Orchestrate Framework Controls to Support Security Operations with Splunk SOAR
National Government Services is a federal health partner who leverages technology, advanced solutions and methodologies to significantly improve operational performance for their clients. For years, they have implemented a security orchestration, automation, and response (SOAR) tool such as Splunk Phantom to help their clients achieve faster and better results within the IT and security operation centers (SOC) — all while saving costs. A SOAR platform orchestrates security actions across a plethora of security products from detection, investigation, to response and automates manual repetitive tasks which otherwise would take hours.
Ben Hostetler, a Senior Information Security Advisor at National Government Services, shares with us how Splunk Phantom is helping their clients retain a high return on investment by reducing the mean time to resolution on some security events through automation.
Splunk Phantom leverages a few key capabilities to help IT and security teams save time, reduce cost, and increase efficiency. Orchestration allows disparate tools to work seamlessly together. Automation reduces human error and saves time. Integrated collaboration and machine learning allows you to communicate faster, while also staying focused on the mission at hand. Event and case management brings together connected artifacts and evidence for faster investigation. And lastly, dashboards and reports provide stakeholders a way to understand team performance and efficiencies. By using a SOAR tool, organizations can leverage security frameworks to build automated frameworks that work for them.
Designing Automated Workflows with Frameworks in Mind
There are many security frameworks in the industry that provide different recommendations for compliance and auditing. To name a few, The Healthcare Insurance Portability and Accountability Act (HIPAA), NIST-800-53, HITRUST are all well known standard frameworks.
Ben Hostetler shares with us how his team utilized framework controls to build manual or automated workflows:
- Identify the current process
- Design the workflow
- Develop supporting configurations
- Test, test, test!
- Document and assess
----------------------------------------------------
Thanks!
Kelly Huang
Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Splunk Security Content for Threat Detection & Response: November Recap

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

AI for Humans: A Beginner’s Field Guide

Splunk Security Content for Threat Detection & Response: November 2025 Update

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
