- Learn Azure Sentinel
- Richard Diver Gary Bushey Jason S. Rader
- 452字
- 2021-06-30 15:08:15
SOC platform components
As described earlier, the SOC platform includes a range of technologies to assist with the routine and reactive procedures carried out by various teams. Each of these solutions should help the SOC analysts to perform their duties at the most efficient level to ensure a high degree of protection, detection, and remediation.
The core components of the SOC include log management and Security Incident and Event Monitoring (SIEM), Security Orchestration and Automated Response (SOAR), vulnerability management, threat intelligence, and incident response. All of these components are addressed by the deployment of Azure Sentinel. Additional solutions will be required, and integrated, for other SOC platform capabilities such as intrusion prevention/detection, integrity monitoring, and disaster recovery:
Deploying an SOC using Azure Sentinel comprises the following components:
- Azure Monitor for data collection and analysis. This was originally created to ensure a cloud-scale log management solution for both cloud-based and physical data center-based workloads. Once the data is collected, a range of solutions can then be applied to analyze the data for health, performance, and security considerations. Some solutions were created by Microsoft, and others created by partners.
- Azure Sentinel was developed to address the need for a cloud-native solution as an alternative, or as a complimentary solution, to the existing SIEM solutions that have become a mainstay of security and compliance over the last decade. The popularity of cloud services provides some key advantages, including reduced cost of storage, rapid scale compute, automated service maintenance, and continuous improvement as Microsoft creates new capabilities based on customer and partner feedback.
One of the immediate benefits of deploying Azure Sentinel is rapid enablement without the need for costly investment in the supporting infrastructure, such as servers, storage, and complex licensing. The Azure Sentinel service is charged based on data consumption, per gigabyte per month. This allows the initial deployment to start small and grow as needed until full-scale deployment and maturity can be achieved.
Ongoing maintenance is also simplified as there are no servers to maintain or licenses to renew. You will want to ensure regular optimization of the solution by reviewing the data ingestion and retention for relevance and suitability. This will keep costs reasonable and improve the quality of data used for threat hunting.
- Logic Apps provides integration with a vast array of enterprise solutions, ensuring workflows are connected across the multiple cloud platforms and in existing on-premises solutions. While this is initially an optional component, it will become a core part of the integration and automation (SOAR) capabilities of the platform.
Logic Apps is a standards-based solution that provides a robust set of capabilities. However, there are third-party SOAR solutions available if you don't want to engineer your own automation solutions.
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 黑客攻防入門秘笈
- 安全技術(shù)運營:方法與實踐
- 移動APT:威脅情報分析與數(shù)據(jù)防護
- 可信計算3.0工程初步(第二版)
- 信息安全導(dǎo)論(第2版)
- 安全防御入門手冊
- Mastering Reverse Engineering
- 數(shù)據(jù)保護:工作負載的可恢復(fù)性
- INSTANT Apple Configurator How-to
- 網(wǎng)絡(luò)安全實戰(zhàn)詳解(企業(yè)專供版)
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 網(wǎng)絡(luò)空間安全實戰(zhàn)基礎(chǔ)
- Practical Internet of Things Security
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)