The Modern Security Operations Center

Specificaties
E-book, blz. | Engels
Pearson Education | e druk, 2021
ISBN13: 9780135619902
Rubricering
Pearson Education e druk, 2021 9780135619902
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services

This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.

Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation.

This guide will be indispensable for everyone responsible for delivering security services—managers and cybersecurity professionals alike.

* Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology
* Identify, recruit, interview, onboard, and grow an outstanding SOC team
* Thoughtfully decide what to outsource and what to insource 
* Collect, centralize, and use both internal data and external threat intelligence
* Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts
* Reduce future risk by improving incident recovery and vulnerability management
* Apply orchestration and automation effectively, without just throwing money at them
* Position yourself today for emerging SOC technologies

Specificaties

ISBN13:9780135619902
Taal:Engels
Bindwijze:e-book

Inhoudsopgave

Preface <br> Chapter 1: Introducing Security Operations and the SOC <br>Introducing the SOC <br>Factors Leading to a Dysfunctional SOC <br>Cyberthreats <br>Investing in Security <br>The Impact of a Breach <br>Establishing a Baseline <br>&nbsp;&nbsp;&nbsp; The Impact of Change <br>Fundamental Security Capabilities <br>&nbsp;&nbsp;&nbsp; Signature Detection <br>&nbsp;&nbsp;&nbsp; Behavior Detection <br>&nbsp;&nbsp;&nbsp; Anomaly Detection <br>&nbsp;&nbsp;&nbsp; Best of Breed vs. Defense in Depth <br>Standards, Guidelines, and Frameworks <br>&nbsp;&nbsp;&nbsp; NIST Cybersecurity Framework <br>&nbsp;&nbsp;&nbsp; ISO 3100:2018 <br>&nbsp;&nbsp;&nbsp; FIRST Service Frameworks <br>&nbsp;&nbsp;&nbsp; Applying Frameworks <br>Industry Threat Models <br>&nbsp;&nbsp;&nbsp; The Cyber Kill Chain Model <br>&nbsp;&nbsp;&nbsp; The Diamond Model <br>&nbsp;&nbsp;&nbsp; MITRE ATT&amp;CK Model <br>&nbsp;&nbsp;&nbsp; Choosing a Threat Model <br>Vulnerabilities and Risk <br>&nbsp;&nbsp;&nbsp; Endless Vulnerabilities <br>Business Challenges <br>In-House vs. Outsourcing <br>&nbsp;&nbsp;&nbsp; Services Advantages <br>&nbsp;&nbsp;&nbsp; Services Disadvantages <br>&nbsp;&nbsp;&nbsp; Hybrid Services <br>SOC Services <br>SOC Maturity Models <br>&nbsp;&nbsp;&nbsp; SOC Maturity Assessment <br>&nbsp;&nbsp;&nbsp; SOC Program Maturity <br>SOC Goals Assessment <br>&nbsp;&nbsp;&nbsp; Defining Goals <br>&nbsp;&nbsp;&nbsp; SOC Goals Ranking <br>&nbsp;&nbsp;&nbsp; Threats Ranking <br>&nbsp;&nbsp;&nbsp; SOC Goals Assessment Summarized <br>SOC Capabilities Assessment <br>&nbsp;&nbsp;&nbsp; Capability Maps <br>&nbsp;&nbsp;&nbsp; SOC Capabilities Gaps Analysis <br>&nbsp;&nbsp;&nbsp; Capability Map Next Steps <br>SOC Development