{"id":9506,"date":"2022-01-21T10:00:00","date_gmt":"2022-01-21T17:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/credential-compromises\/"},"modified":"2023-03-10T09:19:49","modified_gmt":"2023-03-10T16:19:49","slug":"%ec%9e%90%ea%b2%a9-%ec%a6%9d%eb%aa%85-%ec%9c%a0%ec%b6%9c","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/","title":{"rendered":"\uc790\uaca9 \uc99d\uba85 \uc720\ucd9c \uc0ac\uace0 \ubc1c\uc0dd \uc2dc \ub300\uc751 \uc790\ub3d9\ud654 \ubc29\ubc95"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Person entering login credentials on a computer with security icon\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials.png 5561w, https:\/\/swimlane.com\/wp-content\/uploads\/Credentials-300x200.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Credentials-1024x683.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Credentials-768x512.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/Credentials-1536x1024.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/Credentials-2048x1365.png 2048w\" sizes=\"(max-width: 5561px) 100vw, 5561px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2022-01-21T10:00:00-07:00\">1\uc6d4 21, 2022<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">How to Automate Response to Credential Compromises<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('How%20to%20Automate%20Response%20to%20Credential%20Compromises').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fcredential-compromises%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=How%20to%20Automate%20Response%20to%20Credential%20Compromises&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fcredential-compromises%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fcredential-compromises%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fcredential-compromises%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p dir=\"ltr\">When enterprises implement <a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation\">low-code security automation solutions<\/a>, they have the opportunity to mature as a security team by expanding actionability beyond the security operations center (SOC). This means that they automate use cases beyond the basic security orchestration automation and response (SOAR) use cases, like <a href=\"https:\/\/swimlane.com\/blog\/your-first-soar-use-case-phishing-triage\">phishing.<\/a> Once security teams move high-volume work off their plate, they are able to automate security processes dealing with areas like identity, risk management, network, privacy, DevOps, and much more.<\/p>\n<p dir=\"ltr\">One Swimlane customer, who I\u2019ll refer to as Bank Mega, has improved its risk posture by automating response to credential compromises to prevent fraud. This use case came out of a situation where they detected an attempt of wire transfer fraud. By fully automating investigation and response to credential compromises, Bank Mega significantly reduced their dwell time, improved their risk posture, and saved analyst time. Between automating credential compromises and phishing alone, customers like Bank Mega typically save an entire full-time employee (FTE).<\/p>\n<p dir=\"ltr\"><strong>The Wire Transfer Fraud Event <\/strong><\/p>\n<p dir=\"ltr\">Bank Mega\u2019s customer reported that they received an invoice from Bank Mega\u2019s email system which asked the customer to redirect an invoice payment. Thankfully, the customer realized this email was \u201cphishy\u201d, so they did not pay the invoice. Instead, the customer reached out to Bank Mega with an updated and expanded vendor security assessment. It was sent using credentials found to have been exposed on a dumpsite on the \u201cDark Web&#8221;.<\/p>\n<p dir=\"ltr\"><strong>Low-Code Security Automation for Credential Monitoring <\/strong><\/p>\n<p dir=\"ltr\">Bank Mega knew that they needed a manageable solution to ensure that they, and their customers, aren\u2019t exposed to potential wire transfer fraud events like this again. To strengthen their security posture they subscribed to a credential compromise monitoring service, through <a href=\"https:\/\/www.recordedfuture.com\/solutions\/dark-web-monitoring\/\" target=\"_blank\" rel=\"noopener\">Recorded Future,<\/a> which they integrated with <a href=\"https:\/\/swimlane.com\/platform\/\">Swimlane<\/a>, their low-code security automation tool.<\/p>\n<p dir=\"ltr\"><strong>Swimlane and Recorded Future Demo <\/strong><\/p>\n<p dir=\"ltr\">This <a href=\"https:\/\/www.youtube.com\/watch?v=QoVJNyJfEVA&amp;list=PLinuRwpnsHafkF6jdUttw7bU0Wb7D9pxP&amp;index=25\" target=\"_blank\" rel=\"noopener\">Swimlane and Recorded Future demo<\/a> from our Co-founder and Chief Strategy Officer, Cody Cornell, and Director of Solution Architecture, Bryon Page, shows how this use case works in 5 simple steps.