What is SOAR

Published:
Translations:no translations yet

Definition

In short, it’s Security Orchestration, Automation And Response.

SOAR refers to technologies that enable organizations to collect inputs monitored by the security operations team. For example, alerts from the SIEM system and other security technologies — where incident analysis and triage can be performed by leveraging a combination of human and machine power — help define, prioritize and drive standardized incident response activities. SOAR tools allow an organization to define incident analysis and response procedures in a digital workflow format.
Gartner's glossary

Explanation

On the surface, SOAR is yet another ticket tracking system. Imagine any ticket tracking system you were using in the past. It probably had ways to create, prioritize and filter tickets. It also could change assigned persons, keep attachments and so on.

SOAR can do ticket management too.

What makes SOAR unique is the addition of several ideas.

The first idea is to rely on automation as much as possible. For example, the system can:

This is typically implemented this using rules and actions. Rules use a special language. The language allows to describe a condition for any event happening in the system. When the condition is satisfied, rule starts a pre-programmed set of actions. For example, the condition can be “new ticket is created”, actions can be “prioritize the ticket” + “assign it to a person”. Rules and actions form playbooks, which can be replayed for each new event.

Actions can be expressed in programming languages of can have a BPMN-like notation.

The second idea is to put the system in the security domain.

That means tickets are actually security incidents. The system is aware of the existence of IPs, malware, threats, vulnerabilities, and other entities common in cybersecurity. The system can manipulate those entities to enrich information in the incident and correlate it with other incidents. For example, the system can check whois information for an IP mentioned in the incident and then mark this IP as untrusted.

An incident is called “case”. It consists of multiple “alerts”.

Security incidents require a response. During response, the system can change firewall rules, remove malicious files, and so on. A response can be very simple (if the incident was false positive) or very complex (if the system needs to orchestrate dozens of systems and several departments of the company).

All of this is done to simplify life of people in security operation centers. And also life of people who pay for company’s security.

System dashboard.