{"id":8347,"date":"2020-05-27T11:14:06","date_gmt":"2020-05-27T08:14:06","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8347"},"modified":"2020-05-27T11:14:06","modified_gmt":"2020-05-27T08:14:06","slug":"security-as-a-service-cto","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/security-as-a-service-cto\/8347\/","title":{"rendered":"Hizmet olarak anahtar teslim koruma"},"content":{"rendered":"<p>Bir s\u00fcredir Hizmet Olarak Yaz\u0131l\u0131m (SaaS) modelleriyle \u00e7al\u0131\u015fmam\u0131zla birlikte, art\u0131k t\u00fcm altyap\u0131lar\u0131 (IaaS) ve platformlar\u0131 (PaaS) da sunabilmek ad\u0131na benzer projeler bizim i\u00e7in daha ilgi \u00e7ekici olmaya ba\u015flad\u0131. Bu yakla\u015f\u0131m\u0131n d\u00fcnyada \u00e7ap\u0131ndaki kurulu\u015flar a\u00e7\u0131s\u0131ndan iyi bir do\u011frultu oldu\u011funa inan\u0131yoruz; anahtar teslim bir \u00e7\u00f6z\u00fcm kullanmak, i\u015fletmelerin temel g\u00f6revlerine daha fazla odaklanabilmelerini sa\u011fl\u0131yor. Ancak, kurumsal d\u00fczeydeki \u015firketlere Hizmet Olarak G\u00fcvenlik modeli kapsam\u0131nda tam anlam\u0131yla entegre bir koruma sa\u011flamak m\u00fcmk\u00fcn m\u00fc?<\/p>\n<h2>Anahtar teslim koruma anlay\u0131\u015f\u0131m\u0131z<\/h2>\n<p>Bu soruyu cevaplayabilmek i\u00e7in \u00f6ncelikle tam entegre koruma ifadesiyle ne kastetti\u011fimizi a\u00e7\u0131klamal\u0131y\u0131z. Bu ifade, i\u015fletmelerden bahsediyorsak tehdit m\u00fcdahalesinin t\u00fcm a\u015famalar\u0131nda altyap\u0131n\u0131n korunmas\u0131 anlam\u0131na gelir:<\/p>\n<ul>\n<li>U\u00e7 noktalarda u\u00e7 nokta \u00e7\u00f6z\u00fcmlerini kullanarak, olay \u00f6nleme a\u015famas\u0131nda;<br>\n\u0130stemci taraf\u0131ndan g\u00fcvenlik \u00e7\u00f6z\u00fcmlerinden g\u00fcvenlik operasyonlar\u0131 merkezine (SOC) ge\u00e7en verileri izleyerek ve analiz ederek, tehdit alg\u0131lama a\u015famas\u0131nda;<\/li>\n<li>Yeni tehditler hakk\u0131ndaki hipotezleri test etmeyi ve yeni g\u00fcvenlik ihlali ve sald\u0131r\u0131 g\u00f6stergeleri (IoC\u2019\/IoA) i\u00e7in ge\u00e7mi\u015f verilerin geriye d\u00f6n\u00fck taranmalar\u0131n\u0131 i\u00e7eren tehdit arama a\u015famas\u0131nda;<\/li>\n<li>SOC ekibinin belirli bir \u015f\u00fcpheli olay\u0131n ger\u00e7ek bir tehdit mi, do\u011fru bir eylem mi (yanl\u0131\u015f alarm) oldu\u011funu belirledi\u011fi tehdit do\u011frulama a\u015famas\u0131nda;<\/li>\n<li>Sald\u0131r\u0131 zincirini yeniden olu\u015fturup \u00e7\u00f6z\u00fcm \u00f6nerileri sunarken, olaya m\u00fcdahale a\u015famas\u0131nda.<\/li>\n<li>U\u00e7 Nokta Koruma Platformu ve U\u00e7 Nokta Tespiti ve M\u00fcdahale (EDR) s\u0131n\u0131f\u0131 \u00e7\u00f6z\u00fcmleri, ilk a\u015famay\u0131 otomatik modda ger\u00e7ekle\u015ftirir. Sonraki t\u00fcm a\u015famalar i\u00e7in SOC uzmanlar\u0131n\u0131n s\u00fcrece kat\u0131l\u0131m\u0131 kritik \u00f6nem ta\u015f\u0131r. Bununla birlikte, her i\u015fletme kurum i\u00e7erisinde \u00e7al\u0131\u015facak bir SOC ekibini kar\u015f\u0131layamaz.<\/li>\n<\/ul>\n<h2>SOC ekibine sahip olmayan \u015firketlerin durumu ne olacak?<\/h2>\n<p>Kurum i\u00e7i bir SOC ekibine sahip olmak, kapsaml\u0131 korumaya sahip olmak i\u00e7in gerekli bir ko\u015ful de\u011fildir. Asl\u0131na bak\u0131l\u0131rsa, Gartner Peer Insights platformunda <a href=\"https:\/\/www.gartner.com\/reviews\/market\/endpoint-protection-platforms\/vendor\/kaspersky\/product\/kaspersky-endpoint-security-for-business\" target=\"_blank\" rel=\"noopener nofollow\">U\u00e7 Nokta Koruma tipi<\/a> platformlar ile (SOC\u2019nin mevcut oldu\u011funu varsayan) <a