Introduction to Security Operation Center
What is SOC / CSOC?
Some companies called it CSOC but most people have known it as SOC. This SOC word abbreviates as Security Operation Center or when about CSOC it abbreviates as Cyber Security Operation Center.
Why is SOC / CSOC?
What are the different approaches?
There are different approaches are available in the Security Operational Center. They are centralized, distributed, in-house, constituency, managed, and hybrid. For all of these, there are different kinds of backgrounds are available.
- Centralized - here there is one team and one central location which is close to HQ. This is the most common approach for the SOC and it will be available 24 x 7 and this is the most feasible way to conduct SOC.
- Distributed - there are multiple teams are available to conduct SOC operations in different locations. But their goal is common and it can be available 24 x 7 or 8-hour shits that follow the sun.
- In-house - in this approach, staff are the insiders and they are dedicated to the different tasks. They know the company environment better than anyone because they have access to all the systems.
- Constituency - here all the things are handled by the external SOC experts. Within that, there are two types as managed and unmanaged. Managed means the write access is available for the devices and unmanaged means no write access is available for the devices.
- Managed - in this approach, we can see active access on security appliances and a quick start with less apex. But here employees have less environmental knowledge about the scenario.
- Hybrid - this approach has the set of qualities that we can find in the other approaches and because of that, this is a hybrid version. Here we can see that centralized control and the quickest detection response time.
What are the techniques and procedures in SOC?
Within the SOC there are different kinds of techniques procedures use to achieve the goal. And all the things are handled according to that.
Scanning - network scanning
vulnerability scanning
port scanning
real-time monitoring
network monitoring
With all these SOC teams responsible for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.
Valuable ❤️❤️❤️
ReplyDelete❤️π€
ReplyDeleteGreat
ReplyDeleteπ♥️
ReplyDeleteWell Doneππ»♥️
ReplyDeleteGreat pieceπ€©
ReplyDeleteGreat work❤️
ReplyDeleteExcellent work
ReplyDeleteWell done!
ReplyDeleteGreat work π❤️
ReplyDeleteSuperb π₯❤️
ReplyDeleteSuperb ❤
ReplyDeleteπ€π€π
ReplyDeleteSuper ❤
ReplyDeleteππ
ReplyDeleteSuperbπ
ReplyDelete❤️❤️❤️
ReplyDeleteNiceπ
ReplyDeleteGood work π
ReplyDeleteAwesome π
ReplyDeleteGood ❤️
ReplyDeleteSuperb π
ReplyDeleteReally help full article. Well done π€
ReplyDeleteExcellent work ❤❤❤
ReplyDeleteInteresting π₯π
ReplyDelete❤
ReplyDeleteOn pointπ
ReplyDeleteInteresting
ReplyDeleteGood work ❤️
ReplyDelete❤️
ReplyDeleteGood job❤
ReplyDeletegood job keep it up!
ReplyDeleteBest as always
ReplyDelete❤️π₯
ReplyDeleteWowww π€
ReplyDelete