Automation Concepts and Technologies
In this chapter you will learn:
• The role of automation technologies in modern security operations
• Best practices for employing orchestration technologies
• Best practices for building automation workflows and playbooks
• Tips for automating data enrichment at scale
No one can whistle a symphony. It takes an orchestra to play it.
—H. E. Luccock
Security processes can be tedious and repetitive. Whether you’re testing software functionality for vulnerabilities or responding to frequently occurring incidents, you’ll find a certain level of automation to be helpful, particularly for activities that do not require a great amount of analyst intervention. The goal is not to move the entire ...