Summary

In this chapter, we learned that the security operations center (SOC) serves as your centralized view into your overall enterprise organizational infrastructure.

In this chapter, we discussed:

  • What the responsibilities of the security operations center include
  • Management of security operations center tools
  • Design considerations for security operations center tools
  • Personnel roles in the security operations center
  • Processes and procedures required to run a security operations center
  • Internal versus outsourced security operations center

In the next chapter, we will discuss information security architecture concepts and implementation steps towards implementing an effective, well-integrated information security architecture program.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.128.30.77