Milestones <br>Summary <br>References <br> Chapter 2: Developing a Security Operations Center <br>Mission Statement and Scope Statement <br>&nbsp;&nbsp;&nbsp; Developing Mission and Scope Statements <br>&nbsp;&nbsp;&nbsp; SOC Scope Statement <br>Developing a SOC <br>SOC Procedures <br>&nbsp;&nbsp;&nbsp; Designing Procedures <br>Security Tools <br>&nbsp;&nbsp;&nbsp; Evaluating Vulnerabilities <br>&nbsp;&nbsp;&nbsp; Preventive Technologies <br>&nbsp;&nbsp;&nbsp; Detection Technologies <br>&nbsp;&nbsp;&nbsp; Mobile Device Security Concerns <br>Planning a SOC <br>&nbsp;&nbsp;&nbsp; Capacity Planning <br>&nbsp;&nbsp;&nbsp; Developing a Capacity Plan <br>Designing a SOC Facility <br>&nbsp;&nbsp;&nbsp; Physical SOC vs. Virtual SOC <br>&nbsp;&nbsp;&nbsp; SOC Location <br>&nbsp;&nbsp;&nbsp; SOC Interior <br>&nbsp;&nbsp;&nbsp; SOC Rooms <br>&nbsp;&nbsp;&nbsp; SOC Computer Rooms <br>&nbsp;&nbsp;&nbsp; SOC Layouts <br>Network Considerations <br>&nbsp;&nbsp;&nbsp; Segmentation <br>&nbsp;&nbsp;&nbsp; Logical Segmentation <br>&nbsp;&nbsp;&nbsp; Choosing Segmentation <br>&nbsp;&nbsp;&nbsp; Client/Server Segmentation <br>&nbsp;&nbsp;&nbsp; Active Directory Segmentation <br>&nbsp;&nbsp;&nbsp; Throughput <br>&nbsp;&nbsp;&nbsp; Connectivity and Redundancy <br>Disaster Recovery <br>Security Considerations <br>&nbsp;&nbsp;&nbsp; Policy and Compliance <br>&nbsp;&nbsp;&nbsp; Network Access Control <br>&nbsp;&nbsp;&nbsp; Encryption <br>Internal Security Tools <br>&nbsp;&nbsp;&nbsp; Intrusion Detection and Prevention <br>&nbsp;&nbsp;&nbsp; Network Flow and Capturing Packets <br>&nbsp;&nbsp;&nbsp; Change Management <br>&nbsp;&nbsp;&nbsp; Host Systems <br>Guidelines and Recommendations for Securing Your SOC Network <br>&nbsp;&nbsp;&nbsp; Tool Collaboration <br>SOC Tools <br>&nbsp;&nbsp;&nbsp; Reporting and Dashboards <br>&nbsp;&nbsp;&nbsp; Throughput and Storage <br>&nbsp;&nbsp;&nbsp; Centralized Data Management <br>Summary <br>References <br> Chapter 3: SOC Services <br>Fundamental SOC Services <br>&nbsp;&nbsp;&nbsp; SOC Challenges <br>The Three Pillars of Foundational SOC Support Services <br>&nbsp;&nbsp;&nbsp; Pillar 1: Work Environment <br>&nbsp;&nbsp;&nbsp; Pillar 2: People <br>&nbsp;&nbsp;&nbsp; Pillar 3: Technology <br>&nbsp;&nbsp;&nbsp; Evaluating the Three Pillars of Foundational SOC Support Services <br>SOC Service Areas <br>&nbsp;&nbsp;&nbsp; FIRST’s CSIRT <br>&nbsp;&nbsp;&nbsp; Developing SOC Service Areas <br>&nbsp;&nbsp;&nbsp; In-House Services vs. External Services <br>&nbsp;&nbsp;&nbsp; Contracted vs. Employee Job Roles <br>SOC Service Job Goals <br>&nbsp;&nbsp;&nbsp; Resource Planning <br>Service Maturity: If You Build It, They Will Come <br>SOC Service 1: Risk Management <br>&nbsp;&nbsp;&nbsp; Four Responses to Risk <br>&nbsp;&nbsp;&nbsp; Reducing Risk <br>&nbsp;&nbsp;&nbsp; Addressing Risk <br>SOC Service 2: Vulnerability Management <br>&nbsp;&nbsp;&nbsp; Vulnerability Management Best Practice <br>&nbsp;&nbsp;&nbsp; Vulnerability Scanning Tools <br>&nbsp;&nbsp;&nbsp; Penetration Testing <br>SOC Service 3: Compliance <br>&nbsp;&nbsp;&nbsp; Meeting Compliance with Audits <br>SOC Service 4: Incident Management <br>&nbsp;&nbsp;&nbsp; NIST Special Publication 800-61 Revision 2 <br>&nbsp;&nbsp;&nbsp; Incident Response Planning <br>&nbsp;&nbsp;&nbsp; Incident Impact <br>&nbsp;&nbsp;&nbsp; Playbooks <br>SOC Service 5: Analysis <br>&nbsp;&nbsp;&nbsp; Static Analysis <br>&nbsp;&nbsp;&nbsp; Dynamic Analysis <br>SOC Service 6: Digital Forensics <br>SOC Service 7: Situational and Security Awareness <br>&nbsp;&nbsp;&nbsp; User Training <br>SOC Service 8: Research and Development <br>Summary <br>References <br> Chapter 4: People and Process <br>Career vs. Job <br>Developing Job Roles <br>&nbsp;&nbsp;&nbsp; General Schedule Pay Scale <br>&nbsp;&nbsp;&nbsp; IT Industry Job Roles <br>&nbsp;&nbsp;&nbsp; Common IT Job Roles <br>SOC Job Roles <br>&nbsp;&nbsp;&nbsp; Security Analyst <br>&nbsp;&nbsp;&nbsp; Penetration Tester <br>&nbsp;&nbsp;&nbsp; Assessment Officer <br>&nbsp;&nbsp;&nbsp; Incident Responder <br>&nbsp;&nbsp;&nbsp; Systems Analyst <br>&nbsp;&nbsp;&nbsp; Security Administrator <br>&nbsp;&nbsp;&nbsp; Security Engineer <br>&nbsp;&nbsp;&nbsp; Security Trainer <br>&nbsp;&nbsp;&nbsp; Security Architect <br>&nbsp;&nbsp;&nbsp; Cryptographer/Cryptologist <br>&nbsp;&nbsp;&nbsp; Forensic Engineer <br>&nbsp;&nbsp;&nbsp; Chief Information Security Officer <br>NICE Cybersecurity Workforce Framework <br>&nbsp;&nbsp;&nbsp; Nice Framework Components <br>Role Tiers <br>SOC Services and Associated Job Roles <br>&nbsp;&nbsp;&nbsp; Risk Management Service <br>&nbsp;&nbsp;&nbsp; Vulnerability Management Service <br>&nbsp;&nbsp;&nbsp; Incident Management Service <br>&nbsp;&nbsp;&nbsp; Analysis Service <br>&nbsp;&nbsp;&nbsp; Compliance Service <br>&nbsp;&nbsp;&nbsp; Digital Forensics Service <br>&nbsp;&nbsp;&nbsp; Situational and Security Awareness Service <br>&nbsp;&nbsp;&nbsp; Research and Development Service <br>Soft Skills <br>&nbsp;&nbsp;&nbsp; Evaluating Soft Skills <br>&nbsp;&nbsp;&nbsp; SOC Soft Skills <br>Security Clearance Requirements <br>Pre-Interviewing <br>Interviewing <br>&nbsp;&nbsp;&nbsp; Interview Prompter <br>&nbsp;&nbsp;&nbsp; Post Interview <br>Onboarding Employees <br>&nbsp;&nbsp;&nbsp; Onboarding Requirements <br>Managing People <br>Job Retention <br>Training <br>&nbsp;&nbsp;&nbsp; Training Methods <br>Certifications <br>Company Culture <br>Summary <br>References <br> Chapter 5: Centralizing Data <br>Data in the SOC <br>&nbsp;&nbsp;&nbsp; Strategic and Tactical Data <br>&nbsp;&nbsp;&nbsp; Data Structure <br>&nbsp;&nbsp;&nbsp; Data Types <br>&nbsp;&nbsp;&nbsp; Data Context <br>Data-Focused Assessment <br>&nbsp;&nbsp;&nbsp; Data Assessment Example: Antivirus <br>&nbsp;&nbsp;&nbsp; Threat Mapping Data <br>&nbsp;&nbsp;&nbsp; Applying Data Assessments to SOC Services <br>Logs <br>&nbsp;&nbsp;&nbsp; Log Types <br>&nbsp;&nbsp;&nbsp; Log Formats <br>Security Information and Event Management <br>&nbsp;&nbsp;&nbsp; SIEM Data Processing <br>&nbsp;&nbsp;&nbsp; Data Correlation <br>&nbsp;&nbsp;&nbsp; Data Enrichment <br>&nbsp;&nbsp;&nbsp; SIEM Solution Planning <br>&nbsp;&nbsp;&nbsp; SIEM Tuning <br>Troubleshooting SIEM Logging <br>&nbsp;&nbsp;&nbsp; SIEM Troubleshooting Part 1: Data Input <br>&nbsp;&nbsp;&nbsp; SIEM Troubleshooting Part 2: Data Processing and Validation <br>&nbsp;&nbsp;&nbsp; SIEM Troubleshooting Examples <br>&nbsp;&nbsp;&nbsp; Additional SIEM Features <br>APIs <br>&nbsp;&nbsp;&nbsp; Leveraging APIs <br>&nbsp;&nbsp;&nbsp; API Architectures <br>&nbsp;&nbsp;&nbsp; API Examples <br>Big Data <br>&nbsp;&nbsp;&nbsp; Hadoop <br>&nbsp;&nbsp;&nbsp; Big Data Threat Feeds <br>Machine Learning <br>&nbsp;&nbsp;&nbsp; Machine Learning in Cybersecurity <br>&nbsp;&nbsp;&nbsp; Artificial Intelligence <br>&nbsp;&nbsp;&nbsp; Machine Learning Models <br>Summary <br>References <br> Chapter 6: Reducing Risk and Exceeding Compliance <br>Why Exceeding Compliance <br>Policies <br>&nbsp;&nbsp;&nbsp; Policy Overview <br>&nbsp;&nbsp;&nbsp; Policy Purpose <br>&nbsp;&nbsp;&nbsp; Policy Scope <br>&nbsp;&nbsp;&nbsp; Policy Statement <br>&nbsp;&nbsp;&nbsp; Policy Compliance <br>&nbsp;&nbsp;&nbsp; Related Standards, Policies, Guidelines, and Processes <br>&nbsp;&nbsp;&nbsp; Definitions and Terms <br>&nbsp;&nbsp;&nbsp; History <br>Launching a New Policy <br>&nbsp;&nbsp;&nbsp; Steps for Launching a New Policy <br>Policy Enforcement <br>&nbsp;&nbsp;&nbsp; Certification and Accreditation <br>Procedures <br>&nbsp;&nbsp;&nbsp; Procedure Document <br>Tabletop Exercise <br>&nbsp;&nbsp;&nbsp; Tabletop Exercise Options <br>&nbsp;&nbsp;&nbsp; Tabletop Exercise Execution <br>&nbsp;&nbsp;&nbsp; Tabletop Exercise Format <br>&nbsp;&nbsp;&nbsp; Tabletop Exercise Template Example <br>Standards, Guidelines, and Frameworks <br>&nbsp;&nbsp;&nbsp; NIST Cybersecurity Framework <br>&nbsp;&nbsp;&nbsp; ISO/IEC 27005 <br>&nbsp;&nbsp;&nbsp; CIS Controls <br>&nbsp;&nbsp;&nbsp; ISACA COBIT 2019 <br>&nbsp;&nbsp;&nbsp; FIRST CSIRT Services Framework <br>&nbsp;&nbsp;&nbsp; Exceeding Compliance <br>Audits <br>&nbsp;&nbsp;&nbsp; Audit Example <br>&nbsp;&nbsp;&nbsp; Internal Audits <br>&nbsp;&nbsp;&nbsp; External Auditors <br>&nbsp;&nbsp;&nbsp; Audit Tools <br>Assessments <br>&nbsp;&nbsp;&nbsp; Assessment Types <br>&nbsp;&nbsp;&nbsp; Assessment Results <br>&nbsp;&nbsp;&nbsp; Assessment Template <br>&nbsp;&nbsp;&nbsp; Vulnerability Scanners <br>&nbsp;&nbsp;&nbsp; Assessment Program Weaknesses <br>Penetration Test <br>&nbsp;&nbsp;&nbsp; NIST Special Publication 800-115 <br>&nbsp;&nbsp;&nbsp; Additional NIST SP 800-115 Guidance <br>&nbsp;&nbsp;&nbsp; Penetration Testing Types <br>&nbsp;&nbsp;&nbsp; Penetration Testing Planning <br>Industry Compliance <br>&nbsp;&nbsp;&nbsp; Compliance Requirements <br>Summary <br>References <br> Chapter 7: Threat Intelligence <br>Threat Intelligence Overview <br>&nbsp;&nbsp;&nbsp; Threat Data <br>Threat Intelligence Categories <br>&nbsp;&nbsp;&nbsp; Strategic Threat Intelligence <br>&nbsp;&nbsp;&nbsp; Tactical Threat Intelligence <br>&nbsp;&nbsp;&nbsp; Operational Threat Intelligence <br>&nbsp;&nbsp;&nbsp; Technical Threat Intelligence <br>Threat Intelligence Context <br>&nbsp;&nbsp;&nbsp; Threat Context <br>Evaluating Threat Intelligence <br>&nbsp;&nbsp;&nbsp; Threat Intelligence Checklist <br>&nbsp;&nbsp;&nbsp; Content Quality <br>&nbsp;&nbsp;&nbsp; Testing Threat Intelligence <br>Planning a Threat Intelligence Project <br>&nbsp;&nbsp;&nbsp; Data Expectations for Strategic Threat Intelligence <br>&nbsp;&nbsp;&nbsp; Data Expectations for Tactical Threat Intelligence <br>&nbsp;&nbsp;&nbsp; Data Expectations for Operational Threat Intelligence <br>&nbsp;&nbsp;&nbsp; Data Expectations for Technical Threat Intelligence <br>Collecting and Processing Intelligence <br>&nbsp;&nbsp;&nbsp; Processing Nontechnical Data <br>&nbsp;&nbsp;&nbsp; Operational Data and Web Processing <br>&nbsp;&nbsp;&nbsp; Technical Processing <br>&nbsp;&nbsp;&nbsp; Technical Threat Intelligence Resources <br>Actionable Intelligence <br>&nbsp;&nbsp;&nbsp; Security Tools and Threat Intelligence <br>Feedback <br>Summary <br>References <br> Chapter 8: Threat Hunting and Incident Response <br>Security Incidents <br>Incident Response Lifecycle <br>Phase 1: Preparation <br>&nbsp;&nbsp;&nbsp; Assigning Tasks with Playbooks <br>&nbsp;&nbsp;&nbsp; Communication <br>&nbsp;&nbsp;&nbsp; Third-Party Interaction <br>&nbsp;&nbsp;&nbsp; Law Enforcement <br>&nbsp;&nbsp;&nbsp; Law Enforcement Risk <br>&nbsp;&nbsp;&nbsp; Ticketing Systems <br>&nbsp;&nbsp;&nbsp; Other Incident Response Planning Templates <br>&nbsp;&nbsp;&nbsp; Phase 1: Preparation Summary <br>Phase 2: Detection and Analysis <br>&nbsp;&nbsp;&nbsp; Incident Detection <br>&nbsp;&nbsp;&nbsp; Core Security Capabilities <br>&nbsp;&nbsp;&nbsp; Threat Analysis <br>&nbsp;&nbsp;&nbsp; Detecting Malware Behavior <br>&nbsp;&nbsp;&nbsp; Infected Systems <br>&nbsp;&nbsp;&nbsp; Analyzing Artifacts <br>&nbsp;&nbsp;&nbsp; Identifying Artifact Types <br>&nbsp;&nbsp;&nbsp; Packing Files <br>&nbsp;&nbsp;&nbsp; Basic Static Analysis <br>&nbsp;&nbsp;&nbsp; Advanced Static Analysis <br>&nbsp;&nbsp;&nbsp; Dynamic Analysis <br>&nbsp;&nbsp;&nbsp; Phase 2: Detection and Analysis Summary <br>Phase 3: Containment, Eradication, and Recovery <br>&nbsp;&nbsp;&nbsp; Containment <br>&nbsp;&nbsp;&nbsp; Responding to Malware <br>&nbsp;&nbsp;&nbsp; Threat Hunting Techniques <br>&nbsp;&nbsp;&nbsp; Eradicate <br>&nbsp;&nbsp;&nbsp; Recovery <br>Digital Forensics <br>&nbsp;&nbsp;&nbsp; Digital Forensic Process <br>&nbsp;&nbsp;&nbsp; First Responder <br>&nbsp;&nbsp;&nbsp; Chain of Custody <br>&nbsp;&nbsp;&nbsp; Working with Evidence <br>&nbsp;&nbsp;&nbsp; Duplicating Evidence <br>&nbsp;&nbsp;&nbsp; Hashes <br>&nbsp;&nbsp;&nbsp; Forensic Static Analysis <br>&nbsp;&nbsp;&nbsp; Recovering Data <br>&nbsp;&nbsp;&nbsp; Forensic Dynamic Analysis <br>&nbsp;&nbsp;&nbsp; Digital Forensics Summary <br>&nbsp;&nbsp;&nbsp; Phase 3: Containment, Eradication, and Recovery Summary <br>Phase 4: Post-Incident Activity <br>&nbsp;&nbsp;&nbsp; Post-Incident Response Process <br>&nbsp;&nbsp;&nbsp; Phase 4: Post-Incident Response Summary <br>Incident Response Guidelines <br>&nbsp;&nbsp;&nbsp; FIRST Services Frameworks <br>Summary <br>References <br> Chapter 9: Vulnerability Management <br>Vulnerability Management <br>&nbsp;&nbsp;&nbsp; Phase 1: Asset Inventory <br>&nbsp;&nbsp;&nbsp; Phase 2: Information Management <br>&nbsp;&nbsp;&nbsp; Phase 3: Risk Assessment <br>&nbsp;&nbsp;&nbsp; Phase 4: Vulnerability Assessment <br>&nbsp;&nbsp;&nbsp; Phase 5: Report and Remediate <br>&nbsp;&nbsp;&nbsp; Phase 6: Respond and Repeat <br>Measuring Vulnerabilities <br>&nbsp;&nbsp;&nbsp; Common Vulnerabilities and Exposures <br>&nbsp;&nbsp;&nbsp; Common Vulnerability Scoring System <br>&nbsp;&nbsp;&nbsp; CVSS Standards <br>Vulnerability Technology <br>&nbsp;&nbsp;&nbsp; Vulnerability Scanners <br>&nbsp;&nbsp;&nbsp; Currency and Coverage <br>&nbsp;&nbsp;&nbsp; Tuning Vulnerability Scanners <br>&nbsp;&nbsp;&nbsp; Exploitation Tools <br>&nbsp;&nbsp;&nbsp; Asset Management and Compliance Tools <br>&nbsp;&nbsp;&nbsp; Network Scanners and Network Access Control <br>&nbsp;&nbsp;&nbsp; Threat Detection Tools <br>Vulnerability Management Service <br>&nbsp;&nbsp;&nbsp; Scanning Services <br>&nbsp;&nbsp;&nbsp; Vulnerability Management Service Roles <br>&nbsp;&nbsp;&nbsp; Vulnerability Evaluation Procedures <br>Vulnerability Response <br>&nbsp;&nbsp;&nbsp; Vulnerability Accuracy <br>&nbsp;&nbsp;&nbsp; Responding to Vulnerabilities <br>&nbsp;&nbsp;&nbsp; Cyber Insurance <br>&nbsp;&nbsp;&nbsp; Patching Systems <br>&nbsp;&nbsp;&nbsp; Residual Risk <br>&nbsp;&nbsp;&nbsp; Remediation Approval <br>&nbsp;&nbsp;&nbsp; Reporting <br>&nbsp;&nbsp;&nbsp; Exceptions <br>Vulnerability Management Process Summarized <br>Summary <br>References <br> Chapter 10: Data Orchestration <br>Introduction to Data Orchestration <br>&nbsp;&nbsp;&nbsp; Comparing SIEM and SOAR <br>&nbsp;&nbsp;&nbsp; The Rise of XDR <br>Security Orchestration, Automation, and Response <br>&nbsp;&nbsp;&nbsp; SOAR Example: Phantom <br>Endpoint Detection and Response <br>&nbsp;&nbsp;&nbsp; EDR Example: CrowdStrike <br>Playbooks <br>&nbsp;&nbsp;&nbsp; Playbook Components <br>&nbsp;&nbsp;&nbsp; Constructing Playbooks <br>&nbsp;&nbsp;&nbsp; Incident Response