You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/includes/1-introduction-security-operations-secops.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ Adopting a Zero Trust approach across identities, endpoints, infrastructure, and
14
14
15
15
Modern security operations platforms address this challenge by integrating SIEM, SOAR, XDR, posture management, and AI-assisted capabilities into unified experiences.
16
16
17
-
:::image type="content" source="../media/provide-integrated-capabilities.png" alt-text="Diagram showing the integrated capabilities of a zero trust approach." lightbox="../media/provide-integrated-capabilities.png":::
17
+
:::image type="content" source="../media/provide-integrated-capabilities.png" alt-text="Diagram showing the integrated capabilities of a Zero Trust approach." lightbox="../media/provide-integrated-capabilities.png":::
18
18
19
19
## Security operations functions
20
20
@@ -41,17 +41,17 @@ To deliver against these outcomes, security operations teams should be structure
41
41
42
42
Detecting and responding to threats is currently undergoing significant modernization at all levels.
43
43
44
-
-**Elevation to business risk management:** SOC is growing into a key component of managing business risk for the organization
45
-
-**Metrics and goals:** Tracking SOC effectiveness is evolving from "time to detect" to these key indicators:
46
-
-**Responsiveness** via mean time to acknowledge (MTTA).
47
-
-**Remediation speed** via mean time to remediate (MTTR).
48
-
-**Technology evolution:** SOC technology is evolving from exclusive use of static analysis of logs in a SIEM to add the use of specialized tooling and sophisticated analysis techniques. This provides deep insights into assets that provide high quality alerts and investigation experience that complement the breadth view of the SIEM. Both types of tooling are increasingly using AI and machine learning, behavior analytics, and integrated threat intelligence to help spot and prioritize anomalous actions that could be a malicious attacker.
49
-
-**Threat hunting:** SOCs are adding hypothesis driven threat hunting to proactively identify advanced attackers and shift noisy alerts out of frontline analyst queues.
50
-
-**Incident management:** Discipline is becoming formalized to coordinate nontechnical elements of incidents with legal, communications, and other teams. **Integration of internal context:** To help prioritize SOC activities such as the relative risk scores of user accounts and devices, sensitivity of data and applications, and key security isolation boundaries to closely defend.
44
+
-**Elevation to business risk management:** SOC is growing into a key component of managing business risk for the organization
45
+
-**Metrics and goals:** Tracking SOC effectiveness is evolving from "time to detect" to these key indicators:
46
+
-**Responsiveness** via mean time to acknowledge (MTTA).
47
+
-**Remediation speed** via mean time to remediate (MTTR).
48
+
-**Technology evolution:** SOC technology is evolving from exclusive use of static analysis of logs in a SIEM to add the use of specialized tooling and sophisticated analysis techniques. This provides deep insights into assets that provide high quality alerts and investigation experience that complement the breadth view of the SIEM. Both types of tooling are increasingly using AI and machine learning, behavior analytics, and integrated threat intelligence to help spot and prioritize anomalous actions that could be a malicious attacker.
49
+
-**Threat hunting:** SOCs are adding hypothesis driven threat hunting to proactively identify advanced attackers and shift noisy alerts out of frontline analyst queues.
50
+
-**Incident management:** Discipline is becoming formalized to coordinate nontechnical elements of incidents with legal, communications, and other teams. **Integration of internal context:** To help prioritize SOC activities such as the relative risk scores of user accounts and devices, sensitivity of data and applications, and key security isolation boundaries to closely defend.
51
51
52
52
## Team composition and key relationships
53
53
54
-
As security operations modernizes, the SOC can no longer operate in isolation. Effective threat detection and response requires collaboration across the organization. Security incidents often have legal, regulatory, and business implications that extend beyond technical remediation.
54
+
As security operations modernize, the SOC can no longer operate in isolation. Effective threat detection and response require collaboration across the organization. Security incidents often have legal, regulatory, and business implications that extend beyond technical remediation.
55
55
56
56
A well-functioning security operations center maintains close relationships with:
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/includes/7-design-security-workflows.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ Microsoft Security Copilot integrates across security workflows to accelerate an
91
91
|**Response**| Provide step-by-step remediation guidance, generate response playbook recommendations |
92
92
|**Reporting**| Create executive summaries, generate post-incident reports for stakeholders |
93
93
94
-
When designing workflows, identify where Security Copilot can reduce time-to-resolution. Consider embedding Copilot prompts into standard operating procedures so analysts consistently leverage AI assistance at key decision points.
94
+
When designing workflows, identify where Security Copilot can reduce time-to-resolution. Consider embedding Copilot prompts into standard operating procedures so analysts consistently use AI assistance at key decision points.
0 commit comments