-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Microsoft Cybersecurity Architect Exam Ref SC-100
By :

In the previous chapter, we learned about the key components and areas of focus for architecting a security infrastructure that has proper controls in place and is resilient. Designing and architecting a secure infrastructure is important. However, attackers are constantly searching for vulnerabilities that can be exploited within the infrastructure. To contend with these vulnerabilities and threats to our infrastructure, we should be logging and auditing all activity that takes place on our infrastructure. The design of our logging and auditing strategy becomes the foundation of our company’s security operations center (SOC).
Before we go into the strategy for logging and auditing, let’s provide context around security operations and a SOC. Security operations is the overall process of using information that has been gathered and analyzing that information for...
Change the font size
Change margin width
Change background colour