{"id":6303,"date":"2022-08-02T12:18:31","date_gmt":"2022-08-02T16:18:31","guid":{"rendered":"https:\/\/ptp.cloud\/?p=6303"},"modified":"2024-06-03T02:59:56","modified_gmt":"2024-06-03T06:59:56","slug":"soar-based-security-monitoring","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/","title":{"rendered":"SOAR based Security Monitoring"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;2px|||||&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.25.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]\n<p><a href=\"https:\/\/www.linkedin.com\/in\/richard-hauke-492bab1\/\"><em>By: Rich Hauke, CISSP<\/em><\/a><\/p>\n<p>Security vendors are everywhere, coming out of the woodwork. \u00a0A fast growing segment of IT will yield significant investment from VCs looking to identify a rising star that has an angle on data protection that will be valuable to the market. \u00a0The volume of products and services and the overlap can be overwhelming. \u00a0The reality is many products and services can be valuable if implemented correctly, and many can fall short of expectations without the proper investment in people and process to run them. \u00a0Enter PTP&#8217;s SOC Services powered by SOAR.<\/p>\n<p>PTP has built a Security Orchestration Automation and Response (SOAR) platform compiled a set of tools for threat detection and response. \u00a0Our SOAR platform yields immense value at a highly competitive cost which is critical to our customers who are growing and lack significant budgets for data security and security monitoring. \u00a0Our recipe follows the <a href=\"https:\/\/www.nist.gov\">NIST<\/a> framework focusing and the segments of Identify, Protect, Detect, Respond and Recover. \u00a0This discussion will focus on the platform used by PTP for &#8220;Detect&#8221; and how we gather data from our customers&#8217; data protection tools and systems and analyze that data to make intelligent decisions on risks for breach.<\/p>\n<h4><\/h4>\n<h4>Logs, Parsing, Rules, ML &amp; Alerting<\/h4>\n<p>SIEMs (Security Information and Event Management) have been around for quite a while. \u00a0Early versions of SIEMs were created in large part to address log management and storage requirements from the Payment Card Industry Data Security Standards (PCI DSS). \u00a0These systems could parse logs from servers, firewalls and other devices and could provide retention of those logs, reporting of what was retained, and with some struggle, they could allow Security Operations Center (SOC) teams to search the logs. \u00a0Newer versions, or Next Generation SIEMs, have improved the parsing of disparate logs, include faster databases for searching, archive older logs and have included rule sets and machine learning (ML) for the correlation of logs and the evaluation of indicators of compromise (IOCs). \u00a0PTP leverages <a href=\"https:\/\/www.fluencysecurity.com\">Fluency Security<\/a> for our SIEM platform for a number of significant reasons that include: parsing ability, threat hunting, speed of searches, extensive rule set for ML, ability for API integration and working relationship with Fluency leadership. \u00a0The image below outlines the workflow of Fluency from receipt of logs and data from datasources through it&#8217;s process of making decisions on events becoming security incidents.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-6305\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-1024x724.jpg\" alt=\"\" width=\"1024\" height=\"724\" srcset=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-1024x724.jpg 1024w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-300x212.jpg 300w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-768x543.jpg 768w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-1536x1086.jpg 1536w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-2048x1448.jpg 2048w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-610x431.jpg 610w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-400x284.jpg 400w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-1080x764.jpg 1080w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-1280x905.jpg 1280w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-980x693.jpg 980w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-480x340.jpg 480w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-25x18.jpg 25w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-36x25.jpg 36w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-48x34.jpg 48w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h4>Making the SIEM Part of a SOAR<\/h4>\n<p>PTP\u2019s SOAR (Security Orchestration Automation and Response) implementation consists of a select group of tools and technologies. PTP leverages the platform along with our people and processes to assist in incident investigations, automate incident response and remediation, and provide our security analyst with a single point of visibility for events, threat intelligence and sharing.<\/p>\n<p>The SOAR environment is utilized to reduce repetitive actions, automate analysis, and provide the correlation of observables across the PTP customer environments. It is a core platform that helps the SOC respond to incidents by providing standardization of data types, tagging of findings, and analysis of observations.<\/p>\n<p>The environment consists of four highly integrated platforms depicted below.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-6310\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR-1024x765.png\" alt=\"\" width=\"1024\" height=\"765\" srcset=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR-980x733.png 980w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR-480x359.