8
Detective Controls
In the previous chapter, we understood the importance of preventive controls and what value they bring to an organization. Next, we will understand what detective controls are and how they complement the use of preventive controls in an organization. The objective for every blue team must be to balance the use of the various controls and deploy what is the right fit for its own organization.
The following topics will be discussed in detail in this chapter:
- What are detective controls?
- Types of detective controls
- Security Operations Center (SOC)
- Vulnerability testing
- Penetration testing
- Red teams
- Bug bounty
- Source code scanning
- Compliance scanning or hardening scans
- Tools for detective controls
What are detective controls? ...
Get Cybersecurity Blue Team Strategies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.