{"id":10083,"date":"2024-07-05T10:53:00","date_gmt":"2024-07-05T10:53:00","guid":{"rendered":"https:\/\/redingtongroup.com\/cloud\/?page_id=10083"},"modified":"2025-06-17T11:20:07","modified_gmt":"2025-06-17T11:20:07","slug":"automated-security-response","status":"publish","type":"page","link":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/","title":{"rendered":"Automated Security Response"},"content":{"rendered":"<div class=\"pages \" style=\"background: #fff; float: left; width: 100%; border-bottom: 1px solid #ccc;\">\n<div class=\"wrapper\">\n<div class=\"page_item\" style=\"padding: 10px 0px;\"><a href=\"https:\/\/redingtongroup.com\/cloud\/automated-waf-deployment\/\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/bundles.webp\" alt=\"Media\" \/><br \/>\nAutomated Deployment of WAF <\/a><br \/>\n<a href=\"https:\/\/redingtongroup.com\/cloud\/secure-shield\/\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/public.webp\" alt=\"Investors\" \/><br \/>\nSecure Shield <\/a><br \/>\n<a href=\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/CSR.webp\" alt=\"ESG\" \/><br \/>\nAutomated Security Response <\/a><\/div>\n<\/div>\n<\/div>\n<p><!-- security response page --><\/p>\n<section class=\"pdng_tp__btm\" style=\"background: #fff;\">\n<div class=\"clud-const-txt text-center our-approach\">\n<p>Resolve common security threats and improve your security posture<\/p>\n<\/div>\n<\/section>\n<section class=\"pdng_tp__btm our_offr\" style=\"background: #F2F7F4;\">\n<div class=\"container\">\n<div class=\"clud-const-txt text-center our-approach\">\n<h2 class=\"hdngbig\">Our Offerings<\/h2>\n<\/div>\n<div class=\"row offering_mn\">\n<div class=\"col-md-4 col-12\">\n<div class=\"offering_txt\">\n<div class=\"vrtclcntr_bx\">\n<div class=\"vrtclcntr_bxinr\">\n<div class=\"circle-numb-txt\">\n<p>This Offering works with\u00a0AWS Security Hub\u00a0and provides predefined response and remediation actions based on industry compliance standards and best practices for security threats.<\/p>\n<div class=\"circle-numb\"><img decoding=\"async\" title=\"Icon Number 1\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/icn-nm1.png\" alt=\"Icon Number 1\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-md-4 col-12\">\n<div class=\"offering_txt\">\n<div class=\"vrtclcntr_bx\">\n<div class=\"vrtclcntr_bxinr\">\n<div class=\"circle-numb-txt\">\n<p>It helps to resolve common security findings and to improve their security posture in AWS.<\/p>\n<div class=\"circle-numb\"><img decoding=\"async\" title=\"Icon Number 2\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/icn-nm2.png\" alt=\"Icon Number 2\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-md-4 col-12\">\n<div class=\"offering_txt\">\n<div class=\"vrtclcntr_bx\">\n<div class=\"vrtclcntr_bxinr\">\n<div class=\"circle-numb-txt\">\n<p>It creates playbook contains the necessary actions to start the remediation workflow within the admin account or any member account.<\/p>\n<div class=\"circle-numb\"><img decoding=\"async\" title=\"Icon Number 3\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/icn-nm3.png\" alt=\"Icon Number 3\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"\" style=\"background: #fff;\">\n<div class=\"row m-0\">\n<div class=\"col-md-6\"><img decoding=\"async\" title=\"Key Benefits\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/ky-bnft-img.png\" alt=\"Key Benefits\" \/><\/div>\n<div class=\"col-md-2\"><\/div>\n<div class=\"col-md-3\">\n<div class=\"ky-bnfts\">\n<h2 class=\"hdngbig\">Key Benefits \u200b<\/h2>\n<ul>\n<li>AWS Security Hub integration<\/li>\n<li>Resolve Security Hub findings<\/li>\n<li>Automated remediation actions<\/li>\n<li>Increased overall security posture<\/li>\n<li>Improved visibility with QuickSight<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"pdng__btm\" style=\"background: #fff;\">\n<div class=\"container\">\n<h2 class=\"hdngbig\">Architecture<\/h2>\n<div class=\"row\">\n<div class=\"ofrng_main\"><img decoding=\"async\" class=\"img-fluid\" title=\"Architecture\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/archt-img.png\" alt=\"Architecture\" width=\"100%\" \/><\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"pdng_tp__btm\" style=\"background: #F2F7F4;\">\n<div class=\"container\">\n<div class=\"our-apprh\">\n<h2 class=\"hdngbig\">Our Approach \u200b<\/h2>\n<p>Preconfigured