{"id":37442,"date":"2024-04-09T08:00:00","date_gmt":"2024-04-09T14:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=37442"},"modified":"2024-04-22T14:13:56","modified_gmt":"2024-04-22T20:13:56","slug":"mesures-de-securite-soar-2","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/","title":{"rendered":"Quels indicateurs de s\u00e9curit\u00e9 dois-je surveiller\u00a0?"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure style=\"aspect-ratio:auto;\" class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Security Metrics\" style=\"width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/WG_SecurityMetrics_Masthead.png 1200w, https:\/\/swimlane.com\/wp-content\/uploads\/\/WG_SecurityMetrics_Masthead-300x157.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/WG_SecurityMetrics_Masthead-1024x534.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/WG_SecurityMetrics_Masthead-768x401.png 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-04-09T08:00:00-06:00\">Avr 9, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">What Security Metrics Should I Be Looking At?<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/fr\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('What%20Security%20Metrics%20Should%20I%20Be%20Looking%20At%3F').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fsoar-security-metrics%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=What%20Security%20Metrics%20Should%20I%20Be%20Looking%20At%3F&url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fsoar-security-metrics%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fsoar-security-metrics%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Ffr%2Fblog%2Fsoar-security-metrics%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p>Your security operations (<a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>) team deals with a lot of data. But the problem is that security teams are constantly busy putting out fires and fixing the latest vulnerabilities. Where does the time come from to pull security metrics from multiple tools and look at trends? Or even more importantly, how does a CISO show progress and proof of investment to their company leadership? Automation will help, so let\u2019s dive into how and all the security metrics your organization can save time and money on with the right platform. But first, let\u2019s understand what security metrics are.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are Security Metrics?&nbsp;<\/h2>\n\n\n\n<p>Security metrics refer to measurable parameters that are used to evaluate the status of an organization&#8217;s systems and services. Metrics include the collection, analysis, and reporting of relevant data, which helps to understand the effectiveness of your security measures, allowing organizations to identify weaknesses and areas of improvement. Ultimately, the security metrics you choose to track should hold influence over your <a href=\"https:\/\/swimlane.com\/blog\/soc-best-practices-2\/\">SOC processes<\/a> and strategy aligning with your overall business KPI. They should also be simple to understand for C-suite and senior executives as they are then used to inform decisions on how to enhance the overall security of the organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Choose the Right Cybersecurity Metrics<\/h2>\n\n\n\n<p>By selecting and tracking the right security metrics, organizations gain valuable insight into their performance and make data-driven decisions to improve the overall security posture. But the metrics chosen depend on your industry, security needs, regulations, guidelines, <a href=\"https:\/\/swimlane.com\/blog\/soc-best-practices-2\/\">best practices<\/a>, and your level of risk. Choose the right metrics by considering these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Align with Objectives:<\/strong> Selected metrics aligned with the specific organizations security goals and priorities, as well as the assets and data that need to be protected, to maintain relevance and usefulness.<\/li>\n\n\n\n<li><strong>Relevance: <\/strong>Choose metrics directly related to the organization&#8217;s security posture and potential risks.<\/li>\n\n\n\n<li><strong>Compliance:<\/strong> Prioritize metrics that aid in maintaining regulatory compliance and data protection standards.<\/li>\n\n\n\n<li><strong>Vulnerability Severity: <\/strong>Track metrics that categorize vulnerabilities based on severity and potential impact to prioritize patching and remediation efforts.<\/li>\n\n\n\n<li><strong>Risk Exposure: <\/strong>Evaluating metrics that consider factors like threat likelihood, vulnerability severity, and asset value can help in assessing cyber risk exposure.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">How Can Security Automation Make Security Metrics Easier?<\/h2>\n\n\n\n<p>Now, with the right platform, you can make the task of gathering important security metrics easier. By automating tracking and reporting with a <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> platform, organizations can collect and analyze security data in a more consistent and reliable manner. This data can then be used to generate a dashboard and track key security metrics happening in your <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a> environment, such as the number of security incidents, the time taken to detect and remediate threats, and the overall security posture of the organization. Automation also helps in reducing human error and improving response times, allowing security teams to focus on more strategic tasks rather than being preoccupied with manual, time-consuming processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Security Metrics Examples to Be Aware of&nbsp;<\/h2>\n\n\n\n<p>In order to begin tracking security metrics, it\u2019s key to determine what matters to your organization. For example, some <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> metrics that a <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a> director might be interested in are:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-level-of-preparedness\">1. Level of Preparedness<\/h3>\n\n\n\n<p>Critical incidents won\u2019t happen every day, but you want to be ready when they do. How long does an incident<a href=\"https:\/\/swimlane.com\/blog\/incident-response\/\"> response<\/a> in your organization take? Do you have a plan that everyone in your <a href=\"https:\/\/swimlane.com\/blog\/real-challenges-facing-secops\/\">SecOps team<\/a> understands and can execute quickly?