{"id":100228,"date":"2023-11-14T10:49:32","date_gmt":"2023-11-14T09:49:32","guid":{"rendered":"https:\/\/www.dgsspa.com\/?post_type=labs&#038;p=100228"},"modified":"2024-05-14T14:25:33","modified_gmt":"2024-05-14T13:25:33","slug":"automation-orchestration-ao","status":"publish","type":"labs","link":"https:\/\/www.dgsspa.com\/en\/labs\/automation-orchestration-ao\/","title":{"rendered":"Automation &amp; Orchestration (A&amp;O)"},"content":{"rendered":"<section class=\"dgs-hero\">\n\t<div class=\"dgs-hero-bg\" style=\"background: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2023\/11\/Banner_2560x19205.jpg') no-repeat 50% 50%; background-size: cover;\"><\/div>\n\t\t<div class=\"dgs-hero-ptrn \"><\/div>\n\t<div class=\"hero-inner\">\n\t\t\n\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">DGS CyLABs<\/span><\/span>\n\n\n\n<h1 class=\"hero-heading hero-heading--undefined\">Automation &amp; Orchestration (A&amp;O)<\/h1>\n\n\n\n<div class=\"wp-block-dgs-theme-hero-text hero-text\"><p>To manage the ongoing change in IT processes and meet the modern needs of securing our clients\u2019 IT infrastructures, we experiment with innovative solutions and technologies, proposing automation and orchestration of IT security management processes.<\/p><\/div>\n\n\t<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group alignfull content-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"content\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">DGS CyLABs<\/span><\/span>\n\n\n\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Automation &amp; Orchestration (A&amp;O)<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>On average, in any company that employs traditional defense tools, IT security management requires qualified IT staff to spend many hours on repetitive manual tasks. This takes away valuable time and mental energy that could instead be devoted to achieving business objectives. The good news is that <strong>repetitive manual tasks can be reduced through automation<\/strong>, and more. Should we need it, technological innovation today allows us to automate even an entire sequence of repetitive tasks by having multiple operations \u201cintegrated.\u201d This is, in short, <strong>process automation<\/strong>, or, to put it in one word, \u201c<strong>orchestration<\/strong>.\u201d&nbsp;<\/p>\n\n\n\n<p><strong>Automation<\/strong> <strong>is essential today to manage, change, and adjust the security of IT infrastructures.<\/strong> With automation, and thus with the simplification of processes, comes more time and resources to devote to innovation: an automated company can work faster; this allows IT staff to devote themselves to critical problems and solve them, making them repetitive at a later time and thus suitable again for automation and orchestration.&nbsp;<\/p>\n\n\n\n<p><strong>The world of Cyber Security <\/strong>\u2013 which sees the number of attacks on IT infrastructures (data, users, applications, devices, networks, etc.) growing every day, and which, as if that were not enough, is constantly struggling with staff shortages and the need to search for new skills all the time \u2013&nbsp; <strong>can only benefit from the adoption of solutions that can automate the detection of potential flaws and new vulnerabilities in exposed services, as well as orchestrate the implementation of <\/strong><em><strong>remediation<\/strong><\/em><strong> actions.<\/strong>&nbsp;<\/p>\n\n\n\n<p>The process encompasses the entire IT infrastructure, network, digital identities, applications and security services involved in fulfilling the detection and, therefore, deployment of an application\/service and its security policy.&nbsp;&nbsp;<\/p>\n\n\n\n<p>And this is where <strong>standardization<\/strong>-the basis of automation, solution discovery and integration-or <strong>orchestration<\/strong> come in. To automate a task, i.e., the single part of a process, we must standardize to reduce the burden of operational integration.&nbsp;<\/p>\n\n\n\n<p>In our <strong>Authomation &amp; Orchestration (A&amp;O) CyLAB labs<\/strong>, for example, we test <strong>Web Application Scanning (WAS) technologies<\/strong>, with which we can perform repeated\/scheduled scans looking for vulnerabilities to which web applications are prone. In this way, we are devolving to a technology the ability to have capabilities that we should be looking for in application security specialists; with these tools we can have web applications scanned in seconds, leveraging workflows and vulnerability management in a standardized way.&nbsp;<\/p>\n\n\n\n<p>In addition, we use the results of the scans performed by the solution presented above, \u201cfeeding\u201d them to <strong>Web Application Firewall (WAF) technologies<\/strong>; WAFs that we configure directly on the technologies we use by our customers to expose\/publish their applications: in this way, the apps are always exposed\/protected from the vulnerabilities previously detected.&nbsp;<\/p>\n\n\n\n<p>We then arrive at secure application deployment-[Sec]Ops-thanks to the integration of two technologies: <strong>Web Application Scanning and Web Application Firewall<\/strong>.&nbsp;<\/p>\n\n\n\n<p>We then configure what we describe through an <strong>Orchestration and Automation technology<\/strong>, thus achieving the desired goal of <strong>protecting applications from newly detected application vulnerabilities automatically<\/strong>, without the need for a person\u2019s intervention; we thus enable our customers to have securely exposed apps, without them having to dedicate personnel with specific expertise on Web App Scanning and Web App FW technologies.&nbsp;<\/p>\n\n\n\n<p>The most interesting aspect is that <strong>we can accomplish this by integrating security at every stage of the software development life cycle-Software Development Life Cycle (SDCL)<\/strong>: from design, development, testing, and all the way to production, going so far as to propose <strong>DevSecOps<\/strong> methodologies.&nbsp;<\/p>\n\n\n\n<p>To date, thanks to the results of our <strong>laboratory (A&amp;O CyLAB),<\/strong> we have created several templates with definitions of scanning profiles from the outside for different types of web services (http\/s, authenticated and non-authenticated); we have created workflows for the definition of basic WAF security policies, implemented for the same different types of web services; we have prepared the definition of playbooks that automate the import into the WAF environment of the output produced by WAS scanning of web services. All this is available to our customers and in production on many of them.