templates are available for the solution<\/p>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12\">\n<div class=\"our-apprh-bt\">\n<div class=\"detect-mbl-img\"><img decoding=\"async\" title=\"Detect\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/det-mbl-img.png\" alt=\"Detect\" \/><\/div>\n<div class=\"detect-desk-mn\"><img decoding=\"async\" class=\"detect-desk-img img-fluid\" title=\"AWS security hub 1\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/det-desk-img.png\" alt=\"AWS security hub 1\" \/><\/p>\n<div class=\"our-apprh-txt our-apprh-txt-orchst\">\n<h2>Detect<\/h2>\n<p>Security Hub\u00a0provides you with a comprehensive view of their AWS security state. It helps you to measure your environment against security industry standards and best practices. It works by collecting events and data from other AWS services, such as\u00a0AWS Config,\u00a0Amazon GuardDuty, and\u00a0AWS Firewall Manager.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-md-12\">\n<div class=\"our-apprh-bt our-apprh-paddlft\">\n<div class=\"detect-mbl-img\"><img decoding=\"async\" title=\"initiate Automated Security\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/init-mbl-img.png\" alt=\"initiate Automated Security\" \/><\/div>\n<div class=\"detect-desk-mn\"><img decoding=\"async\" class=\"detect-desk-img img-fluid\" title=\"AWS Security Hub\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/init-desk-img.png\" alt=\"AWS Security Hub\" \/><\/p>\n<div class=\"our-apprh-txt our-apprh-txt-init\">\n<h2>Initiate<\/h2>\n<p>You can initiate events against findings using custom actions, which result in\u00a0Amazon EventBridge Events.\u00a0AWS Security Hub Custom Actions\u00a0and\u00a0Amazon EventBridge rules\u00a0initiate Automated Security Response on AWS playbooks to address findings. One\u00a0EventBridge\u00a0rule is deployed to match the custom action event, and one\u00a0EventBridge Event\u00a0Rule is deployed for each supported control (deactivated by default) to match the real-time finding event.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-md-12\">\n<div class=\"our-apprh-bt\">\n<div class=\"detect-mbl-img\"><img decoding=\"async\" title=\"Orchestrate\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/orcht-mbl-img.png\" alt=\"Orchestrate\" \/><\/div>\n<div class=\"detect-desk-mn\"><img decoding=\"async\" class=\"detect-desk-img img-fluid\" title=\"AWS Identity and Access Management\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/orcht-desk-img.png\" alt=\"AWS Identity and Access Management\" \/><\/p>\n<div class=\"our-apprh-txt our-apprh-txt-orchst\">\n<h2>Orchestrate<\/h2>\n<p>Using cross-account\u00a0AWS Identity and Access Management\u00a0(IAM) roles,\u00a0AWS Step Functions\u00a0in the admin account invokes the remediation in the member account containing the resource that produced the security finding.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-md-12\">\n<div class=\"our-apprh-bt our-apprh-paddlft\">\n<div class=\"detect-mbl-img\"><img decoding=\"async\" title=\"Remediate\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/remd-mbl-img.png\" alt=\"Remediate\" \/><\/div>\n<div class=\"detect-desk-mn\"><img decoding=\"async\" class=\"detect-desk-img img-fluid\" title=\"AWS Systems Manager Automation\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/remd-desk-img.png\" alt=\"AWS Systems Manager Automation\" \/><\/p>\n<div class=\"our-apprh-txt our-apprh-txt-init\">\n<h2>Remediate<\/h2>\n<p>An\u00a0AWS Systems Manager Automation Document\u00a0in the member account performs the action required to remediate the finding on the target resource, such as disabling\u00a0AWS Lambda\u00a0public access.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-md-12\">\n<div class=\"our-apprh-bt\">\n<div class=\"detect-mbl-img\"><img decoding=\"async\" title=\"Logs group\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/log-mbl-img.png\" alt=\"Logs group\" \/><\/div>\n<div class=\"detect-desk-mn\"><img decoding=\"async\" class=\"detect-desk-img img-fluid\" title=\"Amazon CloudWatch Logs group\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/log-desk-img.png\" alt=\"Amazon CloudWatch Logs group\" \/><\/p>\n<div class=\"our-apprh-txt our-apprh-txt-orchst\">\n<h2>Log<\/h2>\n<p>The playbook logs the results to an\u00a0Amazon CloudWatch Logs group, sends a notification to an\u00a0Amazon Simple Notification Service\u00a0(Amazon SNS) topic, and updates the\u00a0Security Hub\u00a0finding. An audit trail of actions taken is maintained in the\u00a0finding notes.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-md-12\">\n<div class=\"our-apprh-bt our-apprh-paddlft\">\n<div class=\"detect-mbl-img\"><img decoding=\"async\" title=\"Output verification\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/out-vert-mbl-img.png\" alt=\"Output verification\" \/><\/div>\n<div class=\"detect-desk-mn\"><img decoding=\"async\" class=\"detect-desk-img img-fluid\" title=\"Security Hub dashboard\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/out-vert-desk-img.png\" alt=\"Security Hub dashboard\" \/><\/p>\n<div class=\"our-apprh-txt our-apprh-txt-init\">\n<h2>Output verification<\/h2>\n<p>On the\u00a0Security Hub\u00a0dashboard, the finding workflow status is changed from new to either NOTIFIED or RESOLVED. Hub\u00a0dashboard. The security finding notes are updated to reflect the remediation performed<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-md-12\">\n<div class=\"our-apprh-bt\">\n<div class=\"detect-mbl-img\"><img decoding=\"async\" title=\"Monitoring\" src=\"https:\/\/redingtongroup.com\/wp-content\/uploads\/2024\/06\/mont-mbl-img.png\" alt=\"Monitoring\" \/><\/div>\n<div class=\"detect-desk-mn\"><img decoding=\"async\" class=\"detect-desk-img\" title=\"Centralized findings repository\" src=\"https:\/\/redingtongroup.com\/wp-content\/uploads\/2024\/06\/mont-desk-img.png\" alt=\"Centralized findings repository\" \/><\/p>\n<div class=\"our-apprh-txt our-apprh-txt-orchst mont-para\">\n<h2>Monitoring<\/h2>\n<p>Query the findings from the centralized findings repository and build dashboards for visualizations.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<p><!--end security response page --><\/p>\n<section class=\"pdng_tp__btm icnlftrht offrng\" style=\"background: #fff;\">\n<div class=\"clud-const-txt text-center our-approach\">\n<div class=\"container\">\n<h2 class=\"hdngbig\">Target Customer<\/h2>\n<div class=\"row trgt-cust-tp\">\n<div class=\"helth-prde-llk\">\n<div class=\"helth-prde-llk-lft\">\n<div class=\"helth-prde-llk-lft-clr\">\n<div class=\"helth-prde-img\"><img decoding=\"async\" class=\"img-fluid\" title=\"Healthcare Icon\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/08\/tc-icn1.png\" alt=\"Healthcare Icon\" \/><\/div>\n<div class=\"helth-prde-txt\">Healthcare providers looking to safeguard patient information and comply with health data regulations<\/div>\n<\/div>\n<\/div>\n<div class=\"helth-prde-llk-lft helth-prde-llk-rght\">\n<div class=\"helth-prde-llk-lft-clr\">\n<div class=\"helth-prde-img\"><img decoding=\"async\" class=\"img-fluid\" title=\"Educational institutions Icon\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/08\/tc-icn2.png\" alt=\"Educational institutions Icon\" \/><\/div>\n<div class=\"helth-prde-txt\">Educational institutions needing to secure online learning platforms and student data<\/div>\n<\/div>\n<\/div>\n<div class=\"helth-prde-llk-lft\">\n<div class=\"helth-prde-llk-lft-clr\">\n<div class=\"helth-prde-img\"><img decoding=\"async\" class=\"img-fluid\" title=\"Financial services Icon\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/08\/tc-icn3.png\" alt=\"Financial services Icon\" \/><\/div>\n<div class=\"helth-prde-txt\">Financial services companies focused on compliance and protection against security threats<\/div>\n<\/div>\n<\/div>\n<div class=\"helth-prde-llk-lft helth-prde-llk-rght\">\n<div class=\"helth-prde-llk-lft-clr\">\n<div class=\"helth-prde-img\"><img decoding=\"async\" class=\"img-fluid\" title=\"Manufacturing enterprises\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/08\/tc-icn4.png\" alt=\"Manufacturing enterprises\" \/><\/div>\n<div class=\"helth-prde-txt\">Manufacturing enterprises securing their operational technologies and data<\/div>\n<\/div>\n<\/div>\n<div class=\"helth-prde-llk-lft\">\n<div class=\"helth-prde-llk-lft-clr\">\n<div class=\"helth-prde-img\"><img decoding=\"async\" class=\"img-fluid\" title=\"E-commerce Icon\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/08\/tc-icn5.png\" alt=\"E-commerce Icon\" \/><\/div>\n<div class=\"helth-prde-txt\">E-commerce platforms requiring robust security measures to protect customer data and transactions<\/div>\n<\/div>\n<\/div>\n<div