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<p>&nbsp;<\/p>\n<h5>The Hive<\/h5>\n<p>The Hive is a Security Incident Response Platform (SIRP). A system whose purpose is to assist incident responders with investigations and to make data readily available for analysis. The Hive is the integration point with PTP&#8217;s ISTM (ConnectWise) to communicate updates and status information between the SIRP and the ticketing system.<\/p>\n<h5>Cortex<\/h5>\n<p>Cortex is an analysis and active response engine. This process engine performs the heavy lifting when analysis of observables or handling of responders is required. Cortex comes with a base of over a hundred analyzers that can be applied to observable data covering a wide range of indicator types.<\/p>\n<h5>MISP<\/h5>\n<p>MISP is a Threat Intelligence Platform (TIP). This platform is used world-wide for sharing, storing, and correlating cyber security indicators across the security intelligence community. It is utilized to standardize the communication of these indicators and provide a key framework for communicating that information.<\/p>\n<h5>Shuffle<\/h5>\n<p>Shuffle is an automation and response platform. Shuffle bridges the gap between the components above and disparate systems, applications, and code. It provides an interface with APIs, a modular coding environment, and workflow for automation of actions, responses, and scheduling of repetitive tasks.<\/p>\n<h5>Process Integration<\/h5>\n<p>The main interface for the SOAR environment is through The Hive. User access requires a client VPN connection to the AWS VPC containing the SOAR components. The interface is browser-based and integrated with SSO for authorization and authentication.<\/p>\n<p>When a Fluency alert is generated, the PeakPlus integration backend will create a ticket in ConnectWise and a corresponding case in The Hive that is prepopulated with data from the event. This helps accelerate the incident investigation and populates the case with standard types of data. SOC personnel are then free to begin running automations and data gathering tasks on the data, follow the deep link into Fluency to the triggering alert, and add other data or observations to the case as it progresses.<\/p>\n<p>&nbsp;<\/p>\n<h4>PTP SOAR In Action<\/h4>\n<p>Once an incident ticket is created, it is immediately apparent if any of the data correlates to other cases in the system and the status of those cases. \u00a0See below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-6319 aligncenter\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/Fig1-SOAR-Case-view-1024x602.png\" alt=\"\" width=\"1024\" height=\"602\" srcset=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/Fig1-SOAR-Case-view-980x576.png 980w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/Fig1-SOAR-Case-view-480x282.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Next, the list of related incidents can be expanded immediately to see exactly what observation details match with the current case to assist in handling of the ticket.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6312 aligncenter\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/observation-details.png\" alt=\"\" width=\"818\" height=\"398\" srcset=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/observation-details.png 818w, https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/observation-details-480x234.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 818px, 100vw\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>As seen in these images, tagging is heavily utilized to make sense of the data by pulling things together and increasing the visibility of important factors. The power of this feature combined with workflow automation is very apparent when dealing with lists of IP addresses from incident investigations. The data in the image below represents the results of triggering the automated tasks against a list of addresses. This workflow completed 24 searches against disparate sources for each IP address in the list within a couple of minutes and provides highly visible feedback to the analyst about them.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.linkedin.com\/in\/richard-hauke-492bab1\/\"><em><img loading=\"lazy\" decoding=\"async\" width=\"830\" height=\"370\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/workflow.png\" alt=\"\" class=\"size-medium alignnone\" \/><\/em><\/a><\/p>\n<p>While the Hive is the main interface and most visible part of the environment, Cortex is tightly integrated with it to perform the heavy lifting. All the automation performed for the workflows is handed off to Cortex for processing and analysis. The results are then handed back to The Hive for collation, tagging, and tracking.<\/p>\n<p>Both components communicate with MISP. MISP is used because &#8220;nobody knows everything, but everyone knows something&#8221;. MISP contains the current state of public knowledge about the world of security at large and is used to mine that data for IOCs. Our MISP is currently monitoring 47 data feeds covering 56 Galaxies (large data-object clusters) and 127 data taxonomies (namespaces). It encompasses data sets from such things as blocklists and Tor exit nodes, telemetry data on active APT groups, and malware indicators. These feeds are curated to reduce overlap and cast as wide a net as possible.