Chapter 5. The SOC Infrastructure

“It is not the beauty of a building you should look at; its the construction of the foundation that will stand the test of time.”—David Allan Coe

Security operations center (SOC) services should be accessed securely and reliably. Many of the systems used by a SOC contain confidential information that could negatively impact an organization if exposed. For example, network monitoring and vulnerability management tools could reveal weaknesses that an attacker could use to breach the organization and perhaps even to avoid detection. Data protection is also a requirement for many regulations that include processes for securing services associated with the SOC. Failure to meet such requirements could have negative ...

Get Security Operations Center: Building, Operating and Maintaining your SOC now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.