Skip to content

Commit e69d00a

Browse files
committed
fix for Acrolinx
1 parent 2c7fc78 commit e69d00a

2 files changed

Lines changed: 10 additions & 10 deletions

File tree

learn-pr/wwl-sci/design-solutions-security-operations/includes/1-introduction-security-operations-secops.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Adopting a Zero Trust approach across identities, endpoints, infrastructure, and
1414

1515
Modern security operations platforms address this challenge by integrating SIEM, SOAR, XDR, posture management, and AI-assisted capabilities into unified experiences.
1616

17-
:::image type="content" source="../media/provide-integrated-capabilities.png" alt-text="Diagram showing the integrated capabilities of a zero trust approach." lightbox="../media/provide-integrated-capabilities.png":::
17+
:::image type="content" source="../media/provide-integrated-capabilities.png" alt-text="Diagram showing the integrated capabilities of a Zero Trust approach." lightbox="../media/provide-integrated-capabilities.png":::
1818

1919
## Security operations functions
2020

@@ -41,17 +41,17 @@ To deliver against these outcomes, security operations teams should be structure
4141

4242
Detecting and responding to threats is currently undergoing significant modernization at all levels.
4343

44-
- **Elevation to business risk management:** SOC is growing into a key component of managing business risk for the organization
45-
- **Metrics and goals:** Tracking SOC effectiveness is evolving from "time to detect" to these key indicators:
46-
- **Responsiveness** via mean time to acknowledge (MTTA).
47-
- **Remediation speed** via mean time to remediate (MTTR).
48-
- **Technology evolution:** SOC technology is evolving from exclusive use of static analysis of logs in a SIEM to add the use of specialized tooling and sophisticated analysis techniques. This provides deep insights into assets that provide high quality alerts and investigation experience that complement the breadth view of the SIEM. Both types of tooling are increasingly using AI and machine learning, behavior analytics, and integrated threat intelligence to help spot and prioritize anomalous actions that could be a malicious attacker.
49-
- **Threat hunting:** SOCs are adding hypothesis driven threat hunting to proactively identify advanced attackers and shift noisy alerts out of frontline analyst queues.
50-
- **Incident management:** Discipline is becoming formalized to coordinate nontechnical elements of incidents with legal, communications, and other teams. **Integration of internal context:** To help prioritize SOC activities such as the relative risk scores of user accounts and devices, sensitivity of data and applications, and key security isolation boundaries to closely defend.
44+
- **Elevation to business risk management:** SOC is growing into a key component of managing business risk for the organization
45+
- **Metrics and goals:** Tracking SOC effectiveness is evolving from "time to detect" to these key indicators:
46+
- **Responsiveness** via mean time to acknowledge (MTTA).
47+
- **Remediation speed** via mean time to remediate (MTTR).
48+
- **Technology evolution:** SOC technology is evolving from exclusive use of static analysis of logs in a SIEM to add the use of specialized tooling and sophisticated analysis techniques. This provides deep insights into assets that provide high quality alerts and investigation experience that complement the breadth view of the SIEM. Both types of tooling are increasingly using AI and machine learning, behavior analytics, and integrated threat intelligence to help spot and prioritize anomalous actions that could be a malicious attacker.
49+
- **Threat hunting:** SOCs are adding hypothesis driven threat hunting to proactively identify advanced attackers and shift noisy alerts out of frontline analyst queues.
50+
- **Incident management:** Discipline is becoming formalized to coordinate nontechnical elements of incidents with legal, communications, and other teams. **Integration of internal context:** To help prioritize SOC activities such as the relative risk scores of user accounts and devices, sensitivity of data and applications, and key security isolation boundaries to closely defend.
5151

5252
## Team composition and key relationships
5353

54-
As security operations modernizes, the SOC can no longer operate in isolation. Effective threat detection and response requires collaboration across the organization. Security incidents often have legal, regulatory, and business implications that extend beyond technical remediation.
54+
As security operations modernize, the SOC can no longer operate in isolation. Effective threat detection and response require collaboration across the organization. Security incidents often have legal, regulatory, and business implications that extend beyond technical remediation.
5555

5656
A well-functioning security operations center maintains close relationships with:
5757

learn-pr/wwl-sci/design-solutions-security-operations/includes/7-design-security-workflows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Microsoft Security Copilot integrates across security workflows to accelerate an
9191
| **Response** | Provide step-by-step remediation guidance, generate response playbook recommendations |
9292
| **Reporting** | Create executive summaries, generate post-incident reports for stakeholders |
9393

94-
When designing workflows, identify where Security Copilot can reduce time-to-resolution. Consider embedding Copilot prompts into standard operating procedures so analysts consistently leverage AI assistance at key decision points.
94+
When designing workflows, identify where Security Copilot can reduce time-to-resolution. Consider embedding Copilot prompts into standard operating procedures so analysts consistently use AI assistance at key decision points.
9595

9696
## Architect design recommendations
9797

0 commit comments

Comments
 (0)