{"id":4884,"date":"2023-06-21T16:24:28","date_gmt":"2023-06-21T14:24:28","guid":{"rendered":"https:\/\/www.cyberdefensesolutions.it\/?page_id=4884"},"modified":"2025-07-21T15:41:16","modified_gmt":"2025-07-21T13:41:16","slug":"soc","status":"publish","type":"page","link":"https:\/\/www.cyberdefensesolutions.it\/index.php\/soc\/","title":{"rendered":"SOC"},"content":{"rendered":"<div data-colibri-id=\"4884-c1\" class=\"style-1971 style-local-4884-c1 position-relative\">\n  <!---->\n  <div data-colibri-component=\"section\" data-colibri-id=\"4884-c32\" id=\"features\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-2327 style-local-4884-c32 position-relative\">\n    <div class=\"background-wrapper\">\n      <div class=\"background-layer background-layer-media-container-lg\">\n        <!---->\n        <div class=\"overlay-layer\">\n          <div class=\"overlay-image-layer\" style=\"background-color: rgb(0, 0, 0); opacity: 1;\"><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"background-layer background-layer-media-container-md\">\n        <!---->\n        <div class=\"overlay-layer\">\n          <div class=\"overlay-image-layer\" style=\"background-color: rgb(0, 0, 0); opacity: 1;\"><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"background-layer background-layer-media-container\">\n        <!---->\n        <div class=\"overlay-layer\">\n          <div class=\"overlay-image-layer\" style=\"background-color: rgb(0, 0, 0); opacity: 1;\"><\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n    <!---->\n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      <div data-colibri-id=\"4884-c54\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-2 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-2338 style-local-4884-c54 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-2 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-2339-outer style-local-4884-c55-outer\">\n            <div data-colibri-id=\"4884-c55\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-2339 style-local-4884-c55 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"4884-c56\" class=\"h-global-transition-all h-heading style-2340 style-local-4884-c56 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-2340 style-local-4884-c56\">\n                    <!---->\n                    <!---->\n                    <h2 class=\"\">Security Operation Center<\/h2>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"4884-c57\" class=\"h-lead h-text h-text-component style-2341 style-local-4884-c57 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>La struttura all\u2019interno di un\u2019organizzazione responsabile della gestione e del monitoraggio della sicurezza informatica. Il suo scopo principale \u00e8 rilevare, analizzare e rispondere alle minacce alla sicurezza informatica in tempo\n                      reale.<\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div data-colibri-id=\"4884-c33\" class=\"h-row-container gutters-row-lg-0 gutters-row-md-0 gutters-row-3 gutters-row-v-lg-0 gutters-row-v-md-0 gutters-row-v-2 style-2328 style-local-4884-c33 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-0 gutters-col-md-0 gutters-col-3 gutters-col-v-lg-0 gutters-col-v-md-0 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-3 h-col-md-3 h-col-12 style-2329-outer style-local-4884-c34-outer\">\n            <div data-colibri-id=\"4884-c34\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-3 v-inner-lg-2 v-inner-md-2 v-inner-3 style-2329 style-local-4884-c34 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"4884-c35\" class=\"h-icon style-2330 style-local-4884-c35 position-relative h-element\">\n                  <!----><span class=\"h-svg-icon h-icon__icon style-2330-icon style-local-4884-c35-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"bar-chart-o\" viewBox=\"0 0 2048 1896.0833\">\n      <path d=\"M640 896v512H384V896h256zm384-512v1024H768V384h256zm1024 1152v128H0V128h128v1408h1920zm-640-896v768h-256V640h256zm384-384v1152h-256V256h256z\"><\/path>\n    <\/svg><\/span><\/div>\n                <div data-colibri-id=\"4884-c36\" class=\"h-global-transition-all h-heading style-2331 style-local-4884-c36 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-2331 style-local-4884-c36\">\n                    <!---->\n                    <!---->\n                    <h4 class=\"\">MONITORAGGIO DELLA SICUREZZA<\/h4>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"4884-c37\" class=\"h-text h-text-component style-2332 style-local-4884-c37 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>SOC monitora costantemente l\u2019ambiente informatico dell\u2019organizzazione, compresi i sistemi, le reti, le applicazioni e i dispositivi, al fine di identificare eventuali anomalie, intrusioni o attivit\u00e0 sospette. Questo monitoraggio viene\n                      solitamente effettuato utilizzando strumenti di sicurezza come i sistemi di rilevamento delle intrusioni (IDS) e i sistemi di informazioni e gestione degli eventi (SIEM).<\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-3 h-col-md-3 h-col-12 style-2329-outer style-local-4884-c38-outer\">\n            <div data-colibri-id=\"4884-c38\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-3 v-inner-lg-2 v-inner-md-2 v-inner-3 style-2329 style-local-4884-c38 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"4884-c39\" class=\"h-icon style-2330 style-local-4884-c39 position-relative h-element\">\n                  <!----><span class=\"h-svg-icon h-icon__icon style-2330-icon style-local-4884-c39-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"search\" viewBox=\"0 0 1672.2646 1896.0833\">\n      <path d=\"M1152 832q0-185-131.5-316.5T704 384 387.5 515.5 256 832t131.5 316.5T704 1280t316.5-131.5T1152 832zm512 832q0 52-38 90t-90 38q-54 0-90-38l-343-342q-179 124-399 124-143 0-273.5-55.5t-225-150-150-225T0 832t55.5-273.5 150-225 225-150T704 128t273.5 55.5 225 150 150 225T1408 832q0 220-124 399l343 343q37 37 37 90z\"><\/path>\n    <\/svg><\/span><\/div>\n                <div data-colibri-id=\"4884-c40\" class=\"h-global-transition-all h-heading style-2331 style-local-4884-c40 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-2331 style-local-4884-c40\">\n                    <!