{"id":52140,"date":"2025-12-02T08:30:00","date_gmt":"2025-12-02T15:30:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=52140"},"modified":"2025-11-26T08:03:21","modified_gmt":"2025-11-26T15:03:21","slug":"%ec%9e%90%ec%9c%a8%ec%a0%81%ec%9d%b8-%ec%82%ac%ed%9a%8c-5%eb%8c%80-%ed%95%b5%ec%8b%ac-%ec%9a%94%ec%86%8c","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/","title":{"rendered":"\uc804\uc220 \uc790\ub3d9\ud654\uc5d0\uc11c \uc790\uc728\ud615 SOC\uae4c\uc9c0: \ubcf4\uc548 \ucc45\uc784\uc790\ub97c \uc704\ud55c 5\uac00\uc9c0 \ud575\uc2ec \uc694\uc18c \uccad\uc0ac\uc9c4"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Enterprise cityscape masthead representing global connectivity and secure digital infrastructure.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.webp 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-300x178.webp 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-1024x609.webp 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-768x457.webp 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-12-02T08:30:00-07:00\">12\uc6d4 2, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">From Tactical Automation to the Autonomous SOC: A 5-Pillar Blueprint for Security Leaders<\/h1>\n\n\n<div class=\"bs-div bs-div-1c02a909fcd723a1ec953772586290c0df1291b1 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('From%20Tactical%20Automation%20to%20the%20Autonomous%20SOC%3A%20A%205-Pillar%20Blueprint%20for%20Security%20Leaders').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fautonomous-soc-five-pillars%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=5%20Pillars%20of%20Autonomous%20SOC%3A%20A%20Blueprint%20for%20Security%20Leaders&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fautonomous-soc-five-pillars%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fautonomous-soc-five-pillars%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fautonomous-soc-five-pillars%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-from-tactical-automation-to-the-autonomous-soc-a-5-pillar-blueprint-for-security-leaders\">From Tactical Automation to the Autonomous SOC: A 5-Pillar Blueprint for Security Leaders<\/h2>\n\n\n\n<div class=\"bs-div bs-div-8d5175a48f2cd3ca3bdd0365063b72cdbcca3051 bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<p>The journey to an Autonomous SOC (Security Operations Center) is an incremental evolution, not a sudden transformation. It shifts the SOC operating model from reactive, manual processes to a proactive, AI-enabled orchestration framework. This transition is crucial for combating increasingly complex, AI-enabled offensive attacks. The autonomous SOC leverages intelligent automation to handle repetitive Tier-1 tasks, reserving human analysts for higher-value functions that require judgment and business context. In partnership with TAG Cyber, Swimlane outlines five practical pillars for autonomous SOC enablement, ranging from autonomous analysts to platform-orchestrated Architecture. The ultimate goal of this framework is to guide security leaders in achieving AI SOC maturity, ensuring a balance between AI efficiency and indispensable human oversight.<\/p>\n<\/div><\/div>\n\n\n\n<p>The conversation surrounding the modern security operations center (SOC) has undergone significant changes. For the past decade, we\u2019ve watched a steady shift toward increased automation in <a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation-benefits-for-secops\/\">security operations (SecOps).<\/a> Functions such as detection, response, and reporting, which were once purely manual, are now supported by intelligent platforms.<\/p>\n\n\n\n<p>At <a href=\"https:\/\/swimlane.com\/\">Swimlane<\/a>, we believe the evolution has reached a tipping point: practical, <a href=\"https:\/\/swimlane.com\/solutions\/security-automation\/\">AI-driven automation<\/a> in the SOC is fully scalable, highly reliable, and ready for widespread adoption.<\/p>\n\n\n\n<p>However, the vision of an &#8220;<a href=\"https:\/\/swimlane.com\/blog\/autonomous-soc-next-gen-security-operations-center\/\">autonomous SOC<\/a>&#8221; is often misunderstood. It is not about <em>eliminating<\/em> human involvement; it\u2019s about <em>changing the nature<\/em> of human involvement. It\u2019s a continual journey of improvement, not a final destination. The goal is to establish a balance where automation and AI handle the relentless, repetitive tasks, allowing analysts to focus their strategic judgment and business context on the most complex cases.<\/p>\n\n\n\n<p>For security leaders facing tight budgets and chronic shortages of skilled analysts, embracing this AI SOC evolution is no longer optional; it&#8217;s a requirement for resilience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-current-state-of-security-operations-centers-progress-but-unfinished-work\">The Current State of Security Operations Centers: Progress, but Unfinished Work<\/h2>\n\n\n\n<p>Most SOCs have already adopted some form of automation, having progressed beyond experimental projects to an expected baseline capability. Early tactical automation focused on simple tasks such as alert triage and ticket generation, providing relief from alert fatigue but not fundamentally altering the operating model.