EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 1 : Computer Forensics in Today's World
         
Notes available : 31 You are not logged in.
Please Login for track your learning progress
   
 
Sl.No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Note No.



Bookmark this Note
Note ID: 136

SOC Workflow


If you want to share the link of this note, please click here to "Copy note link" and share that generated link. Link from URL may change in future.
 


Security Operations Center (SOC) is a centralized unit that continuously monitors and analyzes ongoing activities on an organization’s information systems such as networks, servers, endpoints, databases, applications, websites, etc. to look for anomalies

The typical SOC workflow includes the following activities:

▪ Collection: Security logs are collected and forwarded to Security Information and Event Management (SIEM).

▪ Ingestion: SIEM ingests log data, threat information, indicators of compromise, and asset inventory for machine-based correlation and anomalous activity detection.

▪ Validation: SOC analysts identify the indicators of compromise, triage alerts, and validate incidents.

▪ Reporting: Validated incidents are submitted to the incident response teams through a ticketing system.

▪ Response: The SOC team reviews incidents and performs incident response activities. Simultaneously, a digital forensics investigation team conducts a detailed forensics investigation.

▪ Documentation: In the final step, incidents are documented for business audit purposes.



  Go to notes  






WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations