论文标题
安全编排的多声音审查
A Multi-Vocal Review of Security Orchestration
论文作者
论文摘要
组织使用各种类型的安全解决方案来防止网络攻击。多个供应商提供了使用异构技术和范式开发的安全解决方案。因此,很难轻松地使安全解决方案从事集成的时尚。安全编排旨在平稳整合多生安全工具,这些工具可以有效,有效地互操作以支持安全操作中心(SOC)的安全人员。鉴于安全编排的作用和重要性越来越大,关于安全编排解决方案的不同方面的文献越来越多。但是,没有努力系统地审查和分析报告的解决方案。我们报告了一项多媒体文献综述,该评论已系统地选择并审查了学术和灰色(博客,网页,白皮书,白皮书)文献,内容涉及2007年1月至2017年7月发表的安全管弦乐的各个方面。该评论使我们能够对安全编排进行工作定义,并将安全策划的主要功能分类为三个主要领域:统一,乐团和自动策划,自动派系。我们还确定了安全编排平台的核心组成部分,并根据技术和社会技术方面对安全编排的驱动力进行了分类。我们还根据执行环境,自动化策略,部署类型,任务模式和资源类型提供安全编排的分类学。这篇综述帮助我们揭示了安全编排中进一步研究和发展的几个领域。
Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor security tools that can effectively and efficiently interoperate to support security staff of a Security Operation Centre (SOC). Given the increasing role and importance of security orchestration, there has been an increasing amount of literature on different aspects of security orchestration solutions. However, there has been no effort to systematically review and analyze the reported solutions. We report a Multivocal Literature Review that has systematically selected and reviewed both academic and grey (blogs, web pages, white papers) literature on different aspects of security orchestration published from January 2007 until July 2017. The review has enabled us to provide a working definition of security orchestration and classify the main functionalities of security orchestration into three main areas: unification, orchestration, and automation. We have also identified the core components of a security orchestration platform and categorized the drivers of security orchestration based on technical and socio-technical aspects. We also provide a taxonomy of security orchestration based on the execution environment, automation strategy, deployment type, mode of task and resource type. This review has helped us to reveal several areas of further research and development in security orchestration.