<\/p>\n\n\n\n<p>The next phase requires moving beyond tactical automation to AI-enabled orchestration. This is crucial for defending against continuous, adaptive, and AI-enabled attacks.<\/p>\n\n\n\n<p>To guide this progression, we partnered with TAG Cyber to develop the report <a href=\"https:\/\/swimlane.com\/resources\/reports\/autonomous-soc-enablement-guidebook\/\">\u201cAnalyst Report: Your Guidebook for Autonomous SOC Enablement,\u201d<\/a> which outlines five practical pillars of autonomous SOC maturity<strong> <\/strong>that frame how security operations will evolve.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-feaab0144675dee46d3d66f9546a9984647dd701\"><style>.bs-pro-button-p-btn-feaab0144675dee46d3d66f9546a9984647dd701 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/autonomous-soc-enablement-guidebook\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Analyst Report<\/a><\/span>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-5-practical-pillars-of-autonomous-soc-maturity\">The 5 Practical Pillars of Autonomous SOC Maturity<\/h2>\n\n\n\n<p>These pillars represent a progressive journey, with overall SOC autonomy successively increasing at each step.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-pillar-1-autonomous-analysts-with-human-in-the-loop-oversight\">Pillar 1: Autonomous Analysts with Human-in-the-Loop Oversight<\/h3>\n\n\n\n<p>The starting point is automating Tier-1 support. Intelligent agents can now handle nearly all basic tasks, triaging alerts, initiating investigations, and escalating incidents, ultimately freeing human analysts to focus on higher-value functions. Human oversight remains essential for complex cases, ensuring that actions do not disrupt business operations.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-pillar-2-continuous-investigation-and-adaptive-detection\">Pillar 2: Continuous Investigation and Adaptive Detection<\/h3>\n\n\n\n<p>The traditional model of reactive, alert-by-alert handling is unsustainable against modern threats. This pillar introduces an adaptive investigation model where telemetry is organized into ongoing narratives across time and systems. The AI-driven SOC tracks evolving evidence, moving from chasing isolated alerts to proactively recognizing attack progression, leveraging platforms like Swimlane Turbine to integrate inputs from <a href=\"https:\/\/swimlane.com\/blog\/siem-soar\/\">SIEMs<\/a>, XDRs, and <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-pillar-3-ai-guided-response-and-playbook-optimization\">Pillar 3: AI-Guided Response and Playbook Optimization<\/h3>\n\n\n\n<p>AI fundamentally changes incident response by guiding playbooks in real time. Rather than relying on static, often outdated instructions, AI adjusts workflows based on business rules, operational priorities, and the evolving nature of an incident. While AI accelerates responses, validation checkpoints can be implemented for sensitive or high-impact actions, ensuring human review where needed.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-pillar-4-integrated-compliance-and-risk-reporting\">Pillar 4: Integrated Compliance and Risk Reporting<\/h3>\n\n\n\n<p>This pillar embeds compliance and risk oversight into the operational fabric of the SOC, moving away from retrospective, manual reporting. Automation enables near-real-time alignment with frameworks such as NIST and ISO, simplifying the audit process and providing risk officers with immediate visibility through live dashboards.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-pillar-5-platform-orchestrated-ai-soc-architecture\">Pillar 5: Platform-Orchestrated AI SOC Architecture<\/h3>\n\n\n\n<p>The highest level of maturity sees orchestration become the central &#8220;mission control&#8221; for the entire security stack. This approach coordinates detection, response, reporting, and compliance, unifying security teams, tools, and telemetry. The result is reduced tool sprawl, streamlined workflows, and a measurable return on investment through consolidation and faster, automated coordination.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-swimlane-turbine-platform-engineered-for-the-future\">The Swimlane Turbine Platform: Engineered for the Future<\/h2>\n\n\n\n<p>The<a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\"> Swimlane Turbine<\/a> platform is designed to enable this journey towards an AI SOC today. Its agentic AI architecture enables organizations to adopt AI and automation together, starting with automating Tier-1 tasks and expanding to adaptive detection and AI-executed playbooks.<\/p>\n\n\n\n<p>Turbine serves as the orchestration layer, connecting diverse systems into a coherent, future-state AI SOC architecture. Looking ahead, Turbine\u2019s AI capabilities will rapidly expand, supporting fully autonomous AI agents across every SOC function and adjacent IT security domains, delivering intelligence, automation, and orchestration at scale.