Building a Security Operations Center
building a SOC requires collaboration and communication among multiple functions (people), disparate security products (technology), and varying processes and procedures (processes)
https://finland.emc.com/collateral/white-papers/rsa-advanced-soc-solution-sans-soc-roadmap-white-paper.pdf
- The Five Characteristics of an Intelligence-Driven Security Operations Center
Key Challenges
Traditional security operations centers:
Rely primarily on prevention technologies, and rule and signature-based detection mechanisms that require prior knowledge of attacker methods, both of which
Treat intelligence (TI) as a one-way product to
Treat incident response as an exception-based process, versus a continuous one
Recommendations
Adapt a mindset that
an intelligence-driven SOC approach with these five characteristics:
use
use advanced analytics to
automate whenever
adopt an adaptive security architecture
proactively hunt and investigate
https://www.ciosummits.com/Online_Assets_Intel_Security_Gartner.pdf
- An information security operations center (or "SOC") is a location where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints)
are monitored , assessed, and defended.
Security Operations Center (SOC) - DIY or Outsource?
Discover ideas about Security Solutions
DTS Solution - Building a SOC (Security Operations Center)
What is a Security Operations Center (SOC)?
SOC Team Presentation 1 - Security Operations Center
Security Operation Center - Design & Build
- network operations center
( NOC) is one or more locations from whichcontrol is exercised over a computer, television broadcast, or telecommunications network.
Fortinet Security Fabric
Splunk: Using Big Data for Cybersecurity
Splunk Inc. provides the leading software platform for real-time Operational Intelligence.
How to configure Splunk Log Forwarder in McAfee ESM If you will be forwarding events from various devices through a syslog relay
Enterprise Security
(TVM) Threat and Vulnerability Management
(SOIR) security operations incident response
Real-Time Big Data Processing with Spark and MemSQL
Data Lake 3 .0, Part II: A Multi-Colored YARN
Best Practices for Building a Data Lake with Amazon S3
- You see servers and devices, apps and logs, traffic and clouds. We see
dataeverywhere . Splunk® offers the leading platform for Operational Intelligence.
http://www.splunk.com/
- Welcome to Apache Flume
Flume is a distributed, reliable, and available service for efficiently collecting, aggregating, and moving large amounts of log data. It has a simple and flexible architecture based on streaming data flows. It is robust and fault tolerant with tunable reliability mechanisms and many failover and recovery mechanisms. It uses a simple extensible data model that allows for online analytic applicatio
https://flume.apache.org/
Flume Architecture
Why Lambda Architecture in Big Data Processing
- What is
OpenSOC ?
The OpenSOC project is a collaborative open source development project dedicated to providing an extensible and scalable advanced security analytics tool. It has strong foundations in the Apache Hadoop Framework and values collaboration for high-quality community-based open source development
http://opensoc.github.io/
Navigating the maze of Cyber Security Intelligence and Analytics
Fluentd is an open source data collector for unified logging layer.
https://www.fluentd.org/
Building an Open Data Platform: Logging with Fluentd and Elasticsearch
Cloud Data Logging with Raspberry Pi