<\/p>\n\n\n\n<p>Instead of waiting for disaster to strike, ensure that your organization creates <a href=\"https:\/\/swimlane.com\/blog\/incident-response-playbook\/\">incident response playbooks<\/a> to demonstrate the preparedness and effectiveness of your Security Operations Center (<a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>). These playbooks will map out how to address various incidents and minimize human error that can occur during high-stress events.<\/p>\n\n\n\n<p>Questions to ask that will help identify your level of preparedness include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Is your technology and tool implementation effective? Look at trends over time by the signal source.<\/li>\n\n\n\n<li>Are there spikes of events from multiple ingest pipelines? How effective is your correlation across your enterprise?<\/li>\n\n\n\n<li>Where are the gaps in controls, and how are they affecting your risk management program? Look at the <a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK<\/a>\u00ae Enterprise Framework for tactics and techniques.<\/li>\n\n\n\n<li>What are your residual risks, scores, and priorities? Residual risk is your inherent risk minus your risk control.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-number-of-vulnerabilities\">2. Number of Vulnerabilities<\/h3>\n\n\n\n<p>Vulnerabilities are weaknesses in your system that attackers exploit to gain access or control. Of course, the goal is to have no vulnerabilities, but third-party vendors and software exploits make that impossible. You should track the following vulnerability metrics:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Vulnerability source<\/strong> (threat models, code reviews, dependency scans, bug bounties, etc.)<\/li>\n\n\n\n<li><strong>Vulnerability category<\/strong> (authorization, authentication, input validation, configuration, etc.)<\/li>\n\n\n\n<li><strong>Number of critical vulnerabilities by environment <\/strong>(endpoints, public &amp; private cloud, etc.)<\/li>\n\n\n\n<li><strong>Number of vulnerabilities that are opened or closed over time<\/strong><\/li>\n\n\n\n<li><strong>Are they on the CISA <\/strong><a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\"><strong>Known Exploited List<\/strong><\/a>?<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Mean Time to Detect (MTTD)<\/h3>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/blog\/reducing-security-operations-mttd-mttr\/\">Mean Time to Detect (MTTD)<\/a> is the average time between the moment an attacker is inside your network and the time you detect them there. This can be measured using various tools, including packet capture analysis and <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence<\/a> platforms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Mean Time to Resolve (MTTR)<\/h3>\n\n\n\n<p>It\u2019s important to look at your security team\u2019s <a href=\"https:\/\/swimlane.com\/blog\/reducing-security-operations-mttd-mttr\/\">Mean Time to Resolve (MTTR)<\/a>, which signifies how long an organization has been compromised. Resolution times are a major factor in determining the overall impact of an attack on an organization. The longer the resolution, the more damage you can expect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-dwell-time\">5. Dwell Time<\/h3>\n\n\n\n<p>Dwell time is the duration a threat actor has undetected access in a network until their completely removed. This number should be as low as possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. First-Party Security Ratings<\/h3>\n\n\n\n<p>When you\u2019re looking at security metrics, it\u2019s critical to also look at first-party security ratings. These ratings (on scales such as A-F and 1-10) show an organization\u2019s security performance in different security automation use case areas like <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/phishing\/\">phishing<\/a>, <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/siem-alert-triage\/\">SIEM alert Triage<\/a>, and <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/threat-hunting\/\">Threat Hunting<\/a>. Ratings give you a sense of how much better or worse your organization is performing in comparison to internal and industry standards. They give you a good idea about where you need to invest more resources to improve your organization\u2019s cybersecurity posture.<\/p>\n\n\n\n<p>First-party ratings help organizations understand their own relative risk and progress over time. They also help demonstrate value to customers and partners who may be looking at those same ratings right now. It\u2019s easy to pull MoM and YoY progress for non-technical stakeholders.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-swimlane-can-help-with-security-metrics-nbsp\">How Swimlane Can Help with Security Metrics&nbsp;<\/h2>\n\n\n\n<p>It\u2019s important to remember that continuous monitoring and timely incident response are vital to securing your organization. While the exact metrics you should look at will vary based on your specific environment, they remain a crucial way to track the overall health of your security infrastructure. This keeps tabs on new threats in and beyond your SOC.Swimlane and other <a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation-simplicity\/\">low-code security automation platforms<\/a> are an easy choice to ensure resilience and proactive protection against the next major attack.