, ,

Security Operations Center

Building, Operating, and Maintaining your SOC

Paperback Engels 2015 9780134052014
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This is the first complete guide to building, operating, managing, and operating Security Operations Centers in any business or organizational environment. Two leading IT security experts review the characteristics, strengths, and weaknesses of each SOC model (including virtual SOCs). Next, they walk students through every phase required to establish and operate an effective SOC, including all significant people, process and technology issues.

Specificaties

ISBN13:9780134052014
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<!--[if gte mso 9]><xml> </xml><![endif]--> <p style="margin:0px;">Introduction xx</p> <p style="margin:0px;">Part I SOC Basics</p> <p style="margin:0px;">Chapter 1 Introduction to Security Operations and the SOC 1</p> <p style="margin:0px;">Cybersecurity Challenges 1</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Threat Landscape 4</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Business Challenges 7</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;The Cloud 8</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Compliance 9</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Privacy and Data Protection 9</p> <p style="margin:0px;">Introduction to Information Assurance 10</p> <p style="margin:0px;">Introduction to Risk Management 11</p> <p style="margin:0px;">Information Security Incident Response 14</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Incident Detection 15</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Incident Triage 16</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Incident Categories 17</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Incident Severity 17</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Incident Resolution 18</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Incident Closure 19</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Post-Incident 20</p> <p style="margin:0px;">SOC Generations 21</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; First-Generation SOC 22</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Second-Generation SOC 22</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Third-Generation SOC 23</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Fourth-Generation SOC 24</p> <p style="margin:0px;">Characteristics of an Effective SOC 24</p> <p style="margin:0px;">Introduction to Maturity Models 27</p> <p style="margin:0px;">Applying Maturity Models to SOC 29</p> <p style="margin:0px;">Phases of Building a SOC 31</p> <p style="margin:0px;">Challenges and Obstacles 32</p> <p style="margin:0px;">Summary 32</p> <p style="margin:0px;">References 33</p> <p style="margin:0px;">Chapter 2 Overview of SOC Technologies 35</p> <p style="margin:0px;">Data Collection and Analysis 35</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Data Sources 37</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Data Collection 38</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;The Syslog Protocol 39</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Telemetry Data: Network Flows 45</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Telemetry Data: Packet Capture 48</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Parsing and Normalization 49</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Security Analysis 52</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Alternatives to Rule-Based Correlation 55</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Data Enrichment 56</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Big Data Platforms for Security 57</p> <p style="margin:0px;">Vulnerability Management 58</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Vulnerability Announcements 60</p> <p style="margin:0px;">Threat Intelligence 62</p> <p style="margin:0px;">Compliance 64</p> <p style="margin:0px;">Ticketing and Case Management 64</p> <p style="margin:0px;">Collaboration 65</p> <p style="margin:0px;">SOC Conceptual Architecture 66</p> <p style="margin:0px;">Summary 67</p> <p style="margin:0px;">References 67</p> <p style="margin:0px;">Part II: The Plan Phase</p> <p style="margin:0px;">Chapter 3 Assessing Security Operations Capabilities 69</p> <p style="margin:0px;">Assessment Methodology 69</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Step 1: Identify Business and IT Goals 71</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Step 2: Assessing Capabilities 73</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Assessing IT Processes 75</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Step 3: Collect Information 82</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Step 4: Analyze Maturity Levels 84</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Step 5: Formalize Findings 87</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;The Organization’s Vision and Strategy 87</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;The Department’s Vision and Strategy 87</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;External and Internal Compliance Requirements 87</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Organization’s Threat Landscape 88</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;History of Previous Information Security Incidents 88</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;SOC Sponsorship 89</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Allocated Budget 89</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Presenting Data 89</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Closing 90</p> <p style="margin:0px;">Summary 90</p> <p style="margin:0px;">References 90</p> <p style="margin:0px;">Chapter 4 SOC Strategy 91</p> <p style="margin:0px;">Strategy Elements 91</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Who Is Involved? 92</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; SOC Mission 92</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; SOC Scope 93</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Example 1: A Military Organization 94</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Mission Statement 94</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;SOC Scope Statement 95</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Example 2: A Financial Organization 95</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Mission Statement 95</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;SOC Scope Statement 95</p> <p style="margin:0px;">SOC Model of Operation 95</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; In-House and Virtual SOC 96</p> <p style="margin:0px;">SOC Services 98</p> <p style="margin:0px;">SOC Capabilities Roadmap 99</p> <p style="margin:0px;">Summary 101</p> <p style="margin:0px;">Part III: The Design Phase</p> <p style="margin:0px;">Chapter 5 The SOC Infrastructure 103</p> <p style="margin:0px;">Design Considerations 103</p> <p style="margin:0px;">Model of Operation 104</p> <p style="margin:0px;">Facilities 105</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; SOC Internal Layout 106</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Lighting 107</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Acoustics 107</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Physical Security 108</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Video Wall 108</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; SOC Analyst Services 109</p> <p style="margin:0px;">Active Infrastructure 110</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network 111</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Access to Systems 112</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Security 112</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Compute 115</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Dedicated Versus Virtualized Environment 116</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Choice of Operating Systems 118</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Storage 118</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Capacity Planning 119</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Collaboration 119</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Ticketing 120</p> <p style="margin:0px;">Summary 120</p> <p style="margin:0px;">References 120</p> <p style="margin:0px;">Chapter 6 Security Event Generation and Collection 123</p> <p style="margin:0px;">Data Collection 123</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Calculating EPS 124</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Ubuntu Syslog Server 124</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Time Protocol 129</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Deploying NTP 130</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Data-Collection Tools 134</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Company 