<\/p>\n\n\n\n<div class=\"bs-div bs-div-b7f4bee6a09adf7066acb898d675743cedf91291 bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<h4 class=\"wp-block-heading\" id=\"h-tldr-takeaways-for-security-leaders\" style=\"font-size:26px\">TLDR: Takeaways for Security Leaders<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Autonomous SOC is an evolution, not a revolution:<\/strong> Focus on incremental steps, starting with clearly defined, repetitive work.<\/li>\n\n\n\n<li><strong>The human role is elevated:<\/strong> Routine Tier-1 tasks are automated, but human analysts remain essential as supervisors of intelligent systems, providing context and handling exceptions. New roles, such as prompt engineers, will emerge.<\/li>\n\n\n\n<li><strong>Start now:<\/strong> Begin integrating AI-driven automation into existing workflows (e.g., Tier-1 triage and reporting).<\/li>\n\n\n\n<li><strong>Focus on orchestration:<\/strong> Leverage an agentic AI automation platform to unify your security teams, tools, and telemetry to achieve the highest level of maturity.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-accelerate-your-ai-soc-journey\">Accelerate Your AI SOC Journey<\/h2>\n\n\n\n<p>The trajectory toward increased AI SOC capabilities is unmistakable, and forward-leaning organizations are already realizing the benefits. The time to begin, or accelerate, your path toward AI adoption is now. The longer you wait, the harder it will be to close the gap.&nbsp;<\/p>\n\n\n\n<p>To learn more about how Swimlane can help you develop your own AI SOC, visit <a href=\"https:\/\/swimlane.com\/demo\">swimlane.com\/demo<\/a><\/p>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-939259790b0f59da6c2ffc38ae25254cd5645641 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-939259790b0f59da6c2ffc38ae25254cd5645641 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Your-Autonomous-SOC-GUide.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-analyst-report-your-guidebook-for-autonomous-soc-enablement\">Analyst Report: Your Guidebook for Autonomous SOC Enablement<\/h3>\n\n\n\n<p>Security leaders are under pressure to reduce costs, address skilled analyst shortages, and defend against continuous, adaptive AI-enabled attacks. This report provides the roadmap you need to advance your SOC maturity without compromising your human capital.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-98180447ef776f863c557281bdd9262b078238c5\"><style>.bs-pro-button-p-btn-98180447ef776f863c557281bdd9262b078238c5 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/autonomous-soc-enablement-guidebook\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/ai\/'><span class='tag-content'>AI<\/span><\/a><a href='https:\/\/swimlane.com\/ko\/tag\/automation\/'><span class='tag-content'>Automation<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-685a1b01df94aa255c335d03b57561a286e387aa bs-div---default bs-div--related-posts bs-div--right-sticky-related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-resources\">Related Resources<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69da09f83e16d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-next-gen-security-operations-center\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>What is an Autonomous SOC? The Future of Security Operations Centers<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69da09f83f43b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/ai-automation-for-sustainable-security-outcomes\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>The AI + Automation Equation: Unlock Sustainable Security Outcomes<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"bs-div bs-div-7a5be0abd58610f08cf9c9d564fee477ee90844a bs-div---default bs-div--blog-inner-single-post\"><div class=\"bs-div__inner     \">\t\t\t\t\t<div class=\"bs-post bs-post-69da09f840c2a bs-single-post---default bs-single-post--home-resources-alt enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/reports\/sans-soc-survey\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-SANS-SOC-Survey.png' class='img-fluid' alt='2025 SANS Security Operations Center Survey' title='OG SANS SOC Survey'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>2025 SANS Security Operations Center (SOC) Survey<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":52141,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":52142,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[202,236],"resource-type":[67],"resource-topic":[215],"resource-industry":[93],"blog-category":[],"class_list":["post-52140","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-ai","tag-automation","resource-type-blogs","resource-topic-ai","resource-industry-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 Pillars of Autonomous SOC: A Blueprint for Security Leaders<\/title>\n<meta name=\"description\" content=\"Fight AI-driven threats with an autonomous SOC powered by our 5-Pillar Blueprint for smarter automation and guided human oversight.