6. Putting SOC actions into practice
In this section, we use thematic examples to illustrate some of the situations that SOC analysts may encounter when dealing with alerts.
6.1 Examples of threats reported by the Operational Security Center
An employee working for company A, which specializes in the sale of manufactured products in the luxury goods sector, has been in conflict with his manager for several weeks. The employee, a regional sales manager, has negotiated his departure, which will be contractually...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Safety and risk management
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Putting SOC actions into practice
Bibliography
Bibliography
Standards
- Information security management systems – Requirements - ISO/IEC 27001 - 2022
- Information security, cybersecurity and privacy protection — Information security measures. - ISO/IEC 27002 - 2022
Regulations
Decree no. 2015-350 of March 27, 2015 on the qualification of security products and trust service providers for information system security purposes.
Decree no. 2015-351 of March 27, 2015 relating to the security of information systems of operators of vital importance and taken for the application of section 2 of chapter II of title III of book III of the first part of the legislative part of the Defense...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference