June 11, 2019 By Anup Deb 3 min read

The cybersecurity landscape has evolved over time, and in the quest to stay ahead, organizations are embracing security orchestration, automation and response (SOAR) to bring unprecedented speed, enhanced visibility and refined processes to the incident response function.

The paradigm shift prompted by the increasing complexity of attack vectors, the volume and severity of attacks, the growing cyber skills shortage and intensifying global regulatory demands has necessitated the adoption of SOAR technologies across the security operations center (SOC). To keep up with today’s threat landscape, security leaders and service providers must build the foundation of response technologies into their environments and workflows to address the needs of their customers.

Security Operations: Then and Now

Most organizations’ reaction to these increasing challenges has been to invest in multiple security tools. In the early ’90s, it was all about protection within the perimeter, so investments across the network, firewall, intrusion detection system (IDS) and antiviruses was common. The early 2000s witnessed the exponential growth of the internet and compliance around Sarbanes-Oxley and Payment Card Industry (PCI) security standards, which originally drove the adoption of security information and event management (SIEM).

While traditional log source collection from network, firewall, endpoints and other sources is still critical for threat detection, today’s threat landscape has brought about the emergence of flow data, threat intelligence, user behavior analytics, machine learning and artificial intelligence (AI) to provide security operations teams with real-time alerts.

What Is SOAR, and What Does It Do?

As defined by Gartner, SOAR is a method of connecting disparate security technologies that enables a coordinated process workflow combining orchestration, automation, threat intelligence, and human and machine learning to accelerate, standardize and shorten incident response processes. In other words, implementing a SOAR platform can help organizations significantly improve their overall security posture.

Speed, agility and decisive actions are key to any response process. Due to widespread digital transformation across the workplace, the attack surface has expanded exponentially. Since SOAR operates real time, metrics such as mean time to detect (MTTD) and mean time to respond (MTTR) enable security managers to measure SOC productivity by integrating with existing security tools. By setting the platform to automate repetitive tasks, security leaders can do more with less, empowering analysts to respond to complex attacks and focus on strategic tasks instead of slogging through false positives and low-priority alerts. Most importantly, SOAR can help alleviate overworked and understaffed security teams with the ability to apply machine learning to threat investigations and guided response.

Applying the OODA Loop Strategy to Incident Response

When implementing SOAR into their security infrastructure, many organizations turn to tried-and-true military techniques and principles as a foundation for their strategy. One such concept is called the OODA loop, a feedback cycle that stands for observe, orient, decide and act.

In the cybersecurity world, the OODA loop is used as a potent methodology to combat advanced threats by understanding the organization’s environment, gathering relevant information, translating that data into meaningful and actionable insights, devising a set of decisions and, finally, acting on the decisions to combat threats. Therefore, the design and architecture of the SOAR platform must be deployed on the fundamental principles of the OODA loop. Otherwise, the organization risks lagging behind in incident response maturity due to manual and inconsistent processes and lack of coordination.

Within the context of an OODA-inspired defense strategy, a SOAR platform helps make incident response processes repeatable and consistent and escalation of incidents simplified and seamless. It also provides analysts with a comprehensive set of tasks in the form of a guided response. Enriched insights from threat intelligence feeds and AI-based tools enable organizations to identify, contain, remediate and eradicate threats faster than adversaries can compromise enterprise data.

Another critical aspect of SOAR is the analyst’s ability to coordinate across various stakeholders and relevant departments, increasing the speed to respond. A SOAR platform also enables analysts to simulate environments with a blend of cyberthreats and cyber espionage use cases with an objective to test a cyberattack scenario where people, process and technology are well-orchestrated and prepared in advance of a potential breach. It’s no wonder this holistic approach has gained momentum over the past few years as organizations look to improve their incident response capabilities and mitigate risks long-term.

What Can a SOAR Platform Do For You?

The adoption of security orchestration, automation and response platforms will continue to scale new heights and the technology will further entrench itself in the SOC environment given its ability to combine people, process and technology, deliver instantly actionable security alerts, and provide the insights, context and sophistication needed to combat cyberthreats and build cyber resilience. A well-calibrated cyber resilience program also encompasses the adoption of detection, response and recovery frameworks.

With this level of contextual insight and actionable data, a SOAR platform can help refine threat data and provide intelligent feedback to the rules and use cases by which the organization calibrates its detection tools, helping SOC teams respond faster and more effectively manage today’s increasingly complex attacks.

Learn more about incident response and orchestration

More from Incident Response

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

Why federal agencies need a mission-centered cyber response

4 min read - Cybersecurity continues to be a top focus for government agencies with new cybersecurity requirements. Threats in recent years have crossed from the digital world to the physical and even involved critical infrastructure, such as the cyberattack on SolarWinds and the Colonial Pipeline ransomware attack. According to the IBM Cost of a Data Breach 2023 Report, a breach in the public sector, which includes government agencies, is up to $2.6 million from $2.07 million in 2022. Government agencies need to move…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today