{"id":36312,"date":"2024-03-19T08:00:00","date_gmt":"2024-03-19T14:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=36312"},"modified":"2026-03-09T04:15:04","modified_gmt":"2026-03-09T10:15:04","slug":"construyendo-una-sociedad-moderna","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/","title":{"rendered":"C\u00f3mo construir un Centro de Operaciones de Seguridad (SOC) moderno"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Build a Modern SOC\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/SOC-BUILD_Masthead.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/\/SOC-BUILD_Masthead-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/SOC-BUILD_Masthead-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/SOC-BUILD_Masthead-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-03-19T08:00:00-06:00\">Mar 19, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">How to Build a Modern Security Operations Center (SOC)<\/h1>\n\n\n<div class=\"bs-div bs-div-4c0c357bf69b7e1367afb30b9d59be1945441399 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('How%20to%20Build%20a%20Modern%20Security%20Operations%20Center%20%28SOC%29').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fbuilding-modern-soc-2%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=How%20to%20Build%20a%20Modern%20Security%20Operations%20Center%20%28SOC%29&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fbuilding-modern-soc-2%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fbuilding-modern-soc-2%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fbuilding-modern-soc-2%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<p>A robust and efficient <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">Security Operations Center (SOC)<\/a> is paramount in today&#8217;s ever-evolving cybersecurity landscape. And as cyber threats become more sophisticated daily, organizations&#8217; security operations must adopt proactive measures and continuously evolve to protect both their data and their infrastructure.&nbsp;<\/p>\n\n\n\n<p>This guide outlines the steps and strategies essential for creating a SOC capable of efficiently detecting, responding to, and mitigating diverse cybersecurity attacks and threats. So, let&#8217;s get started.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Build a Modern SOC:<\/h2>\n\n\n\n<p>When it comes to building a modern <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">Security Operations Center<\/a>, several key elements and steps exist to make a successful modern SOC:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-identify-gaps-and-develop-your-soc-strategy\">Identify Gaps and Develop Your SOC Strategy<\/h3>\n\n\n\n<p>Before diving into the technical aspects of building a modern SOC, you must understand your organization&#8217;s unique needs and limitations. You can start by thoroughly assessing your current security landscape and identify the gaps that need to be addressed &#8211; consider factors such as budget, resources, and industry regulations. Only then, once you clearly understand your organization&#8217;s requirements, can you then start developing an effective SOC strategy.&nbsp;<\/p>\n\n\n\n<p><strong>One helpful tip<\/strong>: Collaborate with key stakeholders, such as the <a href=\"https:\/\/swimlane.com\/blog\/aligning-your-soc-and-c-suite-on-cyber-security\/\">C-suite<\/a>, IT and executive management, to align overall goals and objectives. By doing so, you can create a strategy that meets your organization&#8217;s specific needs and lay a strong foundation for your <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-choose-your-security-solution-nbsp\">Choose Your Security Solution&nbsp;<\/h3>\n\n\n\n<p>Once security operations<strong> <\/strong>(<a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>) understand the organization&#8217;s specific requirements and develop a strategy, you can choose your solution accordingly. This step involves considering factors such as the size of your organization, the nature of your industry, and the <a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\">types of cyber attacks<\/a> or <a href=\"https:\/\/swimlane.com\/blog\/insider-threat-detection\/\">insider threats<\/a> your business is likely to face. Is it <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/phishing\/\">phishing<\/a>? Malware attacks? Denial-of-Service (DoS) Attacks? Each type of attack may require a different approach, so be careful when deciding on your security solution.&nbsp;<\/p>\n\n\n\n<p>Additionally, it could be useful to look at examples and case studies of other successful SOC designs to gain insight and inspiration as learning from real-world examples helps you understand best practices and avoid common pitfalls. So, look for advice from <a href=\"https:\/\/swimlane.com\/\">cybersecurity experts<\/a> and take the time to research and analyze successful SOC structures to inform your own choices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-develop-well-defined-processes-procedures-amp-training-programs\">Develop Well-Defined Processes, Procedures, &amp; Training Programs<\/h3>\n\n\n\n<p>The next step is to develop well-defined processes, procedures, and training programs. These elements are the backbone of an effective SOC, playing a vital role in <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/incident-response\/\">incident response<\/a>, <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence<\/a>, and overall cybersecurity operations.&nbsp;<\/p>\n\n\n\n<p>To develop effective processes and procedures, you must define clear <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">SOC team roles and responsibilities<\/a>, establish incident handling protocols, and implementing best practices for documentation and reporting. Investing in continuous training for your <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">SOC team<\/a> is also critical to ensure that all <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">SOC analysts<\/a> and staff are equipped with the necessary skills and knowledge to investigate and respond to security incidents effectively.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-create-an-efficient-and-effective-environment\">Create an Efficient and Effective Environment<\/h3>\n\n\n\n<p>Preparing your environment is the next building block and one key aspect of this preparation is network segmentation. By dividing your network into smaller, isolated segments, you can contain potential breaches and prevent unauthorized access to critical systems. This practice also allows for easier monitoring and control of network traffic within the <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>.