Throughout this book, we have provided the essential information needed for a security practitioner to better understand the general data exchange models that make up today’s security automation solutions. There are certainly those who would prefer and could provide a more technical and detailed description, and many express that they are unfamiliar with all of the acronyms and protocols and have difficulty navigating the multiple specifications. We hope that these security practitioners will be helped by this introduction to this aspect of the security automation community.
The work of building security automation is ...