workflows
-
Cost:
- Conduct cost-benefit analysis (consider development, implementation, maintenance)
-
Single Points of Failure:
- Use backup systems or manual processes to mitigate failures
- Ensure redundancy and failover mechanisms (technical/manual) for uninterrupted operations
- Technical Debt:
-
Ongoing Supportability:
- Systems need maintenance and adaptation
3
Q
Benefits of Automation and Orchestration
A
- Increased Efficiency and Time Savings
-
Enforcement of Baselines
- Establishes standardized configurations and policies
-
Implementation of Standard Infrastructure Configurations
- Creates and enforces standardized setups across systems
- Detects deviations and triggers corrective actions automatically
-
Secure Scaling
- Scales IT infrastructure securely as organizations grow
- Adjusts resources (e.g., VMs, network resources) dynamically, with security protocols in place
-
Increased Employee Retention
- Boosts job satisfaction and minimizes burnout, improving retention rates
- Faster Reaction Times
-
Workforce Multiplier
- Expands team capabilities, allowing smaller teams to handle complex infrastructures
4
Q
Automating Security
A
Involves configuring guardrails, security groups, service access management, and permissions
Ways to Automate Security
-
Implementing Guardrails
- Automated safety controls against insecure configurations
- Monitors infrastructure, detects security violations, and performs corrective actions
-
Managing Security Groups
- Automates instance assignment to security groups and adjusts settings to meet threats
- Analyzes traffic for unauthorized access attempts
-
Enabling and Disabling Services and Access
- Automates service access management to prevent unnecessary risks
- Regular reviews of access, monitoring for unusual activity
- Restricts or disables access if suspicious activity detected
- Enables/disables services on schedule for efficiency
-
Automating Permissions Management
- Uses Role-based Access Controls (RBAC) for permissions
- Automates provisioning and de-provisioning of access rights
- Regularly checks permissions to ensure policy compliance
- Adjusts settings to maintain security over time