Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases: A condensed field guide for the Security Operations team (Volume 2)
暫譯: 藍隊手冊:安全運營中心、SIEM 與威脅獵捕案例:安全運營團隊的精簡實用指南(第二卷)

GSE #99, Don Murdoch

  • 出版商: W. W. Norton
  • 出版日期: 2018-08-26
  • 售價: $1,430
  • 貴賓價: 9.5$1,359
  • 語言: 英文
  • 頁數: 254
  • 裝訂: Paperback
  • ISBN: 1726273989
  • ISBN-13: 9781726273985
  • 相關分類: 資訊安全
  • 無法訂購

買這商品的人也買了...

相關主題

商品描述

Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases provides the security practitioner with numerous field notes on building a security operations team and mining data sources to get the maximum amount of information out of them with a threat hunting approach. The author shares his fifteen years of experience with SIEMs and security operations after implementing five major platforms, integrating over one hundred data sources into various platforms, and running a MSSP practice. This book covers the topics below using a “zero fluff” approach as if you hired him as a security consultant and were sitting across the table with him (or her). Topics covered include: • The book begins with a discussion for professionals to help them build a successful business case and a project plan, and deciding on SOC tier models. There is also a list of tough questions you need to consider when proposing a SOC, as well as a discussion of layered operating models. • It then goes through numerous data sources that feed a SOC and SIEM and provides specific guidance on how to use those data sources. Most of the examples presented were implemented in one organization or another. These uses cases explain how to use a SIEM and how to use the data coming into the platform, a question that is poorly answered by many vendors. • An inventory of Security Operations Center (SOC) Services. • Several business concepts are also introduced, because they are often overlooked by IT: value chain, PESTL, and SWOT. • Metrics. • SOC staff onboarding, training topics, and desirable skills. Along these lines, there is a chapter on a day in the life of a SOC analyst. • Maturity analysis for the SOC and the log management program. • Applying a Threat Hunt mindset to the SOC. • A full use case template that was used within two major Fortune 500 companies, and is in active use by one major SIEM vendor, along with a complete example of how to build a SOC and SIEM focused use case. You can see the corresponding discussion on YouTube – search for the 2017 Security Onion conference. • Critical topics in deploying SIEM based on experience deploying five different technical platforms for nineteen different organizations in education, nonprofit, and commercial enterprises from 160 to 30,000 personnel. • Understanding why SIEM deployments fail with actionable compensators. • Real life experiences getting data into SIEM platforms and the considerations for the many different ways to provide data. • Issues relating to time, time management, and time zones. • Critical factors in log management, network security monitoring, continuous monitoring, and security architecture related directly to SOC and SIEM. • A table of useful TCP and UDP port numbers. This is the second book in the Blue Team Handbook Series. Volume One, focused on incident response, has over 32,000 copies in print and has a 4.5/5.0 review rating!

商品描述(中文翻譯)

《藍隊手冊:安全運營中心(SOC)、安全資訊與事件管理(SIEM)及威脅獵捕使用案例》為安全從業者提供了大量的實地筆記,幫助他們建立安全運營團隊,並利用威脅獵捕的方法從數據來源中提取最大量的信息。作者分享了他在實施五個主要平台、整合超過一百個數據來源到各種平台,以及運營一個管理安全服務提供商(MSSP)實踐的十五年經驗。本書以「零冗餘」的方式涵蓋以下主題,就像你聘請他作為安全顧問並與他(或她)面對面交談一樣。涵蓋的主題包括:

• 本書首先討論專業人士如何建立成功的商業案例和項目計劃,並決定SOC層級模型。還有一份在提議SOC時需要考慮的棘手問題清單,以及對分層運營模型的討論。

• 接著介紹了多個為SOC和SIEM提供數據來源的數據來源,並提供了如何使用這些數據來源的具體指導。大多數示例都是在某個組織中實施的。這些使用案例解釋了如何使用SIEM以及如何使用進入平台的數據,這是一個許多供應商回答不佳的問題。

• 安全運營中心(SOC)服務的清單。

• 介紹了幾個商業概念,因為這些概念常常被IT忽視:價值鏈、PESTL和SWOT。

• 指標。

• SOC人員的入職培訓主題和所需技能。在這方面,還有一章介紹SOC分析師的一天生活。

• SOC及日誌管理計劃的成熟度分析。

• 將威脅獵捕思維應用於SOC。

• 一個完整的使用案例模板,曾在兩家主要的《財富》500強公司中使用,並且目前由一家主要的SIEM供應商積極使用,還包括如何建立以SOC和SIEM為重點的使用案例的完整示例。你可以在YouTube上看到相應的討論——搜索2017年Security Onion會議。

• 根據在教育、非營利和商業企業中為十九個不同組織部署五個不同技術平台的經驗,部署SIEM的關鍵主題。

• 理解為什麼SIEM部署失敗及可行的補償措施。

• 將數據導入SIEM平台的實際經驗以及提供數據的多種考量。

• 與時間、時間管理和時區相關的問題。

• 與SOC和SIEM直接相關的日誌管理、網絡安全監控、持續監控和安全架構的關鍵因素。

• 有用的TCP和UDP端口號表。

這是《藍隊手冊系列》的第二本書。第一卷專注於事件響應,印刷量超過32,000本,並獲得4.5/5.0的評價!