&nbsp;<\/p>\n\n\n\n<p>Find out more about all our other <strong>CyLABs<\/strong>, <a href=\"https:\/\/www.dgsspa.com\/en\/dgs-cylabs\/\">CLICK HERE<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<div class=\"wp-block-group alignfull news-carousel has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Related topics<\/h3>\n\n\n\n<section class=\"wp-block-query alignfull posts-loop is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-100211 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Identity Threat Detection and Response (ITDR)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/identity-threat-detection-and-response-itdr\/\" target=\"_self\">Scopri di pi\u00f9<span class=\"screen-reader-text\">: Identity Threat Detection and Response (ITDR)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100213 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Cloud Native Application Protection Platform (CNAPP)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/cloud-native-application-protection-platform-cnapp\/\" target=\"_self\">Scopri di pi\u00f9<span class=\"screen-reader-text\">: Cloud Native Application Protection Platform (CNAPP)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100217 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">eXtended Detection and Response (xDR)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/extended-detection-and-response-xdr\/\" target=\"_self\">Scopri di pi\u00f9<span class=\"screen-reader-text\">: eXtended Detection and Response (xDR)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100220 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Advanced Threat Detection Intelligence (ATDI)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/advanced-threat-detection-intelligence-atdi\/\" target=\"_self\">Scopri di pi\u00f9<span class=\"screen-reader-text\">: Advanced Threat Detection Intelligence (ATDI)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100222 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Business Email Compromise (BEC)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/business-email-compromise-bec\/\" target=\"_self\">Scopri di pi\u00f9<span class=\"screen-reader-text\">: Business Email Compromise (BEC)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-100224 labs type-labs status-publish has-post-thumbnail hentry\">\n<h2 class=\"wp-block-post-title\">Critical Infrastructure &amp; IoT Protection (ICS &amp; IoT Protection)<\/h2>\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-buttons has-black-color has-text-color has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group wp-block-button is-style-plus-icon has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<a class=\"wp-block-button__link wp-element-button wp-block-read-more has-text-color has-cyan-color\" href=\"https:\/\/www.dgsspa.com\/en\/labs\/critical-infrastructure-iot-protection-ics-iot-protection\/\" target=\"_self\">Scopri di pi\u00f9<span class=\"screen-reader-text\">: Critical Infrastructure &amp; IoT Protection (ICS &amp; IoT Protection)<\/span><\/a><\/div>\n<\/div>\n\n<\/li><\/ul><\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We experiment with innovative solutions and technologies for the automation and orchestration of IT security management processes.<\/p>\n","protected":false},"author":3,"featured_media":97831,"template":"","meta":{"_acf_changed":false,"dgs_labs_date_in":"","dgs_labs_date_out":"","dgs_labs_date_in_out":"","dgs_labs_location":"","footnotes":""},"tags":[],"corsi":[],"labs":[],"class_list":["post-100228","labs","type-labs","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DGS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:site_name\" content=\"DGS\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/12\/dgs-logo-opengraph.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dgs_group\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":null,\"url\":\"\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"name\":\"DGS spa\",\"description\":\"DGS SPA\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\",\"name\":\"DGS spa\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"contentUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"width\":400,\"height\":400,\"caption\":\"DGS spa\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/gruppoDGS\",\"https:\\\/\\\/x.com\\\/dgs_group\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dgsspa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCTrU_JDYEEOcYXNjL5a9k5g\",\"https:\\\/\\\/www.instagram.com\\\/dgs_spa\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DGS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/","og_locale":"en_US","og_type":"article","og_site_name":"DGS","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/12\/dgs-logo-opengraph.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@dgs_group","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"CollectionPage","@id":null,"url":"","name":"","isPartOf":{"@id":"https:\/\/www.dgsspa.com\/en\/#website"},"inLanguage":"en-US"},{"@type":"WebSite","@id":"https:\/\/www.dgsspa.com\/en\/#website","url":"https:\/\/www.dgsspa.com\/en\/","name":"DGS spa","description":"DGS SPA","publisher":{"@id":"https:\/\/www.dgsspa.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dgsspa.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dgsspa.com\/en\/#organization","name":"DGS spa","url":"https:\/\/www.dgsspa.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","contentUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","width":400,"height":400,"caption":"DGS spa"},"image":{"@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gruppoDGS","https:\/\/x.com\/dgs_group","https:\/\/www.linkedin.com\/company\/dgsspa\/","https:\/\/www.youtube.com\/channel\/UCTrU_JDYEEOcYXNjL5a9k5g","https:\/\/www.instagram.com\/dgs_spa"]}]}},"_links":{"self":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs\/100228"}],"collection":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs"}],"about":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/types\/labs"}],"author":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/users\/3"}],"version-history":[{"count":5,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs\/100228\/revisions"}],"predecessor-version":[{"id":101525,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs\/100228\/revisions\/101525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/media\/97831"}],"wp:attachment":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/media?parent=100228"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/tags?post=100228"},{"taxonomy":"corsi","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/corsi?post=100228"},{"taxonomy":"labs","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/labs?post=100228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}