&nbsp;<\/p>\n\n\n\n<p>Another vital consideration is implementing robust access controls. By carefully managing user privileges and permissions, you can limit the risk of <a href=\"https:\/\/swimlane.com\/blog\/insider-threat-detection\/\">insider threats<\/a> and unauthorized access to sensitive information. Additionally, establishing the right infrastructure requirements, such as sufficient bandwidth and storage capacity, is essential to support operations effectively.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-tool-implementation-and-integration-with-existing-systems\">Tool Implementation and Integration with Existing Systems<\/h3>\n\n\n\n<p>Now, the fifth stage in building and designing a modern SOC is implementing your chosen solution. While a single security platform with end-to-end protection, like <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a>, is the most resourceful, it is entirely possible to integrate your solution with your existing one. This may involve integrating with your old <a href=\"https:\/\/swimlane.com\/blog\/siem-soar\/\">SOAR or SIEM <\/a>&nbsp;platform, <a href=\"https:\/\/swimlane.com\/blog\/incident-response\/\">incident response<\/a> tools, or other security technologies. However, if you choose this option, make sure to thoroughly test the integration to ensure seamless communication and data flow between systems.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-closely-monitor-the-old-security-framework\">Closely Monitor the Old Security Framework<\/h3>\n\n\n\n<p>During the implementation of your solution, take care to closely monitor the transition from the old security framework to the new one. Conduct thorough testing to identify any gaps or issues. Make sure your IT, <a href=\"https:\/\/swimlane.com\/blog\/noc-vs-soc\/\">NOC and SOC<\/a> teams work closley together to ensure a smooth migration, or integration, and minimize any disruptions to your organization&#8217;s regular operations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-deploy-end-to-end-use-cases\">Deploy End-to-End Use Cases<\/h3>\n\n\n\n<p>Deploying <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/\">end-to-end use cases<\/a> is one of the most crucial steps in building a modern SOC. These use cases allow you to cover various security scenarios and ensure that your SOC is capable of detecting and responding to threats with ease.&nbsp;&nbsp;<\/p>\n\n\n\n<p>From our experience, these are the top 5 use cases to have in your SOC arsenal:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/threat-hunting\/\">Threat Hunting<\/a>: Allows for the proactive searching of cyber threats that are lurking undetected in the network.<\/li>\n\n\n\n<li><a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/edr-alert-triage\/\">EDR Alert Triage<\/a>: Useful when manually researching alerts with EDR&nbsp; tools, and executing endpoint actions can be too slow to be effective.<\/li>\n\n\n\n<li><a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/phishing\/\">Phishing Triage<\/a>: A great first automation use case for many organizations where the threats are in high volumes, are often false positives, generally low-level of sophistication, and are time-sensitive in nature.<\/li>\n\n\n\n<li><a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/siem-alert-triage\/\">SIEM Triage<\/a>: Reduces errors and false positives, centralizse alert information, stops breaches faster and mitigates analyst burnout when SIEM tools are overwhelmed.&nbsp;<\/li>\n\n\n\n<li>And <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/incident-response\/\">Incident Response<\/a>, identifying and addressing cyber threats before they cause more significant damage. This can include malware infections, compromised credentials or unauthorized access due to sophisticated ransomware attacks.<\/li>\n<\/ul>\n\n\n\n<p>However, to continuously optimize your deployed use cases, it&#8217;s essential to regularly review and update them based on new <a href=\"https:\/\/swimlane.com\/blog\/automating-vulnerability-lifecycle-management\/%20https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence <\/a>and evolving security trends.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-maintain-and-evolve-your-modern-soc\">Maintain and Evolve Your Modern SOC<\/h3>\n\n\n\n<p>Lastly, maintaining and evolving your modern SOC is more important than ever for staying ahead of emerging cyber threats. Continuously improving your organization&#8217;s cybersecurity posture requires regular maintenance and tasks that help modernise your SOC. These include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Keeping hardware and software up to date with the latest patches and updates to address any vulnerabilities that may arise.&nbsp;<\/li>\n\n\n\n<li>Implementing a robust vulnerability management program to proactively identify and address potential weaknesses in your SOC infrastructure.&nbsp;<\/li>\n\n\n\n<li>Regularly assessing and addressing any performance vulnerabilities can strengthen your defense against potential security breaches.&nbsp;<\/li>\n\n\n\n<li>Continuously monitoring emerging threats, new technologies and AI trends in the cybersecurity landscape.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;Providing ongoing training for SOC personnel to ensure they are equipped with the latest skills and knowledge. This is particularly important due to the ongoing <a href=\"https:\/\/swimlane.com\/blog\/cybersecurity-skills-shortage\/\">cybersecurity skills shortage<\/a>.&nbsp;<\/li>\n\n\n\n<li>Remaining compliant with industry regulations.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Build Your Own Modern SOC with Swimlane Turbine<\/h2>\n\n\n\n<p>Remember, cybersecurity is an ongoing process, and a proactive approach to building, maintaining and evolving a modern SOC is key to staying ahead. By following these eight&nbsp; steps, you are well on your way to enhancing your organization&#8217;s cybersecurity posture and protecting against emerging threats.&nbsp;<\/p>\n\n\n\n<p>But what pulls all of these steps together and is the key to efficiency is the right solution.