“…Preparation [22], [55], [67], [103]- [113] Detection & Analysis [4], [67], [80], [83], [114]- [118] Containment, Eradication & Recovery [80], [83], [97], [103], [104], [114], [117]- [122] operations. Since the goal of a SOC is to respond to or prepare for incidents, one way to structure the underlying processes is through the Incident Response Lifecycle [103], [114], [119], [120] or similar frameworks such as presented in ISO/IEC 27035:2016 [123]. According to the NIST Computer Security Incident Handling Guide [124], the Incident Response Lifecycle comprises the four steps "preparation", "detection and analysis", "containment, eradication and recovery" and "Post-incident activity", which also form the structure of the following chapter.…”