A Multi-Vocal Review of Security Orchestration

02/21/2020
by   Chadni Islam, et al.
0

Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor security tools that can effectively and efficiently interoperate to support security staff of a Security Operation Centre (SOC). Given the increasing role and importance of security orchestration, there has been an increasing amount of literature on different aspects of security orchestration solutions. However, there has been no effort to systematically review and analyze the reported solutions. We report a Multivocal Literature Review that has systematically selected and reviewed both academic and grey (blogs, web pages, white papers) literature on different aspects of security orchestration published from January 2007 until July 2017. The review has enabled us to provide a working definition of security orchestration and classify the main functionalities of security orchestration into three main areas: unification, orchestration, and automation. We have also identified the core components of a security orchestration platform and categorized the drivers of security orchestration based on technical and socio-technical aspects. We also provide a taxonomy of security orchestration based on the execution environment, automation strategy, deployment type, mode of task and resource type. This review has helped us to reveal several areas of further research and development in security orchestration.

READ FULL TEXT
research
04/27/2021

Smells and Refactorings for Microservices Security: A Multivocal Literature Review

Context: Securing microservice-based applications is crucial, as many IT...
research
12/01/2020

Software Security Patch Management – A Systematic Literature Review of Challenges, Approaches, Tools and Practices

Context: Software security patch management purports to support the proc...
research
06/15/2023

Detecting Misuses of Security APIs: A Systematic Review

Security Application Programming Interfaces (APIs) play a vital role in ...
research
03/31/2020

Security Assurance Cases – State of the Art of an Emerging Approach

Security Assurance Cases (SAC) are a form of structured argumentation us...
research
11/01/2021

Confidentiality and Integrity Mechanisms for Microservices Communication

The microservices architecture tries to deal with the challenges posed b...
research
06/03/2019

An Extensive Review of Computational Dance Automation Techniques and Applications

Dance is an art and when technology meets this kind of art, it's a novel...
research
10/18/2022

O Problema do Roteamento de Interligações Elétricas em Circuitos Integrados

Integrated circuit design automation tools are essential for the feasibi...

Please sign up or login with your details

Forgot password? Click here to reset