Many components are necessary to build a complete technological environment:
• Breach detection solutions,
Effective and efficient data collection is fundamental for a successful
• CSOC. Following data types must be collected, correlated and analyzed from a security perspective.
• Data flows
• Packet captures,
• Several types of events
Data enrichment and information about vulnerabilities affecting the entire ecosystem to be monitored are of great importance as well.