{"id":5633,"date":"2021-09-08T13:00:00","date_gmt":"2021-09-08T13:00:00","guid":{"rendered":"http:\/\/www.sumologic.com\/blog\/how-to-implement-cyber-security-automation-in-secops-with-soar-7-simple-steps"},"modified":"2025-07-10T05:55:03","modified_gmt":"2025-07-10T13:55:03","slug":"how-to-implement-cyber-security-automation-in-secops-with-soar-7-simple-steps","status":"publish","type":"blog","link":"https:\/\/www.sumologic.com\/blog\/how-to-implement-cyber-security-automation-in-secops-with-soar-7-simple-steps","title":{"rendered":"How to implement cybersecurity automation in SecOps with SOAR (7 simple steps)"},"content":{"rendered":"\n<section class=\"e-stn e-stn-0d652506f82b000a392973813b918ee25d5b4211 e-stn--glossary-inner-content e-stn--table-of-content\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-1f7b3997080fc292474d26ff00c905d99d3520fa e-col--content-wrapper  col-sm-12 col-lg-12 col-xl-12\">\n<div class=\"e-div e-div-a1b32f66e1749758df41d5aea14f647cd10e362c e-div--card-btn-link\">\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-84e3106947e9a8b832c1ba47ed18a9ff\">When it comes to cybersecurity automation, there is the persistent fear that security automation is here to replace humans. And while those fears are somewhat justified, the reality is that automation in security operations is meant to aid, not hinder security professionals.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-15e2e0604517903c5757a44a258c45e9\">And with cyber threats evolving at a dazzling rate, cybersecurity automation is slowly becoming a necessity, rather than a luxury.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-a9df9bfe53f4bb8c308a1603502dfda2\">In this blog, we\u2019ll explain how SOCs can seamlessly incorporate security automation (in a completely safe manner) into their SecOps in 7 simple steps. Let\u2019s dive in.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-6c8afb85c8610d4c04667bbc8318a169\" id=\"the_role_of_automation_in_cybersecurity_operations?\">The role of automation in cybersecurity operations?<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-c868053e4930dcd16bec4f28a15d66d9\">The role of automation in cybersecurity operations is to ease the burden of cybersecurity organizations by automating repetitive behaviors.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e15bd8757830706e9a403d4be9504b4b\">Security automation allows security teams to automate repetitive and time-consuming tasks with the end goal of improving the workflow of SecOps and achieving better efficiency. Security automation, as a capability provided by the revolutionary technology SOAR, gives SOCs a major boost in their SecOps, offering a 10x SOC productivity and over 80% improved incident response time.&nbsp;<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-dd22b5153dc38b32a813762acbe3e945\">SOAR is a type of technology that allows organizations to replicate their security operational processes into a workflow and orchestrate different existing technologies to better identify, track and remediate cyber incidents.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-754b7f9a2e72fdddc596b02c9e92c8d6\">Analysts have a myriad of tasks and processes that they must perform, and via automation, analysts can choose which repetitive processes they want to automate and which ones they want to process manually.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-54fb25205ae1a1d2ffba43d0a72ad449\" id=\"what_is_the_difference_between_security_automation_and_orchestration_in_cloud_soar?\">What is the difference between security automation and orchestration in Cloud SOAR?<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-a6cb66dc6cd9985d056ef32155a346e0\">SOAR is an all-in-one platform that allows users to manage multiple technologies in streamlined processes thanks to playbooks.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-9efe1ec66a20b543d1227afd9a142d7d\">With Orchestration, you can activate specific actions of the other tools, and thanks to playbooks, you can connect all the tools that analysts need in specific moments. This allows them to replicate threat response processes and extract all the information an expert needs to make decisions, send notifications, and take containment actions from one convenient location.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-c7d00a661dddc62efa30bcc74d7b716a\">Automation allows for faster process deployment because analysts intervene only where there are decisions to be made. In fact,<a href=\"https:\/\/www.sumologic.com\/solutions\/cloud-soar\/\"> Cloud SOAR\u2019s<\/a> machine learning capabilities automatically identify the type of attacks, eliminate the false positives, create incidents, and activate the specific playbooks.