{"id":41144,"date":"2024-09-05T14:59:27","date_gmt":"2024-09-05T20:59:27","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=41144"},"modified":"2026-03-09T02:17:51","modified_gmt":"2026-03-09T08:17:51","slug":"soc-%eb%8d%b0%ec%9d%b4%ed%84%b0-%ec%8a%a4%ed%82%a4%eb%a7%88","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/","title":{"rendered":"\ub370\uc774\ud130 \uc2a4\ud0a4\ub9c8\uc640 SOC\uc758 \ub85c\uc81c\ud0c0 \uc2a4\ud1a4"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Data Schema and the Rosetta Stone of the SOC\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-09-05T14:59:27-06:00\">9\uc6d4 5, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Data Schema and the Rosetta Stone of the SOC<\/h1>\n\n\n<div class=\"bs-div bs-div-4c0c357bf69b7e1367afb30b9d59be1945441399 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Chris_Mallow\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-09-05-at-6.24.05\u202fPM.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tChris Mallow\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Data%20Schema%20and%20the%20Rosetta%20Stone%20of%20the%20SOC').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsoc-data-schemas%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Data%20Schema%20%26%20the%20Rosetta%20Stone%20of%20the%20SOC%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsoc-data-schemas%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsoc-data-schemas%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsoc-data-schemas%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<p>Automation: techies love it because it frees up their increasingly limited time, and leaders love it because it helps them get better <a href=\"https:\/\/swimlane.com\/roi-calculator\/\">ROI<\/a> on both technology and human resources. So why aren\u2019t we just automating everything? Because <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> can still be difficult due to the data we have to work with and the various schemas it comes in. Simply put, data schemas are a way of organizing, relating, and containing data. They can be thought of as the languages that our technologies speak; just as humans speak many languages, the same is true for technology. But why is this, and how does <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> address this data challenge?<\/p>\n\n\n\n<p>Let\u2019s take a quick look back at the history of security operations (<a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Logs: We\u2019ve Seen This Movie Before<\/h2>\n\n\n\n<p>As<a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\"> security operations center (SOC) practitioners<\/a>, one of our top concerns has always been visibility, and that meant getting logs from everything. However, while we had a standard, proven, and well-documented protocol for moving logs around (syslog) that helped us get those logs where we wanted them, what we did NOT have was a standard format for logs. Every developer of every application, whether it related to security or not, could put their logs into whatever format they felt like; they only had to TRANSMIT via the syslog protocol, which they nearly always did.<\/p>\n\n\n\n<p>So, getting the logs from the source to the aggregator, whether it was a syslog collector or later on, a <a href=\"https:\/\/swimlane.com\/blog\/siem-soar\/\">SIEM<\/a> system, was simple. But once it got there, we were dependent on either built-in log parsing logic to automatically put the relevant data into the meaningful fields, or we had to write those parsers ourselves. If we didn\u2019t, we couldn\u2019t make sense of what we were seeing, and that made the data cumbersome and nearly useless.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SOAR: The More Things Change\u2026<\/h2>\n\n\n\n<p>We still see this challenge today with <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR platforms<\/a>, because they\u2019re doing the same things with the same kinds of data, but with enhanced and extended purposes. In the past, we just wanted to pull and organize \u201cstructured data,\u201d i.e., logs. Today, the problem entails further challenges because we aren\u2019t just pulling structured data and reading it; we\u2019re also dealing with increasing amounts of what I would call semi-structured data via a myriad of <a href=\"https:\/\/swimlane.com\/blog\/common-rest-api-authentication-methods-explained-2\/\">REST APIs<\/a>, plus we\u2019re ingesting via webhooks, as well. Keep reading below to hear some of the ways that AI-enhanced security automation platforms are different, and helping to address this classic SOAR and <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">SOC challenge.