application development and API protect teams who best know the application
architecture and logic of APIs, which becomes critical in digital forensics and
incident response. SOCs may also be outsourced to third parties, as in the case of
managed security service providers and virtual SOCs, which can further complicate
workflow, data feeds, and integration. You will need to emphasize the people and
process aspects of SecOps more than technology, and don’t just approach the
exercise as “getting a feed into Splunk.”
Best practices for security operations include:
1.
Dostları ilə paylaş: