In this chapter, we learned that the security operations center (SOC) serves as your centralized view into your overall enterprise organizational infrastructure.
In this chapter, we discussed:
- What the responsibilities of the security operations center include
- Management of security operations center tools
- Design considerations for security operations center tools
- Personnel roles in the security operations center
- Processes and procedures required to run a security operations center
- Internal versus outsourced security operations center
In the next chapter, we will discuss information security architecture concepts and implementation steps towards implementing an effective, well-integrated information security architecture program.