<\/a>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dealing With Signals\u2026<\/h2>\n\n\n\n<p>Automation requires some sort of \u201csignal\u201d to trigger additional actions. Signals in SecOps are usually alerts of some sort, like those that originate from endpoint detection systems, SIEM systems, next-gen firewalls, or <a href=\"https:\/\/swimlane.com\/blog\/what-is-cloud-security-automation\/\">cloud security<\/a> systems. However, signals can take other forms, such as vulnerability findings, <a href=\"https:\/\/swimlane.com\/blog\/what-is-attack-surface-management\/\">attack surface<\/a> events, OT response alerts, or even process-oriented events like new user requests for identity provisioning and new build requests that require application scanning.<\/p>\n\n\n\n<p>The trouble with these signals, just like our old logs, is that they\u2019re written by disparate developers with different requirements and no specific standard or framework. As a result, <a href=\"https:\/\/swimlane.com\/blog\/real-challenges-facing-secops\/\">SecOps teams<\/a> often face the same kinds of challenges in dealing with them as they look to automate: what is important in this blob of data I just received?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u2026And Layering On Actions<\/h2>\n\n\n\n<p>What\u2019s more, we\u2019re often pushing data and even actions back to a different set of <a href=\"https:\/\/swimlane.com\/blog\/common-rest-api-authentication-methods-explained-2\/\">REST APIs<\/a> or webhooks. Just like with syslog for logs, they all standardize on JSON-over-HTTP as the primary transfer mechanism, but each system keeps their own unique endpoints, fields, and data format expectations. That means that now we not only have to parse out data inbound from source tools, but also properly parsed and formatted outbound as well, so we can take effective and efficient actions with other tools that are critical parts of our process and its workflows. If the receiving tool can\u2019t understand what we\u2019re sending, it will simply error out or worse\u2026\u201dgarbage in, garbage out,\u201d indeed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Can Turbine Help?<\/h2>\n\n\n\n<p>So, what can you find in <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> that helps builders and orchestrators more quickly and easily overcome these constant data format challenges?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Vendor-Specific Components<\/h3>\n\n\n\n<p><a href=\"https:\/\/turbine-marketplace.swimlane.com\/en-US\/listing?pl=3158&amp;page=1&amp;locale=en-US\">Components <\/a>represent a major upgrade within <a href=\"https:\/\/swimlane.com\/platform\/adaptable-playbooks\/\">Turbine Canvas<\/a>, the low-code playbook building studio. They have an increasingly important role to play, especially when we\u2019re talking about ingesting data. Swimlane has always focused on creating the necessary connectors and integrations for any tools our customers use. We\u2019re taking that commitment to the next level with vendor-specific components.<\/p>\n\n\n\n<p>Think of these vendor components as connectors-on-steroids. Sure, they provide the connector and built-in actions to interact with those systems, but they also include a set of playbooks that apply back-end business logic to automatically extract, transform, format, and map the data in ways that make it quickly and easily available anywhere in Turbine. Thus, for the majority of common security applications and platforms, data ingestion and integration can be accomplished in minutes rather than hours or days.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Simple Native Actions for Data Manipulation<\/h3>\n\n\n\n<p>Swimlane Turbine\u2019s native actions have always provided game-changing abilities when it comes to dealing with data, and we stay true to that with our data manipulation native actions. Turbine\u2019s primary transformation capabilities are built on JSONata, which can sometimes be tricky to navigate, but we have GUI-fied it so that even those who aren\u2019t familiar with the ins and outs of extended JSONata transforms can still build them quickly and easily.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hero AI Schema Inference<\/h3>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/platform\/ai\/\">Swimlane Hero AI<\/a> is a collection of AI-enhanced innovations available within the Turbine security automation platform. Schema inference is one of the first features where Swimlane applied artificial intelligence in ways that really level-up the game for using AI-enhanced security automation as a true force multiplier directly within an application. Let\u2019s say you have a new data input from an action but there isn\u2019t a component available, so it just comes in as a raw blob of JSON.<\/p>\n\n\n\n<p>Hero AI schema inference knows what fields and field types you use in Turbine, then can read that incoming JSON and automatically suggest mappings that match the relevant input fields into the schema fields you\u2019re already dependent on. Even better, it does this without you asking directly for help.