
2. SOC objectives
This section describes the objectives of a SOC system. These concern both the preventive detection of threats and remediation actions such as incident response investigations.
2.1 Preventive detection: cyber-surveillance (web and darkweb)
The SOC is also a service supported by tools enabling web and darkweb intelligence to be carried out on behalf of the organizations using it.
This service is generally used for several purposes:
continuous analysis of intrusion attempts on an organization's web sites (platform for selling goods and services over the Internet, customer area platform, commercial site) (figure 2...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!

The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
SOC objectives
Bibliography
Bibliography
Standards
- Information security management systems – Requirements - ISO/IEC 27001 - 2022
- Information security, cybersecurity and privacy protection — Information security measures. - ISO/IEC 27002 - 2022
Regulations
Decree no. 2015-350 of March 27, 2015 on the qualification of security products and trust service providers for information system security purposes.
Decree no. 2015-351 of March 27, 2015 relating to the security of information systems of operators of vital importance and taken for the application of section 2 of chapter II of title III of book III of the first part of the legislative part of the Defense...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!

The Ultimate Scientific and Technical Reference