<\/p>\n<p>&nbsp;<\/p>\n<h4>Summary<\/h4>\n<p>Security monitoring is about finding the needle in the haystack. \u00a0Effective protection tools block the majority of activity, but it is the covert behavior that can cause the greatest harm, with malware sitting dormant in an environment until it is time for it to act. \u00a0The combination of intelligent tools architected together in PTP&#8217;s SOAR environment allows the platform to sift through the massive volumes of event data and present to the security analyst those high risk items that require further investigation, and when doing so, determine if those activities are present in other monitored customer environment.<\/p>\n<p>Want to take our services for a test drive? \u00a0Click <a href=\"https:\/\/ptp.cloud\/xdr-and-soc-services-original\/\">HERE<\/a> for information on a FREE Proof of Concept!<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Rich Hauke, CISSP, discusses the comprehensive SOAR platform implemented by PTP for effective security monitoring and incident response. By leveraging advanced tools like Fluency Security for SIEM, The Hive, Cortex, MISP, and Shuffle, PTP&#8217;s platform offers robust threat detection, automated incident response, and extensive data correlation to protect customer environments. The platform follows the NIST framework and integrates seamlessly to provide a unified security monitoring solution.<\/p>\n","protected":false},"author":2,"featured_media":6310,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<em>By: Rich Hauke, CISSP<\/em>\r\n\r\nSecurity vendors are everywhere, coming out of the woodwork. \u00a0A fast growing segment of IT will yield significant investment from VCs looking to identify a rising star that has an angle on data protection that will be valuable to the market. \u00a0The volume of products and services and the overlap can be overwhelming. \u00a0The reality is many products and services can be valuable if implemented correctly, and many can fall short of expectations without the proper investment in people and process to run them. \u00a0Enter PTP's SOC Services powered by SOAR.\r\n\r\nPTP has built a Security Orchestration Automation and Response (SOAR) platform compiled a set of tools for threat detection and response. \u00a0Our SOAR platform yields immense value at a highly competitive cost which is critical to our customers who are growing and lack significant budgets for data security and security monitoring. \u00a0Our recipe follows the <a href=\"https:\/\/www.nist.gov\">NIST<\/a> framework focusing and the segments of Identify, Protect, Detect, Respond and Recover. \u00a0This discussion will focus on the platform used by PTP for \"Detect\" and how we gather data from our customers' data protection tools and systems and analyze that data to make intelligent decisions on risks for breach.\r\n<h4><\/h4>\r\n<h4>Logs, Parsing, Rules, ML & Alerting<\/h4>\r\nSIEMs (Security Information and Event Management) have been around for quite a while. \u00a0Early versions of SIEMs were created in large part to address log management and storage requirements from the Payment Card Industry Data Security Standards (PCI DSS). \u00a0These systems could parse logs from servers, firewalls and other devices and could provide retention of those logs, reporting of what was retained, and with some struggle, they could allow Security Operations Center (SOC) teams to search the logs. \u00a0Newer versions, or Next Generation SIEMs, have improved the parsing of disparate logs, include faster databases for searching, archive older logs and have included rule sets and machine learning (ML) for the correlation of logs and the evaluation of indicators of compromise (IOCs). \u00a0PTP leverages <a href=\"https:\/\/www.fluencysecurity.com\">Fluency Security<\/a> for our SIEM platform for a number of significant reasons that include: parsing ability, threat hunting, speed of searches, extensive rule set for ML, ability for API integration and working relationship with Fluency leadership. \u00a0The image below outlines the workflow of Fluency from receipt of logs and data from datasources through it's process of making decisions on events becoming security incidents.\r\n\r\n<img class=\"alignnone size-large wp-image-6305\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/07\/Final-New-Version-Fluency-Flow-\u2013-With-Automated-Response-Capability-01-1024x724.jpg\" alt=\"\" width=\"1024\" height=\"724\" \/>\r\n\r\n\u00a0\r\n<h4>Making the SIEM Part of a SOAR<\/h4>\r\nPTP\u2019s SOAR (Security Orchestration Automation and Response) implementation consists of a select group of tools and technologies. PTP leverages the platform along with our people and processes to assist in incident investigations, automate incident response and remediation, and provide our security analyst with a single point of visibility for events, threat intelligence and sharing.\r\n\r\nThe SOAR environment is utilized to reduce repetitive actions, automate analysis, and provide the correlation of observables across the PTP customer environments. It is a core platform that helps the SOC respond to incidents by providing standardization of data types, tagging of findings, and analysis of observations.\r\n\r\nThe environment consists of four highly integrated platforms depicted below.\r\n\r\n\u00a0\r\n\r\n<img class=\"alignnone size-large wp-image-6310\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR-1024x765.png\" alt=\"\" width=\"1024\" height=\"765\" \/>\r\n\r\n\u00a0\r\n<h5>The Hive<\/h5>\r\nThe Hive is a Security Incident Response Platform (SIRP). A system whose purpose is to assist incident responders with investigations and to make data readily available for analysis. The Hive is the integration point with PTP's ISTM (ConnectWise) to communicate updates and status information between the SIRP and the ticketing system.