class=\"helth-prde-llk-lft helth-prde-llk-rght\">\n<div class=\"helth-prde-llk-lft-clr\">\n<div class=\"helth-prde-img\"><img decoding=\"async\" class=\"img-fluid\" title=\"IT and ITES organizations\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/08\/tc-icn6.png\" alt=\"IT and ITES organizations\" \/><\/div>\n<div class=\"helth-prde-txt\">IT and ITES organizations needing automated security responses for their cloud infrastructure<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"pdng_tp__btm\" style=\"background: #f2f7f4;\">\n<div class=\"clud-const-txt text-center our-approach\">\n<div class=\"container\">\n<h2 class=\"hdngbig\">Customer Engagement And Delivery Mechanism<\/h2>\n<div class=\"row\">\n<div class=\"cust_eng__bx\"><img decoding=\"async\" class=\"desktp-bg dsktp_view\" title=\"Customer Engagement\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/08\/desktp-bg.png\" alt=\"Customer Engagement\" \/><\/p>\n<div class=\"row mbl_view\">\n<div class=\"col-md-12\">\n<div class=\"cust-eng-cnt-bt\"><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/redingtongroup.com\/wp-content\/uploads\/2024\/08\/cust-eng-icon1.png\" \/>After understanding client requirements in the initial consultation, we draft a customized Statement of Work (SoW) outlining the specific security automation processes, timelines, and deliverables.<\/p>\n<\/div>\n<\/div>\n<div class=\"col-md-12\">\n<div class=\"cust-eng-cnt-bt\"><img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/redingtongroup.com\/wp-content\/uploads\/2024\/08\/cust-eng-icon2.png\" \/>This SoW is submitted for client approval and, if applicable, to AWS for funding validation. Throughout the engagement, we conduct regular status meetings and provide detailed progress reports to ensure the project stays on track and meets client expectations.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section class=\"pdng_tp__btm\" style=\"background: #fff;\">\n<div class=\"container\">\n<div class=\"clud-const-txt text-center our-approach\">\n<h2 class=\"hdngbig\">Use Cases\u200b<\/h2>\n<p>Common automated security response use cases on AWS<\/p>\n<\/div>\n<div class=\"row use_case_mn_bot\">\n<div class=\"use_case_slider\">\n<div>\n<div class=\"cntsldr_bx aos-init aos-animate\" data-aos=\"slide-up\" data-aos-delay=\"50\">\n<div class=\"use_case_bot\"><img decoding=\"async\" class=\"img-fluid\" title=\"Automated Remediation\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/use-cse1.png\" alt=\"Automated Remediation\" \/><\/p>\n<div class=\"use_case_bot_cnt\">\n<p>Automated Remediation for Resource Misconfigurations<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"cntsldr_bx aos-init aos-animate\" data-aos=\"slide-up\" data-aos-delay=\"50\">\n<div class=\"use_case_bot\"><img decoding=\"async\" class=\"img-fluid\" title=\"Automated Compliance\" src=\"https:\/\/redingtongroup.com\/wp-content\/uploads\/2024\/06\/use-cse21.png\" alt=\"Automated Compliance\" \/><\/p>\n<div class=\"use_case_bot_cnt\">\n<p>Automated Compliance Checks and Remediation<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"cntsldr_bx aos-init aos-animate\" data-aos=\"slide-up\" data-aos-delay=\"50\">\n<div class=\"use_case_bot\"><img decoding=\"async\" class=\"img-fluid\" title=\"Automated Threat Detection\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/use-cse3.png\" alt=\"Automated Threat Detection\" \/><\/p>\n<div class=\"use_case_bot_cnt\">\n<p>Automated Threat Detection and Mitigation for EC2 Instances<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"cntsldr_bx aos-init aos-animate\" data-aos=\"slide-up\" data-aos-delay=\"50\">\n<div class=\"use_case_bot\"><img decoding=\"async\" class=\"img-fluid\" title=\"Automated Incident Response\" src=\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/2024\/06\/use-cse4.png\" alt=\"Automated Incident Response\" \/><\/p>\n<div class=\"use_case_bot_cnt\">\n<p>Automated Incident Response for Security Group Policy Violations<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Automated Deployment of WAF Secure Shield Automated Security Response Resolve common security threats and improve your security posture Our Offerings [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"cloud_common_template.