{"id":55,"date":"2023-09-06T10:42:20","date_gmt":"2023-09-06T10:42:20","guid":{"rendered":"https:\/\/its.tsolkas.com\/?post_type=services&#038;p=55"},"modified":"2023-12-21T11:09:18","modified_gmt":"2023-12-21T11:09:18","slug":"establishment-of-the-security-operations-center","status":"publish","type":"services","link":"https:\/\/its.tsolkas.com\/en\/services\/establishment-of-the-security-operations-center","title":{"rendered":"SOC Readiness Assessment"},"content":{"rendered":"<ul>\n<li>Check of the relevant IT documentation<\/li>\n<li>Check of the security policies<\/li>\n<li>Check of the processes<\/li>\n<li>Check of risk management<\/li>\n<li>Check of the security controls<\/li>\n<li>Check of the vulnerabilities<\/li>\n<li>Documentation of the check results<\/li>\n<li>Scheduling of the corrective actions<\/li>\n<li>Definition of the SOC scope<\/li>\n<li>Definition of the SOC deliverables and milestones<\/li>\n<li>Planning of the employee resources<\/li>\n<li>Technology planning<\/li>\n<li>Budgeting<\/li>\n<li>Project planning<\/li>\n<\/ul>\n","protected":false},"featured_media":56,"template":"","class_list":["post-55","services","type-services","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/services\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/services"}],"about":[{"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/types\/services"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/media\/56"}],"wp:attachment":[{"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/media?parent=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}