CHAPTER 14

Automation Concepts and Technologies

In this chapter you will learn:

•   The role of automation technologies in modern security operations

•   Best practices for employing orchestration technologies

•   Best practices for building automation workflows and playbooks

•   Tips for automating data enrichment at scale

No one can whistle a symphony. It takes an orchestra to play it.

—H. E. Luccock

Security processes can be tedious and repetitive. Whether you’re testing software functionality for vulnerabilities or responding to frequently occurring incidents, you’ll find a certain level of automation to be helpful, particularly for activities that do not require a great amount of analyst intervention. The goal is not to move the entire ...

Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.