&nbsp;<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-b3f2cbd3a2493eb856cfb08d65d7adbd\">Automation should be focused on assisting teams mainly with low-level tasks, allowing analysts to focus their time and effort on more challenging tasks (such as process governance), understanding situations, and making quick decisions based on SOAR insights.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-cfdd1b413f3abbd8de29f7ca10e4d53d\" id=\"automate_security_operations_with_soar_in_7_steps\">Automate security operations with SOAR in 7 steps<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-9b3b271389eb38af9508b77d518ad51a\">As we mentioned, the degree of automation applied in security operations is completely adjustable.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-05d29de792d7e65e8cdd635b229f874d\">In order to start automating your security operations, you just need to follow these 7 simple steps.&nbsp;<\/p>\n\n\n\n<h4 dir=\"ltr\">Step 1: Identify Standard Operating Procedures (SOPs)<\/h4>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-9b3515ae042e1287dfa3347c670f1366\">The first thing to do before starting automating security operations is to analyze the current<a href=\"https:\/\/www.dflabs.com\/resources\/blog\/how-soar-improves-standard-operating-procedures-sop\/#:~:text=Bottom%20line%2C%20SOAR%20allows%20you,to%20have%20more%20time%20to\" target=\"_blank\" rel=\"noopener\"> Standard Operating Procedures (SOPs)<\/a> within the conventional processes of the organization. Those are basically the recurring processes that include incident response and investigation.<\/p>\n\n\n\n<h4 dir=\"ltr\">Step 2: Analysis of the tools that need to be orchestrated within the processes<\/h4>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-ba189e623b0933fa7683ae983aa692f8\">The second step is to analyze the tools that need to be orchestrated within the processes to perform investigations, notifications, and corrective actions.<\/p>\n\n\n\n<h4 dir=\"ltr\">Step 3: Verify existing API connectors<\/h4>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-4c31f2d619b73b31c141bb0d77d2c878\">The third step is to verify that all API connectors identified in step two perform the individual actions and are available or developable.<\/p>\n\n\n\n<h4 dir=\"ltr\">Step 4: Create missing API connectors<\/h4>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5484d4ab5d48b33bbf457b3aabb84531\">Easily create or modify API connectors thanks to the Open Integration Framework (OIF) that allows users to extend the functionality of Cloud SOAR and integrate it into other processes.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-eed72c96c3ccf89af3453a6d4264e32b\">You can also create Daemons that proactively enhance SecOps. There are no limits on Daemons you can create, like for example, new IoCs in threat intelligent platforms or <a href=\"https:\/\/www.sumologic.com\/guides\/siem\" data-type=\"resource\" data-id=\"3026\">SIEM<\/a> alerts with higher risk.<\/p>\n\n\n\n<h4 dir=\"ltr\">Step 5: Replicate and enhance processes in graphical mode using playbook logic<\/h4>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-4fb46eb59cf10dfedb86fed4137a08b3\">In the fifth step, with playbook logic, create graphical workflows that give you control over your process and provide you with the ability to replicate and improve your processes. You can completely customize your playbooks by adding specific actions of the tools you have in your environment, but also tasks, and user choices to enrich, block, notify, escalate and contain threats.<\/p>\n\n\n\n<h4 dir=\"ltr\">Step 6: Progressive Automation<\/h4>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-36d785de22bcfb44f2155c1f9d026d4a\">Thanks to its machine learning engine, SOAR can learn the characteristics of alerts and use that knowledge to prevent cyber attacks. So, the implementation of progressive automation in SecOps has many perks. And it starts from the moment an alert is received:<\/p>\n\n\n\n<ul>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-db5744899f372c3457bf9d6d6534566d\">The alert is analyzed and identified as either a false positive or a real threat<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-ba94c6e8ed499a5744ac3bef26c9b0e2\">Real threats are automatically converted into incidents<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3a1ba68fc594aecc3d547263f8bc3b0b\">Incidents are automatically assigned to a specific group or a single analyst<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-7a0140f98651a3292f752b37b250a645\">Specific playbooks are launched, appropriate to the type of attack<\/p>\n\n\n\n<\/li>\n<\/ul>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-774ee8913131dcfb239e9851e2fada46\">In addition, when you define playbooks you can choose the type of actions you want to automate. For every single action in the SOPs (playbooks), it is essential to decide how it should be executed. In this area, we can identify three types of actions that can be inserted into a playbook:<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-420084c0347973d2a2afc2951d50fa5f\"><strong>1) Fully automated activities: <\/strong>Actions that are performed directly by SOAR without the need for human intervention. Based on experience, these kinds of activities are mainly those that include investigation and enrichment of alarms.