\r\n<h5>Cortex<\/h5>\r\nCortex is an analysis and active response engine. This process engine performs the heavy lifting when analysis of observables or handling of responders is required. Cortex comes with a base of over a hundred analyzers that can be applied to observable data covering a wide range of indicator types.\r\n<h5>MISP<\/h5>\r\nMISP is a Threat Intelligence Platform (TIP). This platform is used world-wide for sharing, storing, and correlating cyber security indicators across the security intelligence community. It is utilized to standardize the communication of these indicators and provide a key framework for communicating that information.\r\n<h5>Shuffle<\/h5>\r\nShuffle is an automation and response platform. Shuffle bridges the gap between the components above and disparate systems, applications, and code. It provides an interface with APIs, a modular coding environment, and workflow for automation of actions, responses, and scheduling of repetitive tasks.\r\n<h5>Process Integration<\/h5>\r\nThe main interface for the SOAR environment is through The Hive. User access requires a client VPN connection to the AWS VPC containing the SOAR components. The interface is browser-based and integrated with SSO for authorization and authentication.\r\n\r\nWhen a Fluency alert is generated, the PeakPlus integration backend will create a ticket in ConnectWise and a corresponding case in The Hive that is prepopulated with data from the event. This helps accelerate the incident investigation and populates the case with standard types of data. SOC personnel are then free to begin running automations and data gathering tasks on the data, follow the deep link into Fluency to the triggering alert, and add other data or observations to the case as it progresses.\r\n\r\n\u00a0\r\n<h4>PTP SOAR In Action<\/h4>\r\nOnce an incident ticket is created, it is immediately apparent if any of the data correlates to other cases in the system and the status of those cases. \u00a0See below.\r\n\r\n<img class=\"size-large wp-image-6319 aligncenter\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/Fig1-SOAR-Case-view-1024x602.png\" alt=\"\" width=\"1024\" height=\"602\" \/>\r\n\r\n\u00a0\r\n\r\nNext, the list of related incidents can be expanded immediately to see exactly what observation details match with the current case to assist in handling of the ticket.\r\n\r\n<img class=\"size-full wp-image-6312 aligncenter\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/observation-details.png\" alt=\"\" width=\"818\" height=\"398\" \/>\r\n\r\n\u00a0\r\n\r\nAs seen in these images, tagging is heavily utilized to make sense of the data by pulling things together and increasing the visibility of important factors. The power of this feature combined with workflow automation is very apparent when dealing with lists of IP addresses from incident investigations. The data in the image below represents the results of triggering the automated tasks against a list of addresses. This workflow completed 24 searches against disparate sources for each IP address in the list within a couple of minutes and provides highly visible feedback to the analyst about them.\r\n\r\n\u00a0\r\n\r\n<img class=\"size-large wp-image-6318 aligncenter\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/Fig3observables-1024x444.png\" alt=\"\" width=\"1024\" height=\"444\" \/>\r\n\r\nWhile the Hive is the main interface and most visible part of the environment, Cortex is tightly integrated with it to perform the heavy lifting. All the automation performed for the workflows is handed off to Cortex for processing and analysis. The results are then handed back to The Hive for collation, tagging, and tracking.\r\n\r\nBoth components communicate with MISP. MISP is used because \"nobody knows everything, but everyone knows something\". MISP contains the current state of public knowledge about the world of security at large and is used to mine that data for IOCs. Our MISP is currently monitoring 47 data feeds covering 56 Galaxies (large data-object clusters) and 127 data taxonomies (namespaces). It encompasses data sets from such things as blocklists and Tor exit nodes, telemetry data on active APT groups, and malware indicators. These feeds are curated to reduce overlap and cast as wide a net as possible.\r\n\r\n\u00a0\r\n<h4>Summary<\/h4>\r\nSecurity monitoring is about finding the needle in the haystack. \u00a0Effective protection tools block the majority of activity, but it is the covert behavior that can cause the greatest harm, with malware sitting dormant in an environment until it is time for it to act. \u00a0The combination of intelligent tools architected together in PTP's SOAR environment allows the platform to sift through the massive volumes of event data and present to the security analyst those high risk items that require further investigation, and when doing so, determine if those activities are present in other monitored customer environment.\r\n\r\nWant to take our services for a test drive? \u00a0Click <a href=\"https:\/\/ptp.cloud\/xdr-and-soc-services-original\/\">HERE<\/a> for information on a FREE Proof of Concept!","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,1,10],"tags":[96,136,135,138,137],"table_tags":[],"class_list":["post-6303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloudops-archive","category-news-archive","category-secops-archive","tag-mssp","tag-security-monitoring","tag-soar","tag-soc-services","tag-xdd"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SOAR based Security Monitoring - PTP | Cloud Experts | Biotech Enablers<\/title>\n<meta name=\"description\" content=\"PTP&#039;s SOAR assists in incident investigations and automates incident response and provides our security analyst with a single point of visibility.