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc790\uc728\uc801\uc778-\uc0ac\ud68c-5\ub300-\ud575\uc2ec-\uc694\uc18c\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Pillars of Autonomous SOC: A Blueprint for Security Leaders\" \/>\n<meta property=\"og:description\" content=\"Fight AI-driven threats with an autonomous SOC powered by our 5-Pillar Blueprint for smarter automation and guided human oversight.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc790\uc728\uc801\uc778-\uc0ac\ud68c-5\ub300-\ud575\uc2ec-\uc694\uc18c\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Image.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"5 Pillars of Autonomous SOC: A Blueprint for Security Leaders\" \/>\n<meta name=\"twitter:description\" content=\"Fight AI-driven threats with an autonomous SOC powered by our 5-Pillar Blueprint for smarter automation and guided human oversight.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/\",\"name\":\"5 Pillars of Autonomous SOC: A Blueprint for Security Leaders\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.webp\",\"datePublished\":\"2025-12-02T15:30:00+00:00\",\"description\":\"Fight AI-driven threats with an autonomous SOC powered by our 5-Pillar Blueprint for smarter automation and guided human oversight.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.webp\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.webp\",\"width\":1120,\"height\":666,\"caption\":\"Enterprise cityscape masthead representing global connectivity and secure digital infrastructure.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Tactical Automation to the Autonomous SOC: A 5-Pillar Blueprint for Security Leaders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc790\uc728\ud615 SOC\uc758 5\uac00\uc9c0 \ud575\uc2ec \uc694\uc18c: \ubcf4\uc548 \ucc45\uc784\uc790\ub97c \uc704\ud55c \uccad\uc0ac\uc9c4","description":"\ub2f9\uc0ac\uc758 5\uac00\uc9c0 \ud575\uc2ec \uc6d0\uce59\uc5d0 \uae30\ubc18\ud55c \uc790\uc728\ud615 SOC\ub97c \ud1b5\ud574 AI \uae30\ubc18 \uc704\ud611\uc5d0 \ub300\uc751\ud558\uace0, \ub354\uc6b1 \uc2a4\ub9c8\ud2b8\ud55c \uc790\ub3d9\ud654\uc640 \uc804\ubb38\uc801\uc778 \uc778\uac04 \uac10\ub3c5\uc744 \uc81c\uacf5\ud558\uc2ed\uc2dc\uc624.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc790\uc728\uc801\uc778-\uc0ac\ud68c-5\ub300-\ud575\uc2ec-\uc694\uc18c\/","og_locale":"ko_KR","og_type":"article","og_title":"5 Pillars of Autonomous SOC: A Blueprint for Security Leaders","og_description":"Fight AI-driven threats with an autonomous SOC powered by our 5-Pillar Blueprint for smarter automation and guided human oversight.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc790\uc728\uc801\uc778-\uc0ac\ud68c-5\ub300-\ud575\uc2ec-\uc694\uc18c\/","og_site_name":"AI Security Automation","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/OG-Image.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_title":"5 Pillars of Autonomous SOC: A Blueprint for Security Leaders","twitter_description":"Fight AI-driven threats with an autonomous SOC powered by our 5-Pillar Blueprint for smarter automation and guided human oversight.","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"5\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/","url":"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/","name":"\uc790\uc728\ud615 SOC\uc758 5\uac00\uc9c0 \ud575\uc2ec \uc694\uc18c: \ubcf4\uc548 \ucc45\uc784\uc790\ub97c \uc704\ud55c \uccad\uc0ac\uc9c4","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.webp","datePublished":"2025-12-02T15:30:00+00:00","description":"\ub2f9\uc0ac\uc758 5\uac00\uc9c0 \ud575\uc2ec \uc6d0\uce59\uc5d0 \uae30\ubc18\ud55c \uc790\uc728\ud615 SOC\ub97c \ud1b5\ud574 AI \uae30\ubc18 \uc704\ud611\uc5d0 \ub300\uc751\ud558\uace0, \ub354\uc6b1 \uc2a4\ub9c8\ud2b8\ud55c \uc790\ub3d9\ud654\uc640 \uc804\ubb38\uc801\uc778 \uc778\uac04 \uac10\ub3c5\uc744 \uc81c\uacf5\ud558\uc2ed\uc2dc\uc624.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.webp","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead.webp","width":1120,"height":666,"caption":"Enterprise cityscape masthead representing global connectivity and secure digital infrastructure."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/autonomous-soc-five-pillars\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"From Tactical Automation to the Autonomous SOC: A 5-Pillar Blueprint for Security Leaders"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/52140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/52140\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/52141"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=52140"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=52140"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=52140"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=52140"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=52140"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=52140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}