{"id":18385,"date":"2022-08-30T14:00:21","date_gmt":"2022-08-30T17:00:21","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=18385"},"modified":"2022-08-30T13:40:10","modified_gmt":"2022-08-30T16:40:10","slug":"how-to-build-a-security-operations-center","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/how-to-build-a-security-operations-center\/","title":{"rendered":"How to build a Security Operations Center"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-18386\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2022\/08\/how-to-build-a-security-operations-center.jpg\" alt=\"How to build a Security Operations Center\" width=\"145\" height=\"188\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2022\/08\/how-to-build-a-security-operations-center.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2022\/08\/how-to-build-a-security-operations-center-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>AT&amp;T Cybersecurity<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Whether you\u2019re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks on entrances and exits, cash registers and vaults, as well as cameras pointed at these places and others throughout the facility.<br \/>\nThe same goes for protecting your network. Controlling access with tools like passwords, access control lists (ACLs), firewall rules, and others aren\u2019t quite good enough. You still have to constantly monitor your critical infrastructure so that you can spot anomalous activity that may indicate a possible exposure.<br \/>\nUnfortunately, unlike with CCTV cameras, you can\u2019t just look into a monitor and immediately see an active threat unfold, or use a video recording to prosecute a criminal after catching them in the act on tape.<br \/>\nThe \u201cbread crumbs\u201d of cybersecurity incidents and exposures are far more varied, distributed, and hidden than what can be captured in a single camera feed, and that\u2019s why it takes more than just a single tool to effectively monitor your environment.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2022\/08\/how-to-build-a-security-operations-center.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AT&amp;T Cybersecurity R\u00e9sum\u00e9: Whether you\u2019re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks on entrances and exits, cash registers and vaults, as well as cameras pointed at these places and others throughout the facility. The same goes for protecting your network. Controlling access with tools like passwords, access control lists (ACLs), firewall rules, and others aren\u2019t quite&hellip; <\/p>\n","protected":false},"author":3,"featured_media":18386,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6,20,25,112],"tags":[],"class_list":["post-18385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-seguranca-da-informacao","category-seguranca-publica-e-defesa","category-download"],"views":138,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/18385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=18385"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/18385\/revisions"}],"predecessor-version":[{"id":18387,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/18385\/revisions\/18387"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/18386"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=18385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=18385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=18385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}