O'Reilly logo

Security Operations Center: Building, Operating and Maintaining your SOC by Joey Muniz, Nadhem AlFardan, Gary McIntyre

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. The SOC Infrastructure

“It is not the beauty of a building you should look at; its the construction of the foundation that will stand the test of time.”—David Allan Coe

Security operations center (SOC) services should be accessed securely and reliably. Many of the systems used by a SOC contain confidential information that could negatively impact an organization if exposed. For example, network monitoring and vulnerability management tools could reveal weaknesses that an attacker could use to breach the organization and perhaps even to avoid detection. Data protection is also a requirement for many regulations that include processes for securing services associated with the SOC. Failure to meet such requirements could have negative ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required