Deploying a Modern Security Data Lake Solve Legacy SIEM Problems, Integrate Data Science, and Enable Collaboration David Baum REPORT Compliments ofDavid BaumDeploying a Modern Security Data Lake Solve Legacy SIEM Problems, Integrate Data Science, and Enable Collaboration Boston Farnham Sebastopol Tokyo Beijing Boston Farnham Sebastopol Tokyo Beijing978-1-098-13495-2 [LSI]Deploying a Modern Security Data Lake by David Baum Copyright © 2022 O’Reilly Media Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles ( http://oreilly.com ). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com . Acquisitions Editor: Nicole Butterfield Development Editor: Gary O’Brien Production Editor: Kate Galloway Copyeditor: nSight, Inc.Proofreader: Jonathon Owen Interior Designer: David Futato Cover Designer: Randy Comer Illustrator: Kate Dullea July 2022: First Edition Revision History for the First Edition 2022-07-21: First Release The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Deploying a Modern Security Data Lake , the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. The views expressed in this work are those of the author and do not represent the publisher’s views. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights. This work is part of a collaboration between O’Reilly and Snowflake. See our state‐ ment of editorial independence .Table of Contents Acknowledgments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v 1.The Rise of the Security Data Lake. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Understanding the Limitations of the Traditional SIEM Model 2 Expanding Y our Analytic Horizons 4 Reviewing Security Data Lake Prototypes 5 Introducing the Modern Cloud Security Data Lake 6 Harnessing the Power of a Cloud Data Platform and Connected Ecosystem 7 Summary 8 2.Implementing a Security Data Lake. . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Phase 1: Assess Y our Current State 11 Phase 2: Collect and Migrate Data 13 Phase 3: Establish and Verify Analytics 14 Roles and Responsibilities 16 Summary 17 3.Connecting Best-of-Breed Security Applications. . . . . . . . . . . . . . . . 19 Understanding the Connected Applications Model 21 Context Matters 22 Counting the C

pdf文档 Deploying a Modern Security Data Lake

安全文档 > 网络安全 > 文档预览
中文文档 46 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共46页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
Deploying a Modern Security Data Lake 第 1 页 Deploying a Modern Security Data Lake 第 2 页 Deploying a Modern Security Data Lake 第 3 页
下载文档到电脑,方便使用
本文档由 思安2023-09-05 13:03:56上传分享
给文档打分
您好可以输入 255 个字符
网站域名是多少( 答案:github5.com )
评论列表
  • 暂时还没有评论,期待您的金玉良言
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。