Security operations center

For a similar concept in computing, see information security operations center.

A security operations center (SOC) is a centralized unit that deals with security issues on an organizational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data processing technology.[1] Typically, a SOC is equipped for access monitoring, and controlling of lighting, alarms, and vehicle barriers.[2]

SOC of IT

An information security operations center (ISOC) is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended.

SOCs of the United States government

The Transportation Security Administration in the United States has implemented security operations centers for most airports that have federalized security. The primary function of TSA security operations centers is to act as a communication hub for security personnel, law enforcement, airport personnel and various other agencies involved in the daily operations of airports. SOCs are manned 24-hours a day by SOC watch officers. Security operations center watch officers are trained in all aspects of airport and aviation security and are often required to work abnormal shifts. SOC watch officers also ensure that TSA personnel follow proper protocol in dealing with airport security operations. The SOC is usually the first to be notified of incidents at airports such as the discovery of prohibited items/contraband, weapons, explosives, hazardous materials as well as incidents regarding flight delays, unruly passengers, injuries, damaged equipment and various other types of potential security threats. The SOC in turn relays all information pertaining to these incidents to TSA federal security directors, law enforcement and TSA headquarters.

CloudSOC

A cloud security operations center (CloudSOC) may be set up to monitor cloud service use within an enterprise (and keep the Shadow IT problem under control), or parse and audit IT infrastructure and application logs via SIEM technologies and machine data platforms (such as Splunk, IBM QRadar, HP ArcSight and Elasticsearch) to provide alerts and details of suspicious activity.

See also

References

  1. de Leon, Sixto O. (1976). Security: Defense Against Crime. Manila: National Book Store. p. 17.
  2. .Nadel, Barbara A. (2004). Building Security: Handbook for Architectural Planning and Design. McGraw-Hill. p. 2.20. ISBN 978-0-07-141171-4.
This article is issued from Wikipedia - version of the Saturday, June 20, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.