135</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Product Options and Architecture 136</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Installation and Maintenance 136</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;User Interface and Experience 136</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Compliance Requirements 137</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Firewalls 137</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Stateless/Stateful Firewalls 137</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Cisco Adaptive Security Appliance ASA 138</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Application Firewalls 142</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Cisco FirePOWER Services 142</p> <p style="margin:0px;">Cloud Security 152</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cisco Meraki 153</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Exporting Logs from Meraki 154</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Virtual Firewalls 155</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Cisco Virtual Firewalls 156</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Host Firewalls 157</p> <p style="margin:0px;">Intrusion Detection and Prevention Systems 157</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cisco FirePOWER IPS 160</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Meraki IPS 161</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Snort 162</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Host-Based Intrusion Prevention 162</p> <p style="margin:0px;">Routers and Switches 163</p> <p style="margin:0px;">Host Systems 166</p> <p style="margin:0px;">Mobile Devices 167</p> <p style="margin:0px;">Breach Detection 168</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cisco Advanced Malware Prevention 168</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Web Proxies 169</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Cisco Web Security Appliance 170</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cloud Proxies 172</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Cisco Cloud Web Security 172</p> <p style="margin:0px;">DNS Servers 173</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Exporting DNS 174</p> <p style="margin:0px;">Network Telemetry with Network Flow Monitoring 174</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NetFlow Tools 175</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;StealthWatch 177</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Exporting Data from StealthWatch 179</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NetFlow from Routers and Switches 182</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NetFlow from Security Products 184</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NetFlow in the Data Center 186</p> <p style="margin:0px;">Summary 187</p> <p style="margin:0px;">References 188</p> <p style="margin:0px;">Chapter 7 Vulnerability Management 189</p> <p style="margin:0px;">Identifying Vulnerabilities 190</p> <p style="margin:0px;">Security Services 191</p> <p style="margin:0px;">Vulnerability Tools 193</p> <p style="margin:0px;">Handling Vulnerabilities 195</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; OWASP Risk Rating Methodology 197</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Threat Agent Factors 198</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Vulnerability Factors 198</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Technical Impact Factors 200</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Business Impact Factors 200</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Vulnerability Management Lifecycle 202</p> <p style="margin:0px;">Automating Vulnerability Management 205</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Inventory Assessment Tools 205</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Information Management Tools 206</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Risk-Assessment Tools 206</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Vulnerability-Assessment Tools 206</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Report and Remediate Tools 206</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Responding Tools 207</p> <p style="margin:0px;">Threat Intelligence 208</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Attack Signatures 209</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Threat Feeds 210</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Other Threat Intelligence Sources 211</p> <p style="margin:0px;">Summary 213</p> <p style="margin:0px;">References 214</p> <p style="margin:0px;">Chapter 8 People and Processes 215</p> <p style="margin:0px;">Key Challenges 215</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Wanted: Rock Stars, Leaders, and Grunts 216</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Weight of Process 216</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Upper and Lower Bounds of Technology 217</p> <p style="margin:0px;">Designing and Building the SOC Team 218</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Starting with the Mission 218</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Focusing on Services 219</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Monitoring Service Example 220</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Determining the Required SOC Roles 223</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Leadership Roles 224</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Analyst Roles 224</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Engineering Roles 224</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Operations Roles 224</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Other Support Roles 224</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Working with HR 225</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Job Role Analysis 225</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Market Analysis 225</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Organizational Structure 226</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Calculating Team Numbers 227</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Deciding on Your Resourcing Strategy 228</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Building Your Own: The Art of Recruiting SOC Personnel 229</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Working with Contractors and Service Bureaus 229</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Working with Outsourcing and Managed Service Providers 230</p> <p style="margin:0px;">Working with Processes and Procedures 231</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Processes Versus Procedures 231</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Working with Enterprise Service Management Processes 232</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Event Management 232</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Incident Management 233</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Problem Management 233</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Vulnerability Management 233</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Other IT Management Processes 233</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Positives and Perils of Process 234</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Examples of SOC Processes and Procedures 236</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Service Management 236</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Service Engineering 237</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Service Operations 238</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Monitoring 239</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Incident Investigation and Response 239</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Log Management 240</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Vulnerability Management 241</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Intelligence 241</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Security Analytics and Reporting 242</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Breach Discovery and Remediation 242</p> <p style="margin:0px;">Summary 243</p> <p style="margin:0px;">Part IV: The Build Phase</p> <p style="margin:0px;">Chapter 9 The Technology 245</p> <p style="margin:0px;">In-House Versus Virtual SOC 245</p> <p style="margin:0px;">Network 246</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Segmentation 247</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; VPN 251</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; High Availability 253</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Support Contracts 254</p> <p style="margin:0px;">Security 255</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Access Control 255</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Authentication 