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hero AI Text-to-Code Chatbots<\/h3>\n\n\n\n<p>Chatbots provide a proven capability to quickly and easily integrate the power of AI into everyday work. They are particularly helpful when it comes to simplifying complex user needs. Schema mapping is one thing, but often we as builders still need to be able to take more advanced actions with the data we\u2019re handling in our processes. To make this easier, we leverage Hero AI\u2019s text-to-code chatbots in Turbine to allow users to ask for specific data transformation and format needs, but translated into Python.<\/p>\n\n\n\n<p>For example, the user can simply ask the Hero AI chatbot: \u201cWrite a transform in Python that extracts the fields \u2018src_addr\u2019, \u2018dst_addr\u2019, \u2018application\u2019, and \u2018ts\u2019 from an input, format the contents of the \u2018ts\u2019 field into an ISO 8601 format, and verify that the \u2018src_addr\u2019 and \u2018dst_addr\u2019 fields are not RFC 1918 addresses.\u201d The chatbot would then respond with the relevant Python code for the user to apply as needed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Never Settle for The SecOps Status Quo&nbsp;&nbsp;<\/h2>\n\n\n\n<p>You need your <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> platform to be as flexible as you need, but also as simple as possible. This balance is important so that more of your staff can take advantage of it. This also requires dealing with flexible and diverse datasets in a way that is likewise simple and manageable. The combined features and functionality outlined above allow Turbine to act as the Rosetta Stone of SecOps, enabling our customers to strike the perfect balance of flexibility and simplicity. Our commitment to Turbine\u2019s low-code paradigm proves that <a href=\"https:\/\/swimlane.com\/blog\/five-signs-youre-using-good-automation\/\">our platform is never merely \u201cgood enough\u201d.<\/a><\/p>\n\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-538f96cc32001eb3f217055402e9b57124417157 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-538f96cc32001eb3f217055402e9b57124417157 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/SANS-Top-SOC-challenges-graph.jpg' class='img-fluid'   alt='SANS SOC Survey | Swimlane ' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-sans-security-operations-center-survey\">SANS Security Operations Center Survey<\/h3>\n\n\n\n<p>Security Operations Centers (SOC)&nbsp;continue to evolve and mature their capabilities, architectures, and management strategies as the threat landscape evolves. The 2024 SANS SOC Survey, written by Chris Crowley, analyzes data from global&nbsp;SOC teams&nbsp;to report on common challenges and how leaders intend to recalibrate near and long-term plans.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-91c69999ca73190561f50c01912fdb4007439cff\"><style>.bs-pro-button-p-btn-91c69999ca73190561f50c01912fdb4007439cff .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/sans-soc-survey\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/soc\/'><span class='tag-content'>SOC<\/span><\/a><a href='https:\/\/swimlane.com\/ko\/tag\/platform\/'><span class='tag-content'>platform<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dee334eec45 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/vulnerability-and-patch-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>3\uc6d4 3, 2026<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Vulnerability Management vs. Patch Management Explained<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dee334f0350 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\uc6d4 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Swimlane ARMOR Framework<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dee334f16e9 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\uc6d4 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":85,"featured_media":41145,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":41146,"learn_more_label":"","image_alt_text":"Data Schema and the Rosetta Stone of the SOC","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[199,250],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75],"class_list":["post-41144","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soc","tag-platform","resource-type-blogs","blog-category-security-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Schema &amp; the Rosetta Stone of the SOC | Swimlane<\/title>\n<meta name=\"description\" content=\"Data schemas are a way of organizing, relating, and containing data. But why are data schemas useful? How does Swimlane Turbine address this data challenge? Let&#039;s find out.