07.07.2015 Views

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cyber</strong> <strong>Security</strong> <strong>Monitoring</strong> and Logging <strong>Guide</strong>ContentsPart 5 – <strong>Security</strong> operations centres• Overview.................................................................................................................................................... 37• People, process, technology and information.............................................................................................. 38• People........................................................................................................................................................ 40• Process....................................................................................................................................................... 42• Technology................................................................................................................................................. 44• Information................................................................................................................................................ 45• SOC qualifications...................................................................................................................................... 45Part 6 – Choosing a suitable supplier• <strong>Cyber</strong> security monitoring and logging approaches.................................................................................... 46• The supplier selection process..................................................................................................................... 46• Understand the benefits of using third party experts................................................................................... 48• Determine what activities should be outsourced......................................................................................... 49• Types of service available............................................................................................................................ 50• Define supplier selection criteria................................................................................................................. 50• Appoint selected supplier(s)........................................................................................................................ 51• Make the appointment............................................................................................................................... 52Part 7 – <strong>Cyber</strong> security monitoring and logging capability in practice• Summary of key findings............................................................................................................................ 53• Implementing a cyber security monitoring and logging capability............................................................... 531. Develop a cyber security monitoring and logging plan......................................................................... 532. Carry out prerequisites for cyber security monitoring and logging........................................................ 543. Identify sources of potential indicators of compromise......................................................................... 554. Design your cyber security monitoring and logging capability.............................................................. 555. Build or buy suitable cyber security monitoring and logging services.................................................... 566. Integrate the capability into your cyber security framework.................................................................. 587. Maintain the cyber security monitoring and logging capability............................................................. 585

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!