Building a Security Operations Center
building a SOC requires collaboration and communication among multiple functions (people), disparate security products (technology), and varying processes and procedures (processes)
https://finland.emc.com/collateral/white-papers/rsa-advanced-soc-solution-sans-soc-roadmap-white-paper.pdf
- The Five Characteristics of an Intelligence-Driven Security Operations Center
Key Challenges
Traditional security operations centers:
Rely primarily on prevention technologies, and rule and signature-based detection mechanisms that require prior knowledge of attacker methods, both of which
Treat intelligence (TI) as a one-way product to
Treat incident response as an exception-based process, versus a continuous one
Recommendations
Adapt a mindset that
an intelligence-driven SOC approach with these five characteristics:
use
use advanced analytics to
automate whenever
adopt an adaptive security architecture
proactively hunt and investigate
https://www.ciosummits.com/Online_Assets_Intel_Security_Gartner.pdf
- An information security operations center (or "SOC") is a location where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints)
are monitored , assessed, and defended.
Security Operations Center (SOC) - DIY or Outsource?
Discover ideas about Security Solutions
DTS Solution - Building a SOC (Security Operations Center)
What is a Security Operations Center (SOC)?
SOC Team Presentation 1 - Security Operations Center
Security Operation Center - Design & Build
- network operations center
( NOC) is one or more locations from whichcontrol is exercised over a computer, television broadcast, or telecommunications network.
Fortinet Security Fabric
Splunk: Using Big Data for Cybersecurity
Splunk Inc. provides the leading software platform for real-time Operational Intelligence.
How to configure Splunk Log Forwarder in McAfee ESM If you will be forwarding events from various devices through a syslog relay
Enterprise Security
(TVM) Threat and Vulnerability Management
(SOIR) security operations incident response
Real-Time Big Data Processing with Spark and MemSQL
Data Lake 3 .0, Part II: A Multi-Colored YARN
Best Practices for Building a Data Lake with Amazon S3
- You see servers and devices, apps and logs, traffic and clouds. We see
dataeverywhere . Splunk® offers the leading platform for Operational Intelligence.
http://www.splunk.com/
- Welcome to Apache Flume
Flume is a distributed, reliable, and available service for efficiently collecting, aggregating, and moving large amounts of log data. It has a simple and flexible architecture based on streaming data flows. It is robust and fault tolerant with tunable reliability mechanisms and many failover and recovery mechanisms. It uses a simple extensible data model that allows for online analytic applicatio
https://flume.apache.org/
Flume Architecture
Why Lambda Architecture in Big Data Processing
- What is
OpenSOC ?
The OpenSOC project is a collaborative open source development project dedicated to providing an extensible and scalable advanced security analytics tool. It has strong foundations in the Apache Hadoop Framework and values collaboration for high-quality community-based open source development
http://opensoc.github.io/
Navigating the maze of Cyber Security Intelligence and Analytics
Fluentd is an open source data collector for unified logging layer.
https://www.fluentd.org/
Building an Open Data Platform: Logging with Fluentd and Elasticsearch
Cloud Data Logging with Raspberry Pi
Nice blog... Big data security analytics define the benefits of this approach, examine use cases, and see how security big data analytics works.
ReplyDeletesecurity operation center
ReplyDeleteI think you would also be interested in application security testing , its categories and ethics etc.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteThis comment has been removed by the author.
ReplyDelete