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/soc-\ub370\uc774\ud130-\uc2a4\ud0a4\ub9c8\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Schema &amp; the Rosetta Stone of the SOC | Swimlane\" \/>\n<meta property=\"og:description\" content=\"SOC management is crucial to upholding your organization&#039;s overall security posture. Learn the five ways Swimlane can help in managing security operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/soc-\ub370\uc774\ud130-\uc2a4\ud0a4\ub9c8\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T08:17:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Data Schema &amp; the Rosetta Stone of the SOC | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"Data schemas are a way of organizing, relating, and containing data. But why are data schemas useful? How does Swimlane Turbine address this data challenge? Let&#039;s find out.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile-4.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/\",\"name\":\"Data Schema & the Rosetta Stone of the SOC | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7.jpg\",\"datePublished\":\"2024-09-05T20:59:27+00:00\",\"dateModified\":\"2026-03-09T08:17:51+00:00\",\"description\":\"Data schemas are a way of organizing, relating, and containing data. But why are data schemas useful? How does Swimlane Turbine address this data challenge? Let's find out.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7.jpg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7.jpg\",\"width\":1120,\"height\":666,\"caption\":\"Data Schema and the Rosetta Stone of the SOC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Schema and the Rosetta Stone of the SOC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\ub370\uc774\ud130 \uc2a4\ud0a4\ub9c8\uc640 SOC\uc758 \ub85c\uc81c\ud0c0 \uc2a4\ud1a4 | \uc2a4\uc714\ub808\uc778","description":"\ub370\uc774\ud130 \uc2a4\ud0a4\ub9c8\ub294 \ub370\uc774\ud130\ub97c \uad6c\uc131\ud558\uace0, \uc11c\ub85c \uc5f0\uad00\uc2dc\ud0a4\uace0, \ub2f4\ub294 \ubc29\ubc95\uc785\ub2c8\ub2e4. \uadf8\ub807\ub2e4\uba74 \ub370\uc774\ud130 \uc2a4\ud0a4\ub9c8\ub294 \uc65c \uc720\uc6a9\ud560\uae4c\uc694? \uc2a4\uc714\ub808\uc778 \ud130\ube48\uc740 \uc774\ub7ec\ud55c \ub370\uc774\ud130 \ubb38\uc81c\ub97c \uc5b4\ub5bb\uac8c \ud574\uacb0\ud560\uae4c\uc694? \ud568\uaed8 \uc54c\uc544\ubcf4\uaca0\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/soc-\ub370\uc774\ud130-\uc2a4\ud0a4\ub9c8\/","og_locale":"ko_KR","og_type":"article","og_title":"Data Schema & the Rosetta Stone of the SOC | Swimlane","og_description":"SOC management is crucial to upholding your organization's overall security posture. Learn the five ways Swimlane can help in managing security operations.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/soc-\ub370\uc774\ud130-\uc2a4\ud0a4\ub9c8\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-09T08:17:51+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile-4.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Data Schema & the Rosetta Stone of the SOC | Swimlane","twitter_description":"Data schemas are a way of organizing, relating, and containing data. But why are data schemas useful? How does Swimlane Turbine address this data challenge? Let's find out.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/SocialTile-4.jpg","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/","url":"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/","name":"\ub370\uc774\ud130 \uc2a4\ud0a4\ub9c8\uc640 SOC\uc758 \ub85c\uc81c\ud0c0 \uc2a4\ud1a4 | \uc2a4\uc714\ub808\uc778","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7.jpg","datePublished":"2024-09-05T20:59:27+00:00","dateModified":"2026-03-09T08:17:51+00:00","description":"\ub370\uc774\ud130 \uc2a4\ud0a4\ub9c8\ub294 \ub370\uc774\ud130\ub97c \uad6c\uc131\ud558\uace0, \uc11c\ub85c \uc5f0\uad00\uc2dc\ud0a4\uace0, \ub2f4\ub294 \ubc29\ubc95\uc785\ub2c8\ub2e4. \uadf8\ub807\ub2e4\uba74 \ub370\uc774\ud130 \uc2a4\ud0a4\ub9c8\ub294 \uc65c \uc720\uc6a9\ud560\uae4c\uc694? \uc2a4\uc714\ub808\uc778 \ud130\ube48\uc740 \uc774\ub7ec\ud55c \ub370\uc774\ud130 \ubb38\uc81c\ub97c \uc5b4\ub5bb\uac8c \ud574\uacb0\ud560\uae4c\uc694? \ud568\uaed8 \uc54c\uc544\ubcf4\uaca0\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7.jpg","width":1120,"height":666,"caption":"Data Schema and the Rosetta Stone of the SOC"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/soc-data-schemas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Data Schema and the Rosetta Stone of the SOC"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/41144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/85"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/41144\/revisions"}],"predecessor-version":[{"id":54767,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/41144\/revisions\/54767"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/41145"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=41144"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=41144"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=41144"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=41144"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=41144"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=41144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}