-
Q: What is the core argument for building an internal SOC vs. outsourcing?A: The need for deep business context and the ability to respond immediately to incidents that threaten critical assets.
-
Q: What are the five key functions of a SOC?A: Event Management, Incident Management, Problem Management, Change Management, and Knowledge Management.
-
Q: What is the 'Event Management' process?A: The automated collection, normalization, and correlation of logs to generate alerts.
-
Q: What distinguishes 'Incident Management' from Event Management?A: Incident management is the human process of investigating and resolving the alerts generated by event management.
-
Q: What is the 'Problem Management' function?A: Identifying the root cause of recurring incidents to prevent them from happening again (e.g., fixing a vulnerable configuration).
-
Q: How does 'Knowledge Management' support the SOC?A: By maintaining a knowledge base of known errors, threat intel, and response procedures to speed up future investigations.
-
Q: What is the 'Mission Statement' of a SOC?A: A clear definition of what the SOC protects, its authority, and its service hours.
-
Q: What is the recommended physical layout for a SOC?A: A secure room with wall-mounted displays (video wall), tiered seating for analysts, and a separate 'war room' for crisis management.
-
Q: What is the role of 'Shift Handoff'?A: Ensuring continuity of operations by formally transferring knowledge of active incidents between shifts.
-
Q: What is the 'Metrics' focus in this paper?A: Operational metrics (volume, time) and Business metrics (risk reduction, value delivered).
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.