Security Orchestration, Automation and Response (SOAR) provided by Cloud Threat Detection and Response (CTDR) is a comprehensive security solution that orchestrates and connects different systems and services based on specific logic. This solution supports automated operations for security alerts and incidents, helping enterprises strengthen their security defense capabilities and improve response efficiency to security incidents.
Background
Security experts often face labor-intensive tasks, such as conducting security reviews and handling trojans and mining programs. Even with a strong understanding of the internal environment and attacker behavior, these routine operations prevent them from focusing on critical activities like network defense and security research.
SOAR automates and streamlines daily security routines, accelerating response times to security incidents. By reducing tedious tasks, it enables security experts to concentrate on combating advanced persistent threats (APTs). Daily processes can be documented as clear, executable standards in SOAR, providing best practices for others.
Terms
Before you start using SOAR, you must understand the related terminology. The following table introduces these terms.
Term | Description |
playbook |
|
process |
|
component |
|
resource instance | A resource instance is a resource of an external service. Take the MySQL component as an example. An enterprise may use multiple MySQL databases. You must decide the database to which you want to connect when you use the MySQL component. |
action | An action is a type of capability provided by a component. Each component can have multiple actions. For example, the terminal management component supports actions such as disabling accounts, isolating networks, and sending notifications. |