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d3ae2411c69f304afcecd05446b89b87\"><strong>2) Semi-automatic activities: <\/strong>Actions that require the activation of an analyst. However, the action will be executed through APIs by orchestrating the appropriate technologies. The analyst has a dashboard that provides access to various tasks that he has to perform in correlation to the order of priority.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-cf8e3674a6b05b1c75e7c4958581b4b8\"><strong>3) Manual tasks:<\/strong> In this case, these are real tasks that the analyst has to do manually on multiple specific technologies. This includes actions on technologies that do not have APIs or that the analyst wants to manage without direct connection to the SOAR.<\/p>\n\n\n\n<h4 dir=\"ltr\">Step 7: Analyst training and shift of mindset<\/h4>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-19aebf38936cd67d0048c1d5a764b9ea\">Right now analysts spend a lot of their time focused on:<\/p>\n\n\n\n<ul>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d562b35f05a2f2e266625c7e776ea914\">Manual tasks<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-6cc63adcb0d7bd87162f583872e56838\">Threat investigations<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-2cb066af7e235ecf18a1a7f8a81b1365\">Enrichment<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-aa9dfc0ce1cd37d8c5945447a5b31268\">Triage of false positives<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-2fa7cfcb21b61c6d80b2241e843a4ea6\">Creating reports for many incidents<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-bc2583b87a7bfc36d9402b42f9b46bf3\">Managing a huge amount of different tasks on different platforms.<\/p>\n\n\n\n<\/li>\n<\/ul>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-bc6bebd86b4c985682cd6c828ac94d54\">Thankfully, with the helping hand of security automation, many of these tasks will be handled by SOAR, thus giving them the freedom to channel their time and effort into more challenging tasks, such as processing governance, managing escalations, and taking quick decisions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-e2e4c3df05d8eea14c8f8a3ed9abae48\" id=\"security_automation_provided_by_soar_is_completely_reliant_on_humans\">Security automation provided by SOAR is completely reliant on humans<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-31560dddd8b3209051dcce9e554799a8\">Security automation is not going to replace humans and take their jobs, because as advanced as it may be, automation will always be reliant on humans. And the best thing about cybersecurity automation is that it is completely adjustable and always under the complete supervision of security professionals.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-24f88e8a6b377013bb6eb5a9a8d5cff1\">With security automation automating many manual and repetitive tasks, analysts can focus their time on user choices and other very important tasks that have to be performed by humans.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-af4d1d5d0bd7bf37e994ebdd26baa237\">Analysts have their own SecOps Dashboard that permits them to have control of all their tasks. In addition, Cloud SOAR provides useful suggestions thanks to the Supervised Active Intelligence &#8211; SAI.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-b597a79899ddad3308c343904b1f52bf\">The SAI learns from your analysts\u2019 past responses to historical incidents and uses that knowledge to form more accurate responses to new ones. This capability drastically speeds up incident response time by applying machine learning and automation to practical workflows.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-9493161b00b2484e970c5a0c646e3542\" id=\"which_operational_processes_can_be_automated?\">Which operational processes can be automated?<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-191dd6498f529521bbf0a151692fa21f\">SOAR allows analysts to have the liberty of choosing which processes they want to automate. And, thanks to SOAR\u2019s commendable flexibility, analysts are able to automate a wide range of security operations.