Chapter Abstract:
Summary Security operations center (SOC) is a centralized entity that monitors and defends an organization's information systems against intrusions. At a high level, an S...Show MoreMetadata
Chapter Abstract:
Summary
Security operations center (SOC) is a centralized entity that monitors and defends an organization's information systems against intrusions. At a high level, an SOC is responsible for three key activities: monitoring, detection, and response. An SOC typically has a hierarchical team structure with different roles and responsibilities. Selecting the correct SOC model is a major decision for every business since it can have a major influence on the success and effectiveness of security operations. Establishing business goals is a crucial step in selecting the best SOC model for a company. A company must comprehend its overall business goals and how they relate to cybersecurity before choosing an SOC model. While establishing an SOC, numerous key components must be considered, including SOC design principles, building blocks, staffing and organization, technology and tools, and processes and procedures. This chapter also presents an overview of the key concepts discussed in the subsequent chapters of this book.
Page(s): 1 - 19
Copyright Year: 2025
Edition: 1
ISBN Information: