CHAPTER 14
Automation Concepts and Technologies
In this chapter you will learn:
• The role of automation technologies in modern security operations
• Best practices for employing orchestration technologies
• Best practices for building automation workflows and playbooks
• Tips for automating data enrichment at scale
No one can whistle a symphony. It takes an orchestra to play it.
—H. E. Luccock
Security processes can be tedious and repetitive. Whether you’re testing software functionality for vulnerabilities or responding to frequently occurring incidents, you’ll find a certain level of automation to be helpful, particularly for activities that do not require a great amount of analyst intervention. The goal is not to move the entire ...
Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.