White Paper

Best Practices for Integrating ZscalerTM Security Analytics & Logging Capabilities into the Security Operations Workflow

Best Practices for Integrating ZscalerTM Security Analytics & Logging Capabilities into the Security Operations Workflow

Pages 49 Pages

Best Practices for Integrating ZscalerTM Security Analytics & Logging Capabilities into the Security Operations WorkflowZSCALER SOC TECHNICAL WHITEPAPER 2 ©2021 Zscaler, Inc. All rights reserved. Table of contents Overview 4 SOC Goals and Key Processes 4 Real-time Event Monitoring, Classification, and Triage 4 Threat Assessment, Prioritization, and Analysis 5 Incident Response, Remediation, and Recovery 5 Vulnerability Assessment, Audit, and Compliance Management 5 Adversary Behavior and MITRE ATT&CK Framework 6 Zscaler Cloud: Defense in Depth Threat Protection Capabilities 6 Zscaler Internet Access (ZIA) Logging Architecture 7 Nanolog and Nanolog Streaming Service (NSS) 7 Zscaler Internet Access (ZIA) Analytics 8 Dashboards 8 I

Join for free to read