Chapter 2

Design a security operations strategy

Security operations are often thought of as the “cool” bit of security. Aside from the stereotype of people in black hoodies hunched over their keyboards, it is often the next thing that comes to mind when both the public and non-security stakeholders think about IT security. The general security operations stereotype is of many dedicated security operations center (SOC) analysts in an operations room with a big screen, a la War Games, where attacks are stopped in their tracks.

While aspects of this stereotype are indeed based on reality, crafting a modern security operations strategy ideally starts long before you hire a single SOC analyst. Before you can detect attacks, you need to be able to ...

Get Exam Ref SC-100 Microsoft Cybersecurity Architect now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.