---->\n                    <!---->\n                    <h4 class=\"\">ANALISI DELLE\n                      <br>MINACCE<\/h4>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"4884-c41\" class=\"h-text h-text-component style-2332 style-local-4884-c41 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>Una volta rilevate le anomalie o gli eventi di sicurezza, il SOC analizza e valuta le minacce per determinare la loro natura, il livello di rischio e l\u2019impatto potenziale sull\u2019organizzazione. L\u2019analisi delle minacce comprende l\u2019individuazione\n                      delle vulnerabilit\u00e0, la comprensione delle tattiche utilizzate dagli aggressori e l\u2019identificazione dei potenziali obiettivi.<\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-3 h-col-md-3 h-col-12 style-2329-outer style-local-4884-c42-outer\">\n            <div data-colibri-id=\"4884-c42\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-3 v-inner-lg-2 v-inner-md-2 v-inner-3 style-2329 style-local-4884-c42 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"4884-c43\" class=\"h-icon style-2330 style-local-4884-c43 position-relative h-element\">\n                  <!----><span class=\"h-svg-icon h-icon__icon style-2330-icon style-local-4884-c43-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"shield\" viewBox=\"0 0 1280 1896.0833\">\n      <path d=\"M1088 960V320H640v1137q119-63 213-137 235-184 235-360zm192-768v768q0 86-33.5 170.5t-83 150-118 127.5T919 1511t-121 77.5-89.5 49.5-42.5 20q-12 6-26 6t-26-6q-16-7-42.5-20t-89.5-49.5-121-77.5-126.5-103-118-127.5-83-150T0 960V192q0-26 19-45t45-19h1152q26 0 45 19t19 45z\"><\/path>\n    <\/svg><\/span><\/div>\n                <div data-colibri-id=\"4884-c44\" class=\"h-global-transition-all h-heading style-2331 style-local-4884-c44 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-2331 style-local-4884-c44\">\n                    <!---->\n                    <!---->\n                    <h4 class=\"\">INTELLIGENCE SULLA SICUREZZA<\/h4>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"4884-c45\" class=\"h-text h-text-component style-2332 style-local-4884-c45 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p><span style=\"color: rgb(255, 255, 255);\">Il SOC si avvale di informazioni e intelligence sulla sicurezza provenienti da fonti interne ed esterne. Queste informazioni consentono di identificare le minacce emergenti, i modelli di attacco e le best practice di sicurezza da attuare. L\u2019intelligence sulla sicurezza aiuta il SOC a prendere decisioni informate e ad adottare misure preventive per proteggere l\u2019organizzazione da futuri attacchi.<\/span><\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-3 h-col-md-3 h-col-12 style-2333-outer style-local-4884-c46-outer\">\n            <div data-colibri-id=\"4884-c46\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-2333 style-local-4884-c46 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"4884-c47\" class=\"h-icon style-2330 style-local-4884-c47 position-relative h-element\">\n                  <!----><span class=\"h-svg-icon h-icon__icon style-2330-icon style-local-4884-c47-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)-->\n    <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"exclamation\" viewBox=\"0 0 940.795 1896.0833\">\n      <path d=\"M512 1248v224q0 26-19 45t-45 19H192q-26 0-45-19t-19-45v-224q0-26 19-45t45-19h256q26 0 45 19t19 45zm30-1056l-28 768q-1 26-20.5 45t-45.5 19H192q-26 0-45.5-19T126 960L98 192q-1-26 17.5-45t44.5-19h320q26 0 44.5 19t17.5 45z\"><\/path>\n    <\/svg><\/span><\/div>\n                <div data-colibri-id=\"4884-c48\" class=\"h-global-transition-all h-heading style-2331 style-local-4884-c48 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-2331 style-local-4884-c48\">\n                    <!---->\n                    <!---->\n                    <h4 class=\"\">RILEVAMENTO DEGLI INCIDENTI<\/h4>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"4884-c49\" class=\"h-text h-text-component style-2332 style-local-4884-c49 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p><span style=\"color: rgb(255, 255, 255);\">Con interazione e collaborazione del personale preposto con il Team del CERT per collaborare, quando necessario, con le autorit\u00e0 competenti e attivit\u00e0 propedeutica all\u2019indagine forense per comprendere l\u2019origine dell\u2019incidente.<\/span><\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Operation Center La struttura all\u2019interno di un\u2019organizzazione responsabile della gestione e del monitoraggio della sicurezza informatica. Il suo scopo principale \u00e8 rilevare, analizzare e rispondere alle minacce alla sicurezza informatica in tempo reale. MONITORAGGIO DELLA SICUREZZA SOC monitora costantemente l\u2019ambiente informatico dell\u2019organizzazione, compresi i sistemi, le reti, le applicazioni e i dispositivi, al fine [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-4884","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cyberdefensesolutions.it\/index.php\/wp-json\/wp\/v2\/pages\/4884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdefensesolutions.it\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberdefensesolutions.it\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdefensesolutions.it\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdefensesolutions.it\/index.php\/wp-json\/wp\/v2\/comments?post=4884"}],"version-history":[{"count":20,"href":"https:\/\/www.cyberdefensesolutions.it\/index.php\/wp-json\/wp\/v2\/pages\/4884\/revisions"}],"predecessor-version":[{"id":5995,"href":"https:\/\/www.cyberdefensesolutions.it\/index.php\/wp-json\/wp\/v2\/pages\/4884\/revisions\/5995"}],"wp:attachment":[{"href":"https:\/\/www.cyberdefensesolutions.it\/index.php\/wp-json\/wp\/v2\/media?parent=4884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}