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOAR based Security Monitoring - PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"og:description\" content=\"PTP&#039;s SOAR assists in incident investigations and automates incident response and provides our security analyst with a single point of visibility.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-02T16:18:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T06:59:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1430\" \/>\n\t<meta property=\"og:image:height\" content=\"1069\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gary Derheim\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gary Derheim\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/\"},\"author\":{\"name\":\"Gary Derheim\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab\"},\"headline\":\"SOAR based Security Monitoring\",\"datePublished\":\"2022-08-02T16:18:31+00:00\",\"dateModified\":\"2024-06-03T06:59:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/\"},\"wordCount\":1392,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png\",\"keywords\":[\"mssp\",\"security monitoring\",\"soar\",\"soc services\",\"xdd\"],\"articleSection\":[\"CloudOps\",\"News\",\"SecOps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/\",\"url\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/\",\"name\":\"SOAR based Security Monitoring - PTP | Cloud Experts | Biotech Enablers\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png\",\"datePublished\":\"2022-08-02T16:18:31+00:00\",\"dateModified\":\"2024-06-03T06:59:56+00:00\",\"description\":\"PTP's SOAR assists in incident investigations and automates incident response and provides our security analyst with a single point of visibility.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png\",\"width\":1430,\"height\":1069,\"caption\":\"Integrating Key Security Components in a SOAR System: TheHive, MISP, Cortex, and Shuffle.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOAR based Security Monitoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab\",\"name\":\"Gary Derheim\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SOAR based Security Monitoring - PTP | Cloud Experts | Biotech Enablers","description":"PTP's SOAR assists in incident investigations and automates incident response and provides our security analyst with a single point of visibility.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"SOAR based Security Monitoring - PTP | Cloud Experts | Biotech Enablers","og_description":"PTP's SOAR assists in incident investigations and automates incident response and provides our security analyst with a single point of visibility.","og_url":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2022-08-02T16:18:31+00:00","article_modified_time":"2024-06-03T06:59:56+00:00","og_image":[{"width":1430,"height":1069,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png","type":"image\/png"}],"author":"Gary Derheim","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"Gary Derheim","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/"},"author":{"name":"Gary Derheim","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab"},"headline":"SOAR based Security Monitoring","datePublished":"2022-08-02T16:18:31+00:00","dateModified":"2024-06-03T06:59:56+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/"},"wordCount":1392,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png","keywords":["mssp","security monitoring","soar","soc services","xdd"],"articleSection":["CloudOps","News","SecOps"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/","url":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/","name":"SOAR based Security Monitoring - PTP | Cloud Experts | Biotech Enablers","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png","datePublished":"2022-08-02T16:18:31+00:00","dateModified":"2024-06-03T06:59:56+00:00","description":"PTP's SOAR assists in incident investigations and automates incident response and provides our security analyst with a single point of visibility.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/soar-based-security-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png","width":1430,"height":1069,"caption":"Integrating Key Security Components in a SOAR System: TheHive, MISP, Cortex, and Shuffle."},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/soar-based-security-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"SOAR based Security Monitoring"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab","name":"Gary Derheim"}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/08\/SOAR.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/6303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=6303"}],"version-history":[{"count":0,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/6303\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/6310"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=6303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=6303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=6303"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=6303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}