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-9c68baa0e35f171cec6755a43081ae5a\">For instance, let\u2019s take a trivial phishing attack. Now, in order to assess a potential phishing threat, the analyst has to perform various types of analysis before understanding whether a threat is such or not. This includes:<\/p>\n\n\n\n<ul>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-7368b56c5094dcdb9ad723dde5ca55b7\">Geolocation<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5fa23b0832bf4e0967b102e6536179ca\">IP reputation analysis&nbsp;<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3a81d4163f4eeb169ce55209fba40da8\">Retrieve information about any compromised users<\/p>\n\n\n\n<\/li>\n<li dir=\"ltr\">\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-1472232e2ce4b5460a04a9b68a6baea5\">Detonating attachments<\/p>\n\n\n\n<\/li>\n<\/ul>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-480a35d8fc78e499d2ad6c11c5292a6f\">Thanks to SOAR, these activities can be fully automated, and the analyst receives notifications and key insights that allow him to verify all the information collected in a very short time and then activate containment actions.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-96ccabcf4b9a0ad29ec703b16af90040\">So, the same procedure of assessing a phishing threat that would take the analysts a lot of time to complete can be automated in mere minutes via SOAR.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-8c10ac43864c9800116a63763f109275\" id=\"is_there_a_downside_to_cybersecurity_automation?\">Is there a downside to cybersecurity automation?<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-2eaddfb023617f263b2fbe4e4081a645\">Yes, the revolving stereotype some have about automation, thinking that it can completely replace humans in security operations.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-cc2290cd3e0ea448ccc2e122c9b43b47\">The reality is that as sophisticated as automation may be in terms of being autonomous, it still requires human instructions and navigations. Even if automation handles tasks independently, it still needs to be trained.&nbsp;<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e833fa370aaf05c87bf67deab76908d8\">Analysts with a<a href=\"https:\/\/www.dflabs.com\/resources\/blog\/what-is-soar-a-comprehensive-guide-on-how-soar-emerged-as-a-top-solution-in-the-cyber-security-world\/\" target=\"_blank\" rel=\"noopener\"> SOAR<\/a> solution can replicate threat response processes and define which functions should be automated and which shouldn\u2019t. The automation process requires human control to be optimized and tailored to the way the organization wants the automation process to be managed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-94cb9bf903a085d9d3d6a2bfa5d04f43\" id=\"conclusion\">Conclusion<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-fb4519515bf23cc7f4e9e8dfbff29036\">Whatever your opinion on security automation may be, the unequivocal reality is that automation is here to stay. Even more so since hackers are starting to use automation backed by machine learning and artificial intelligence to boost their cyber attacks. This means that the time for SOCs who haven\u2019t embraced automation yet is running out, and sooner or later, automation is going to establish itself as a mandatory capability in everyday SecOps.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3d519dc1006229fe94add6af455b53d8\">Learn more about the powers of<a href=\"https:\/\/www.dflabs.com\/resources\/blog\/soar-to-the-sky-discover-the-power-of-next-gen-progressive-automation\/\" target=\"_blank\" rel=\"noopener\"> progressive security automation<\/a> as one of the main capabilities provided by SOAR.<br><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":121,"featured_media":0,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"6","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"blog-category":[133,127],"blog-tag":[],"translation_priority":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"71176,71070,71043","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"blog-category":[133,127],"blog-tag":[],"class_list":["post-5633","blog","type-blog","status-publish","hentry","blog-category-cloud-soar","blog-category-secops-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/121"}],"version-history":[{"count":3,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5633\/revisions"}],"predecessor-version":[{"id":48225,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/5633\/revisions\/48225"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=5633"}],"wp:term":[{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-category?post=5633"},{"taxonomy":"blog-tag","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-tag?post=5633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}