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-10083","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Automated Security Response - cloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/\",\"url\":\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/\",\"name\":\"Automated Security Response - cloud\",\"isPartOf\":{\"@id\":\"https:\/\/redingtongroup.com\/cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/bundles.webp\",\"datePublished\":\"2024-07-05T10:53:00+00:00\",\"dateModified\":\"2025-06-17T11:20:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#primaryimage\",\"url\":\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/bundles.webp\",\"contentUrl\":\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/bundles.webp\",\"width\":30,\"height\":30},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/redingtongroup.com\/cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automated Security Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/redingtongroup.com\/cloud\/#website\",\"url\":\"https:\/\/redingtongroup.com\/cloud\/\",\"name\":\"cloud\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/redingtongroup.com\/cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/redingtongroup.com\/cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/redingtongroup.com\/cloud\/#organization\",\"name\":\"cloud\",\"url\":\"https:\/\/redingtongroup.com\/cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/redingtongroup.com\/cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/03\/logo-white.svg\",\"contentUrl\":\"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/03\/logo-white.svg\",\"caption\":\"cloud\"},\"image\":{\"@id\":\"https:\/\/redingtongroup.com\/cloud\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automated Security Response - cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/","url":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/","name":"Automated Security Response - cloud","isPartOf":{"@id":"https:\/\/redingtongroup.com\/cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#primaryimage"},"image":{"@id":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#primaryimage"},"thumbnailUrl":"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/bundles.webp","datePublished":"2024-07-05T10:53:00+00:00","dateModified":"2025-06-17T11:20:07+00:00","breadcrumb":{"@id":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/redingtongroup.com\/cloud\/automated-security-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#primaryimage","url":"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/bundles.webp","contentUrl":"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/07\/bundles.webp","width":30,"height":30},{"@type":"BreadcrumbList","@id":"https:\/\/redingtongroup.com\/cloud\/automated-security-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/redingtongroup.com\/cloud\/"},{"@type":"ListItem","position":2,"name":"Automated Security Response"}]},{"@type":"WebSite","@id":"https:\/\/redingtongroup.com\/cloud\/#website","url":"https:\/\/redingtongroup.com\/cloud\/","name":"cloud","description":"","publisher":{"@id":"https:\/\/redingtongroup.com\/cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/redingtongroup.com\/cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/redingtongroup.com\/cloud\/#organization","name":"cloud","url":"https:\/\/redingtongroup.com\/cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/redingtongroup.com\/cloud\/#\/schema\/logo\/image\/","url":"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/03\/logo-white.svg","contentUrl":"https:\/\/redingtongroup.com\/cloud\/wp-content\/uploads\/sites\/5\/2024\/03\/logo-white.svg","caption":"cloud"},"image":{"@id":"https:\/\/redingtongroup.com\/cloud\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/redingtongroup.com\/cloud\/wp-json\/wp\/v2\/pages\/10083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redingtongroup.com\/cloud\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/redingtongroup.com\/cloud\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/redingtongroup.com\/cloud\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/redingtongroup.com\/cloud\/wp-json\/wp\/v2\/comments?post=10083"}],"version-history":[{"count":0,"href":"https:\/\/redingtongroup.com\/cloud\/wp-json\/wp\/v2\/pages\/10083\/revisions"}],"wp:attachment":[{"href":"https:\/\/redingtongroup.com\/cloud\/wp-json\/wp\/v2\/media?parent=10083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}