<\/p>\n<figure><iframe style=\"width: 500px; height: 281px;\" src=\"\/\/www.youtube.com\/embed\/QoVJNyJfEVA\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/figure>\n<p dir=\"ltr\">1. <em>Domain Retrieved<\/em><\/p>\n<p dir=\"ltr\">Bank Mega leveraged <a href=\"https:\/\/swimlane.com\/blog\/integration-spotlight-recorded-future\">Recorded Future\u2019s API plugin and Swimlane\u2019s low-code security<\/a> automation platform to scan specific identities and domains that needed to be monitored. Now, scans for attempted credential dumps automatically occur every 24 hours. Swimlane stack ranks the results as low, medium, high or critical based on the identity found.<\/p>\n<p dir=\"ltr\"><em>2. Identity Investigated <\/em><\/p>\n<p dir=\"ltr\">One way that Swimlane enriches Recorded Future\u2019s threat intelligence of compromised credentials is by querying Bank Mega\u2019s HR Management System (HRMS), to determine if the compromised credentials belong to an active user or former employee. If Swimlane identifies that the compromise involves an active user, it queries Bank Mega\u2019s Identity Access Management (IAM) provider to determine what systems or applications the user has access to. It knows this based on if the user is a system administrator, HR, legal, an individual contributor, etc. These findings are an example of how Swimlane scores credential compromise criticality.<\/p>\n<p dir=\"ltr\"><em>3. Password Hash Validated <\/em><\/p>\n<p dir=\"ltr\">At the same time that this is happening, Swimlane runs other queries to investigate if the compromised credentials are valid. It does this by taking the hashes that are dumped from various sources, like the Dark Web or collection lists, to understand if it is a valid hash.<\/p>\n<p><em>4. Slack Notification Sent<\/em><\/p>\n<p dir=\"ltr\">In cases when the compromise is a current employee and the credentials are confirmed to be valid, Bank Mega does not want to wait for the analyst to resolve this issue. So, they use Swimlane to send the user an automated message via Slack to let them know that their credentials will be reset in 30 minutes. Automated messages could also be sent through systems like email or SMS.<\/p>\n<p dir=\"ltr\"><em>5. Password Reset <\/em><\/p>\n<p dir=\"ltr\">Then, as the Slack notification indicated, Swimlane resets the password in 30 minutes. This action concludes the workflow and effectively resolves the credential compromise.<\/p>\n<p dir=\"ltr\"><strong>Results that reduce 3rd party risk <\/strong><\/p>\n<p dir=\"ltr\">The demo video shows the value of monitoring credentials for Bank Mega\u2019s own employees. Increasingly, we are seeing customers apply this use case for monitoring credentials belonging to 3rd party service providers or partners. These partners typically have access to corporate environments like vendor and partner portals. When companies add partners to their monitoring list, they can greatly reduce 3rd party risk associated with having interconnected systems.<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/swimlane.com\/about\/contact\/\">Reach out to us here<\/a> to learn more about how Swimlane and Recorded Future work together to automate your threat intelligence use cases.<\/p>\n\n\n\n<div class=\"bs-div bs-div-e11e2368c4ba8ac37e37188c67c90e4e1cd8f3a4 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-e11e2368c4ba8ac37e37188c67c90e4e1cd8f3a4 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022-01-21_12-25-02.jpg' class='img-fluid'   alt='Integration Spotlight banner featuring Recorded Future Identity Intelligence Module, monitoring identity exposure and credential dumps with ServiceNow integration, highlighting threat intelligence workflows and Active Directory validation in a layered cybersecurity environment.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"has-white-color has-text-color wp-block-heading\" id=\"h-integration-spotlight-recorded-future-identity-intelligence-module\">Integration Spotlight: Recorded Future Identity Intelligence Module<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Monitoring, Evaluating, and Responding to Credential Dumps<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-ae805f36c48892b75f02c9322b9d0de844ee4014\"><style>.bs-pro-button-p-btn-ae805f36c48892b75f02c9322b9d0de844ee4014 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/blog\/integration-spotlight-recorded-future\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Read More<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e523e30bbf8 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/mcafee-and-swimlane-to-automate-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 26, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Utilizing the McAfee product suite and Swimlane to automate incident response<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e523e30d2a5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/automate-threatgrid-investigation-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1\uc6d4 20, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automate ThreatGrid investigation and response with out-of-the-box Swimlane integrations<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e523e30e3be bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/automating-employee-off-boarding-process\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>5\uc6d4 8, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automate employee off-boarding processes with Swimlane<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9507,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[68,74],"class_list":["post-9506","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-news-and-events","blog-category-integrations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Automate Response to Credential Breaches<\/title>\n<meta name=\"description\" content=\"When enterprises implement low-code security automation solutions , they have the opportunity to mature as a security team.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc790\uaca9-\uc99d\uba85-\uc720\ucd9c\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Automate Response to Credential Compromises\" \/>\n<meta property=\"og:description\" content=\"When enterprises implement low-code security automation solutions , they have the opportunity to mature as a security team.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc790\uaca9-\uc99d\uba85-\uc720\ucd9c\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T16:19:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/\",\"name\":\"How to Automate Response to Credential Breaches\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials.png\",\"datePublished\":\"2022-01-21T17:00:00+00:00\",\"dateModified\":\"2023-03-10T16:19:49+00:00\",\"description\":\"When enterprises implement low-code security automation solutions , they have the opportunity to mature as a security team.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials.png\",\"width\":5561,\"height\":3707,\"caption\":\"Person entering login credentials on a computer with security icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Automate Response to Credential Compromises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc790\uaca9 \uc99d\uba85 \uc720\ucd9c \uc0ac\uace0 \ub300\uc751 \uc790\ub3d9\ud654 \ubc29\ubc95","description":"\uae30\uc5c5\uc774 \ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \uc194\ub8e8\uc158\uc744 \ub3c4\uc785\ud558\uba74 \ubcf4\uc548 \ud300\uc73c\ub85c\uc11c \ub354\uc6b1 \uc131\uc219\ud574\uc9c8 \uc218 \uc788\ub294 \uae30\ud68c\ub97c \uc5bb\uac8c \ub429\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc790\uaca9-\uc99d\uba85-\uc720\ucd9c\/","og_locale":"ko_KR","og_type":"article","og_title":"How to Automate Response to Credential Compromises","og_description":"When enterprises implement low-code security automation solutions , they have the opportunity to mature as a security team.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc790\uaca9-\uc99d\uba85-\uc720\ucd9c\/","og_site_name":"AI Security Automation","article_modified_time":"2023-03-10T16:19:49+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials-1024x683.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/","url":"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/","name":"\uc790\uaca9 \uc99d\uba85 \uc720\ucd9c \uc0ac\uace0 \ub300\uc751 \uc790\ub3d9\ud654 \ubc29\ubc95","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials.png","datePublished":"2022-01-21T17:00:00+00:00","dateModified":"2023-03-10T16:19:49+00:00","description":"\uae30\uc5c5\uc774 \ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \uc194\ub8e8\uc158\uc744 \ub3c4\uc785\ud558\uba74 \ubcf4\uc548 \ud300\uc73c\ub85c\uc11c \ub354\uc6b1 \uc131\uc219\ud574\uc9c8 \uc218 \uc788\ub294 \uae30\ud68c\ub97c \uc5bb\uac8c \ub429\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Credentials.png","width":5561,"height":3707,"caption":"Person entering login credentials on a computer with security icon"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/credential-compromises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"How to Automate Response to Credential Compromises"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9506\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/9507"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9506"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9506"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9506"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9506"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9506"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}