257</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; On-Network Security 258</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Encryption 259</p> <p style="margin:0px;">Systems 260</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Operating Systems 261</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Hardening Endpoints 262</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Endpoint Breach Detection 263</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Mobile Devices 264</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Servers 264</p> <p style="margin:0px;">Storage 265</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Data-Loss Protection 266</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cloud Storage 270</p> <p style="margin:0px;">Collaboration 271</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Collaboration for Pandemic Events 272</p> <p style="margin:0px;">Technologies to Consider During SOC Design 273</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Firewalls 273</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Firewall Modes 273</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Firewall Clustering 276</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Firewall High Availability 276</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Firewall Architecture 277</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Routers and Switches 279</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Securing Network Devices 280</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Hardening Network Devices 280</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Access Control 281</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Deploying NAC 282</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;NAC Posture 284</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Architecting NAC 285</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Web Proxies 290</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Reputation Security 290</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Proxy Architecture 292</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Intrusion Detection/Prevention 295</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;IDS IPS Architecture 295</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Evaluating IDS IPS Technology 296</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Tuning IDS/IPS 298</p> <p style="margin:0px;">Breach Detection 300</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Honeypots 301</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Sandboxes 302</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Endpoint Breach Detection 303</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Telemetry 306</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Enabling NetFlow 308</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Architecting Network Telemetry Solutions 310</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Forensics 312</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Digital Forensics Tools 313</p> <p style="margin:0px;">Final SOC Architecture 314</p> <p style="margin:0px;">Summary 317</p> <p style="margin:0px;">References 318</p> <p style="margin:0px;">Chapter 10 Preparing to Operate 319</p> <p style="margin:0px;">Key Challenges 319</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; People Challenges 319</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Process Challenges 320</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Technology Challenges 321</p> <p style="margin:0px;">Managing Challenges Through a Well-Managed Transition 321</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Elements of an Effective Service Transition Plan 322</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Determining Success Criteria and Managing to Success 322</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Deploying Against Attainable Service Levels 323</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Focusing on Defined Use Cases 325</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Managing Project Resources Effectively 328</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Marching to Clear and Attainable Requirements 329</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Staffing Requirements for Go-Live 329</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Process Requirements for Go-Live 330</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Technology Requirements for Go-Live 331</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Using Simple Checks to Verify That the SOC Is Ready 332</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;People Checks 332</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Process Checks 336</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Technology Checks 340</p> <p style="margin:0px;">Summary 346</p> <p style="margin:0px;">Part V: The Operate Phase</p> <p style="margin:0px;">Chapter 11 Reacting to Events and Incidents 347</p> <p style="margin:0px;">A Word About Events 348</p> <p style="margin:0px;">Event Intake, Enrichment, Monitoring, and Handling 348</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Events in the SIEM 349</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Events in the Security Log Management Solution 350</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Events in Their Original Habitats 350</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Events Through Communications and Collaboration Platforms 350</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Working with Events: The Malware Scenario 351</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Handling and Investigating the Incident Report 353</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Creating and Managing Cases 354</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Working as a Team 355</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Working with Other Parts of the Organization 357</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Working with Third Parties 359</p> <p style="margin:0px;">Closing and Reporting on the Case 362</p> <p style="margin:0px;">Summary 363</p> <p style="margin:0px;">Chapter 12 Maintain, Review, and Improve 365</p> <p style="margin:0px;">Reviewing and Assessing the SOC 366</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Determining Scope 366</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Examining the Services 367</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Personnel/Staffing 369</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Processes, Procedures, and Other Operational Documentation 371</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Technology 372</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Scheduled and Ad Hoc Reviews 373</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Internal Versus External Assessments 374</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Internal Assessments 374</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;External Assessments 374</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Assessment Methodologies 375</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Maturity Model Approaches 375</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Services-Oriented Approaches 376</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Post-Incident Reviews 378</p> <p style="margin:0px;">Maintaining and Improving the SOC 381</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Maintaining and Improving Services 381</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Maintain and Improving Your Team 383</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Staff Recruitment 383</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Team Training and Development 384</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Team Retention 386</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Maintaining and Improving the SOC Technology Stack 387</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Threat, Anomaly, and Breach-Detection Systems 388</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Case and Investigation Management Systems 391</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Analytics and Reporting 392</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Technology Integration 392</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Security Testing and Simulation Systems 393</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;Improving Automated Remediation 394</p> <p style="margin:0px;">Conclusions 395</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">9780134052014&nbsp;&nbsp;&nbsp; TOC&nbsp;&nbsp;&nbsp; 10/12/2015</p> <!--[if gte mso 9]><xml> Normal 0 false false false EN-US X-NONE X-NONE </xml><![endif]--> <!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <![endif]--> <p style="margin:0px;">&nbsp;</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Security Operations Center