{"title":"基于网络安全技术的自动化管理方案在SOAR中的应用","authors":"Dong Bin, Chunyan Yang, Songming Han","doi":"10.1117/12.2682470","DOIUrl":null,"url":null,"abstract":"Nowadays,more and more enterprises have begun to treat it as the core part of the security infrastructure and apply automation to help solve the problem of “security, cost and efficiency” difficult to balance in enterprise security operations. But the traditional network security is protected based on a concept of stacking security devices, many types of security devices have their security capabilities overlapped. This paper discusses how the atomic device control strategy can be used to standardize the management of network security devices, guide the planning of device deployment and implement automatic security emergency response on various SOAR platforms. For a certain enterprise, its internal network security devices are limited in types and the overall workload is acceptable.","PeriodicalId":440430,"journal":{"name":"International Conference on Electronic Technology and Information Science","volume":"38 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Application of atomization management scheme based on network security technology with SOAR\",\"authors\":\"Dong Bin, Chunyan Yang, Songming Han\",\"doi\":\"10.1117/12.2682470\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays,more and more enterprises have begun to treat it as the core part of the security infrastructure and apply automation to help solve the problem of “security, cost and efficiency” difficult to balance in enterprise security operations. But the traditional network security is protected based on a concept of stacking security devices, many types of security devices have their security capabilities overlapped. This paper discusses how the atomic device control strategy can be used to standardize the management of network security devices, guide the planning of device deployment and implement automatic security emergency response on various SOAR platforms. For a certain enterprise, its internal network security devices are limited in types and the overall workload is acceptable.\",\"PeriodicalId\":440430,\"journal\":{\"name\":\"International Conference on Electronic Technology and Information Science\",\"volume\":\"38 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Electronic Technology and Information Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2682470\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Electronic Technology and Information Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2682470","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application of atomization management scheme based on network security technology with SOAR
Nowadays,more and more enterprises have begun to treat it as the core part of the security infrastructure and apply automation to help solve the problem of “security, cost and efficiency” difficult to balance in enterprise security operations. But the traditional network security is protected based on a concept of stacking security devices, many types of security devices have their security capabilities overlapped. This paper discusses how the atomic device control strategy can be used to standardize the management of network security devices, guide the planning of device deployment and implement automatic security emergency response on various SOAR platforms. For a certain enterprise, its internal network security devices are limited in types and the overall workload is acceptable.