&nbsp;Swimlane Turbine is the triple threat of automation, generative artificial intelligence, and low-code that you need to solve the most challenging problems across your entire security organization and inside and outside the SOC. <\/p>\n\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-376b4e1a5cef2a02aa9b8b4da380a43ce5363e71 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-376b4e1a5cef2a02aa9b8b4da380a43ce5363e71 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/DragDrop.gif' class='img-fluid'   alt='roi report swimlane security automation' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/DragDrop.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-request-a-demo\">Request a demo<\/h3>\n\n\n\n<p>If you haven&#8217;t had the chance to explore Swimlane Turbine yet, request a demo.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-cdfc885ebd52d5653fc9de8946ee15c2fe234d7c\"><style>.bs-pro-button-p-btn-cdfc885ebd52d5653fc9de8946ee15c2fe234d7c .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/es\/tag\/soc\/'><span class='tag-content'>SOC<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dba55a8718b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/vulnerability-and-patch-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mar 3, 2026<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Vulnerability Management vs. Patch Management Explained<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dba55a8858d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Swimlane ARMOR Framework<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69dba55a898b9 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":36313,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":36313,"learn_more_label":"","image_alt_text":"Build a modern SOC","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[199],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,77],"class_list":["post-36312","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soc","resource-type-blogs","blog-category-security-automation","blog-category-platform"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Build a Modern Security Operations Center (SOC)<\/title>\n<meta name=\"description\" content=\"Building a Security Operations Center (SOC) can be challenging. Discover how to create a modern SOC &amp; strengthen your organization&#039;s cybersecurity here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/edificio-moderno-soc-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Build a Modern Security Operations Center (SOC)\" \/>\n<meta property=\"og:description\" content=\"Building a Security Operations Center (SOC) can be challenging. Discover how to create a modern SOC &amp; strengthen your organization&#039;s cybersecurity here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/edificio-moderno-soc-2\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T10:15:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Building a Security Operations Center (SOC) can be challenging. Discover how to create a modern SOC &amp; strengthen your organization&#039;s cybersecurity here.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/\",\"url\":\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/\",\"name\":\"How to Build a Modern Security Operations Center (SOC)\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png\",\"datePublished\":\"2024-03-19T14:00:00+00:00\",\"dateModified\":\"2026-03-09T10:15:04+00:00\",\"description\":\"Building a Security Operations Center (SOC) can be challenging. Discover how to create a modern SOC & strengthen your organization's cybersecurity here.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png\",\"width\":1120,\"height\":666,\"caption\":\"Build a Modern SOC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Build a Modern Security Operations Center (SOC)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"C\u00f3mo construir un Centro de Operaciones de Seguridad (SOC) moderno","description":"Construir un Centro de Operaciones de Seguridad (SOC) puede ser un desaf\u00edo. Descubra c\u00f3mo crear un SOC moderno y fortalecer la ciberseguridad de su organizaci\u00f3n aqu\u00ed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/edificio-moderno-soc-2\/","og_locale":"es_ES","og_type":"article","og_title":"How to Build a Modern Security Operations Center (SOC)","og_description":"Building a Security Operations Center (SOC) can be challenging. Discover how to create a modern SOC & strengthen your organization's cybersecurity here.","og_url":"https:\/\/swimlane.com\/es\/blog\/edificio-moderno-soc-2\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-09T10:15:04+00:00","og_image":[{"width":1120,"height":666,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Building a Security Operations Center (SOC) can be challenging. Discover how to create a modern SOC & strengthen your organization's cybersecurity here.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/","url":"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/","name":"C\u00f3mo construir un Centro de Operaciones de Seguridad (SOC) moderno","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png","datePublished":"2024-03-19T14:00:00+00:00","dateModified":"2026-03-09T10:15:04+00:00","description":"Construir un Centro de Operaciones de Seguridad (SOC) puede ser un desaf\u00edo. Descubra c\u00f3mo crear un SOC moderno y fortalecer la ciberseguridad de su organizaci\u00f3n aqu\u00ed.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BUILD_Masthead.png","width":1120,"height":666,"caption":"Build a Modern SOC"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/building-modern-soc-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"How to Build a Modern Security Operations Center (SOC)"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/36312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":2,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/36312\/revisions"}],"predecessor-version":[{"id":54805,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/36312\/revisions\/54805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/36313"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=36312"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=36312"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=36312"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=36312"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=36312"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=36312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}