Consortium <br>&nbsp;&nbsp;&nbsp; Playbook Examples: Malware Outbreak <br>Automation <br>&nbsp;&nbsp;&nbsp; Automating Playbooks <br>&nbsp;&nbsp;&nbsp; Common Targets for Automation <br>&nbsp;&nbsp;&nbsp; Automation Pitfalls <br>&nbsp;&nbsp;&nbsp; Playbook Workflow <br>DevOps Programming <br>&nbsp;&nbsp;&nbsp; Data Management <br>&nbsp;&nbsp;&nbsp; Text-File Formats <br>&nbsp;&nbsp;&nbsp; Common Data Formats <br>&nbsp;&nbsp;&nbsp; Data Modeling <br>DevOps Tools <br>&nbsp;&nbsp;&nbsp; DevOps Targets <br>&nbsp;&nbsp;&nbsp; Manual DevOps <br>&nbsp;&nbsp;&nbsp; Automated DevOps <br>&nbsp;&nbsp;&nbsp; DevOps Lab Using Ansible <br>&nbsp;&nbsp;&nbsp; Ansible Playbooks <br>Blueprinting with Osquery <br>&nbsp;&nbsp;&nbsp; Running Osquery <br>Network Programmability <br>&nbsp;&nbsp;&nbsp; Learning NetDevOps <br>&nbsp;&nbsp;&nbsp; APIs <br>&nbsp;&nbsp;&nbsp; NetDevOps Example <br>Cloud Programmability <br>&nbsp;&nbsp;&nbsp; Orchestration in the Cloud <br>&nbsp;&nbsp;&nbsp; Amazon DevOps <br>&nbsp;&nbsp;&nbsp; SaaS DevOps <br>Summary <br>References <br> Chapter 11: Future of the SOC <br>All Eyes on SD-WAN and SASE <br>&nbsp;&nbsp;&nbsp; VoIP Adoption As Prologue to SD-WAN Adoption <br>&nbsp;&nbsp;&nbsp; Introduction of SD-WAN <br>&nbsp;&nbsp;&nbsp; Challenges with the Traditional WAN <br>&nbsp;&nbsp;&nbsp; SD-WAN to the Rescue <br>&nbsp;&nbsp;&nbsp; SASE Solves SD-WAN Problems <br>&nbsp;&nbsp;&nbsp; SASE Defined <br>&nbsp;&nbsp;&nbsp; Future of SASE <br>IT Services Provided by the SOC <br>&nbsp;&nbsp;&nbsp; IT Operations Defined <br>&nbsp;&nbsp;&nbsp; Hacking IT Services <br>&nbsp;&nbsp;&nbsp; IT Services Evolving <br>&nbsp;&nbsp;&nbsp; Future of IT Services <br>Future of Training <br>&nbsp;&nbsp;&nbsp; Training Challenges <br>&nbsp;&nbsp;&nbsp; Training Today <br>&nbsp;&nbsp;&nbsp; Case Study: Training I Use Today <br>&nbsp;&nbsp;&nbsp; Free Training <br>&nbsp;&nbsp;&nbsp; Gamifying Learning <br>&nbsp;&nbsp;&nbsp; On-Demand and Personalized Learning <br>&nbsp;&nbsp;&nbsp; Future of Training <br>Full Automation with Machine Learning <br>&nbsp;&nbsp;&nbsp; Machine Learning <br>&nbsp;&nbsp;&nbsp; Machine Learning Hurdles <br>&nbsp;&nbsp;&nbsp; Machine Learning Applied <br>&nbsp;&nbsp;&nbsp; Training Machine Learning <br>&nbsp;&nbsp;&nbsp; Future of Machine Learning <br>Future of Your SOC: Bringing It All Together <br>&nbsp;&nbsp;&nbsp; Your Future Facilities and Capabilities <br>&nbsp;&nbsp;&nbsp; Group Tags <br>&nbsp;&nbsp;&nbsp; Your Future SOC Staff <br>&nbsp;&nbsp;&nbsp; Audits, Assessments, and Penetration Testing <br>&nbsp;&nbsp;&nbsp; Future Impact to Your Services <br>&nbsp;&nbsp;&nbsp; Hunting for Tomorrow’s Threats <br>Summary <br>References <br> <br> <br>9780135619858&nbsp;&nbsp; TOC&nbsp;&nbsp;&nbsp; 3/24/2021 <br> <br> <br>

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        The Modern Security Operations Center