Nowadays, automation is part of our day-to-day life. To be able to react to security incidents, it is not enough to detect them. We need a mechanism that can trigger an action when an incident is detected.
Azure Sentinel is a cloud-native SIEM (security information and event manager) that analyze what is happening inside your organization and can detect a possible security breach. Azure Sentinel can automatically raise an alert when an incident occurs.
This is not enough, and to increase the SOC efficiency, reduce the response time and the no. of resources that you have available, you need to be able to implement SOAR (Security Orchestration, Automation and Response) on top of it.
Automation is the keyword here; we can now do it inside Azure Sentinel using Automation Rules.
Except for an alert and running a playbook the automation rules allow us to react to multiple analytics rules at once and automatically assign or close incidents. It is a mechanism that enables us to do the orchestration, incident orchestration, on top of Azure Sentinel. Complex workflows for different types of incidents can now be defined and part of Azure Sentinel directly.
The running and trigger SLAs for automation rules that we define and the playbooks trigger are under a few seconds and take into account how you define the rule and how long each playbook takes.
As we expected when we define automation rules there are the following components:
- Expiration date