href=\"https:\/\/www.gartner.com\/reviews\/market\/endpoint-detection-and-response-solutions\/vendor\/kaspersky\/product\/kaspersky-anti-targeted-attack-platform-kata\" target=\"_blank\" rel=\"noopener nofollow\">EDR<\/a> s\u0131n\u0131f\u0131 \u00e7\u00f6z\u00fcmler i\u00e7in yap\u0131lan yorumlar\u0131n say\u0131s\u0131 kar\u015f\u0131la\u015ft\u0131r\u0131larak elde edilen verilerde, b\u00fcy\u00fck \u00f6l\u00e7ekli \u015firketlerin b\u00fcy\u00fck \u00e7o\u011funlu\u011funda bir SOC ekibi bulunmad\u0131\u011f\u0131, yaln\u0131zca %20\u2019sinin kurum i\u00e7inde \u00e7al\u0131\u015fan bir SOC ekibine sahip oldu\u011fu g\u00f6r\u00fclm\u00fc\u015ft\u00fcr.<\/p>\n<p>Peki geriye kalan %80\u2019lik b\u00f6l\u00fcm SOC i\u015flemlerini nas\u0131l y\u00fcr\u00fct\u00fcyor? \u00c7o\u011fu i\u00e7in ak\u0131lc\u0131 olan se\u00e7enek, g\u00fcvenlik i\u015flevlerini bir ba\u015fkas\u0131na devretmektir. S\u00f6z konusu i\u015flemler, y\u00f6netilen bir g\u00fcvenlik hizmeti sa\u011flay\u0131c\u0131s\u0131 (MSSP) veya (bizim durumumuzda oldu\u011fu gibi) esas olarak MSSP i\u015flevlerinin bir k\u0131sm\u0131n\u0131 ele alan bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc tedarik\u00e7isinin y\u00fcr\u00fctt\u00fc\u011f\u00fc, tehditleri arama, de\u011ferlendirme, teyit etme ve olaylara m\u00fcdahale ama\u00e7l\u0131 yap\u0131lan uzman \u00e7al\u0131\u015fmalar\u0131 taraf\u0131ndan ger\u00e7ekle\u015ftirilebilir.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-8348\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2020\/05\/26151948\/security-as-a-service-cto-MDR-1024x576.png\" alt=\"\" width=\"1024\" height=\"576\"><\/p>\n<p>Bu yakla\u015f\u0131m kapsam\u0131nda, m\u00fc\u015fteriler s\u0131radan EDR\u2019ye k\u0131yasla \u00e7ok daha geni\u015f bir i\u015flevsellik bar\u0131nd\u0131ran dizi \u00e7\u00f6z\u00fcme sahip olurlar. S\u00f6z konusu i\u015flevsellik kapsam\u0131nda, hem a\u011f trafi\u011finde ger\u00e7ekle\u015fen anormallikleri (A\u011f Tespiti ve M\u00fcdahale, NDR) analiz ederek tehdit alg\u0131lamay\u0131 hem de olaya ili\u015fkin bilgilerin uzmanlar taraf\u0131ndan yorumlanmas\u0131 (Y\u00f6netilen Tespit ve M\u00fcdahale, MDR) se\u00e7ene\u011fi yer al\u0131r. Sahip oldu\u011fumuz SOC hizmeti, uzmanlar\u0131n d\u00fcnya \u00e7ap\u0131ndaki olaylar ve yeni tehditler hakk\u0131ndaki bilgilere h\u0131zl\u0131 bir \u015fekilde eri\u015febilmeleri bak\u0131m\u0131ndan benzersizdir. Tehdit tespiti ve m\u00fcdahale s\u00fcre\u00e7leri (EDR + NDR = XDR) h\u00e2lihaz\u0131rda olduk\u00e7a iyi bir \u015fekilde otomatikle\u015ftirilmi\u015f olsa da, bu alan\u0131 s\u00fcrekli olarak geli\u015ftiriyoruz ve gelecekte daha da g\u00fc\u00e7lendirmeyi planl\u0131yoruz.<\/p>\n<p>ATT&amp;CK Evaluation metodolojisi, sundu\u011fumuz yakla\u015f\u0131m\u0131n etkinli\u011fini kan\u0131tlad\u0131. Yakla\u015f\u0131m\u0131n kendine \u00f6zg\u00fc do\u011fas\u0131 dolay\u0131s\u0131yla, <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/mitre-attack\" target=\"_blank\" rel=\"noopener nofollow\">MITRE ATT&amp;CK Evaluation Round 2<\/a> \u00e7\u00f6z\u00fcm\u00fcn \u00f6zellikle tespit yeteneklerine odakland\u0131. Bu nedenle, SOC uzmanlar\u0131m\u0131z\u0131n benzersiz bir \u015fekilde yetenekli oldu\u011fu olay m\u00fcdahalesi, \u00f6nleme ve tehdit avc\u0131l\u0131\u011f\u0131 gibi di\u011fer y\u00f6nler kas\u0131tl\u0131 olarak kapsam d\u0131\u015f\u0131 b\u0131rak\u0131lm\u0131\u015ft\u0131r.<\/p>\n<p>EDR \u00e7\u00f6z\u00fcmlerimiz, kendilerini hem \u015firket i\u00e7i hem de d\u0131\u015f kaynak kullan\u0131ml\u0131 SOC\u2019ler aras\u0131nda g\u00fcvenilirlik ve uygunluk a\u00e7\u0131s\u0131ndan kan\u0131tlanm\u0131\u015ft\u0131r. Yukar\u0131da belirtilen Gartner Peer Insights portal\u0131na g\u00f6re, Kaspersky Anti Targeted Attack \u00e7\u00f6z\u00fcm\u00fcm\u00fcz ilk 3\u2019te yer almaktad\u0131r ve <a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-1YVUSVMM&amp;ct=200427&amp;st=sb\" target=\"_blank\" rel=\"noopener nofollow\">U\u00e7 Nokta Tespiti ve M\u00fcdahalesinde M\u00fc\u015fterilerin Tercihi<\/a> olarak kabul edilmi\u015ftir. \u00c7\u00f6z\u00fcm\u00fcm\u00fcz hakk\u0131nda yorumda bulunmak i\u00e7in zaman ay\u0131ran t\u00fcm m\u00fc\u015fterilerimize te\u015fekk\u00fcr ederiz.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8349 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2020\/05\/26152100\/security-as-a-service-cto-Gartner.png\" alt=\"\" width=\"619\" height=\"541\"><\/p>\n<p>\u00d6zetle, m\u00fc\u015fterinin tercih etti\u011fi ara\u00e7 setinin otomasyon derecesini se\u00e7ebilme ve anahtar teslim \u00e7\u00f6z\u00fcmlerini ek \u00f6zelliklerle y\u00fckseltebilme opsiyonuna sahip olmas\u0131 ko\u015fuluyla. bilgi g\u00fcvenli\u011finin gelece\u011finin \u015f\u00fcphesiz \u015fekilde Hizmet Olarak G\u00fcvenlik\u2019te oldu\u011funa inan\u0131yorum.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hizmet Olarak G\u00fcvenlik bilgi g\u00fcvenli\u011finin gelece\u011fini temsil ediyor.<\/p>\n","protected":false},"author":2597,"featured_media":8350,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1363,2200,2201,2203,1991,2202],"class_list":{"0":"post-8347","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-edr","10":"tag-mdr","11":"tag-ndr","12":"tag-soc","13":"tag-soc2","14":"tag-xdr"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/security-as-a-service-cto\/8347\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/security-as-a-service-cto\/21343\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/security-as-a-service-cto\/16800\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-as-a-service-cto\/22400\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-as-a-service-cto\/20529\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/security-as-a-service-cto\/18934\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/security-as-a-service-cto\/22784\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/security-as-a-service-cto\/21776\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-as-a-service-cto\/28445\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-as-a-service-cto\/35625\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/security-as-a-service-cto\/14933\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/security-as-a-service-cto\/15510\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/security-as-a-service-cto\/13486\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/security-as-a-service-cto\/24083\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-as-a-service-cto\/28422\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/security-as-a-service-cto\/25441\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-as-a-service-cto\/22345\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-as-a-service-cto\/27622\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-as-a-service-cto\/27454\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/soc2\/","name":"SOC2"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2597"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8347"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8347\/revisions"}],"predecessor-version":[{"id":8354,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8347\/revisions\/8354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8350"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}