O'Reilly logo

Designing and Building Security Operations Center by David Nathans

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix C

Types of functions and services that can be performed in a SOC.
Each service can be provided in one or more of five categories:
 Network
 Host
 Application
 Data
 Intelligence
Application securityApplication whitelistingAudit data distributionAuthentication managementBehavioral monitoringBinary whitelistingBlackhole routingBusiness liaisonBusiness continuityCall center activitiesCommunicate with executives or outside law enforcementContent creation, management, and auditingDatabase monitoringDDOS mitigationDisaster recoveryDevice monitoring and managementeDiscoveryEmergency announcements and communicationsEmerging threat researchEncryption/certificate services managementEndpoint identityEndpoint managementForensic analysis ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required