Security Operation Centers
Security Operation Centers
Collected By
@Ibraheem_111
What Is a Cyber Attack?
SOC ~ logs
Triad of soc
Q: What should a SOC monitor?
Gartner coined the term ‘SIEM’ (pronounced “sim”) in a 2005 report called
“Improve IT Security With Vulnerability Management.”
What Is a SIEM?
A SIEM system not only identifies that an attack has happened, but allows you to see how
and why it happened as well.
Next-Generation SIEMs
Results can
be exported
in PDF, Excel,
and HTML.
We have
exported the
report in PDF.
SIEM capabilities
• Log Collection
• Normalization – Collecting logs and normalizing them into a standard format)
• Notifications and Alerts – Notifying the user when security threats are identified
• Security Incident Detection
Visibility
SIEM’s visibility capabilities help shed light on your users and third parties. With SIEM,
you can establish behavioral baselines for each user, device, application, and
third party as they conduct their business workflows. If they deviate from these
behaviors—as in an insider threat or credentials compromise—your SIEM solution
can detect it. Then it can alert your IT security team or freeze the activity or user in
more severe cases.
Managed SOC vs Dedicated SOC