<\/p>\n\n\n\n<div class=\"bs-div bs-div-69e8f03694ea2375ba0069b634500cb314b03006 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-69e8f03694ea2375ba0069b634500cb314b03006 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/ROIReport.jpg' class='img-fluid'   alt='ROI analysis report cover highlighting Swimlane security automation benefits and enterprise return on investment.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h4 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-calculate-your-roi-with-swimlane-turbine\">Calculate your ROI with Swimlane Turbine<\/h4>\n\n\n\n<p class=\"has-white-color has-text-color\">To help companies evaluate the potential financial impact of the potential investment, TAG Cyber conducted an extensive study on the Swimlane Security Automation Solution.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-3dcff85805a2a040343145bd6b45cf3753ac421d\"><style>.bs-pro-button-p-btn-3dcff85805a2a040343145bd6b45cf3753ac421d .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/roi-report\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/fr\/tag\/soc\/'><span class='tag-content'>SOC<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d09a175e3a2 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/incomm-payments-customer-story\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jan 19, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Why InComm Payments Chose Swimlane to Unite Its Tech Stack<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d09a175f9a0 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/weedmaps-customer-story\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Juil 18, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Why Weedmaps Chose Swimlane for DevSecOps Automation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d09a1760a88 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/fr\/blog\/ntt-data-customer-story\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mai 24, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Why NTT DATA Chose Swimlane for Security Automation<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":37443,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":37443,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[199],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75],"class_list":["post-37442","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soc","resource-type-blogs","blog-category-security-automation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Cybersecurity Metrics Should I Be Looking at? | Swimlane<\/title>\n<meta name=\"description\" content=\"What are security metrics? SecOps deals with a lot of data, so choosing the right cybersecurity metrics to track is crucial. Automate security metrics with Swimlane\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/fr\/blog\/indicateurs-de-securite-de-soar\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Security Metrics Should I Be Looking At?\" \/>\n<meta property=\"og:description\" content=\"What are security metrics? SecOps deals with a lot of data, so choosing the right cybersecurity metrics to track is crucial. Automate security metrics with Swimlane\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/fr\/blog\/indicateurs-de-securite-de-soar\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T20:13:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"What are security metrics? SecOps deals with a lot of data, so choosing the right cybersecurity metrics to track is crucial. Automate security metrics with Swimlane\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/\",\"url\":\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/\",\"name\":\"What Cybersecurity Metrics Should I Be Looking at? | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png\",\"datePublished\":\"2024-04-09T14:00:00+00:00\",\"dateModified\":\"2024-04-22T20:13:56+00:00\",\"description\":\"What are security metrics? SecOps deals with a lot of data, so choosing the right cybersecurity metrics to track is crucial. Automate security metrics with Swimlane\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png\",\"width\":1200,\"height\":626,\"caption\":\"Security Metrics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Security Metrics Should I Be Looking At?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/fr\/#website\",\"url\":\"https:\/\/swimlane.com\/fr\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/fr\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quels indicateurs de cybers\u00e9curit\u00e9 dois-je surveiller\u00a0? | Swimlane","description":"Que sont les indicateurs de s\u00e9curit\u00e9\u00a0? Les op\u00e9rations de s\u00e9curit\u00e9 (SecOps) traitent une grande quantit\u00e9 de donn\u00e9es\u00a0; il est donc crucial de choisir les bons indicateurs de cybers\u00e9curit\u00e9 \u00e0 suivre. Automatisez vos indicateurs de s\u00e9curit\u00e9 avec Swimlane.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/fr\/blog\/indicateurs-de-securite-de-soar\/","og_locale":"fr_FR","og_type":"article","og_title":"What Security Metrics Should I Be Looking At?","og_description":"What are security metrics? SecOps deals with a lot of data, so choosing the right cybersecurity metrics to track is crucial. Automate security metrics with Swimlane","og_url":"https:\/\/swimlane.com\/fr\/blog\/indicateurs-de-securite-de-soar\/","og_site_name":"AI Security Automation","article_modified_time":"2024-04-22T20:13:56+00:00","og_image":[{"width":1200,"height":626,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"What are security metrics? SecOps deals with a lot of data, so choosing the right cybersecurity metrics to track is crucial. Automate security metrics with Swimlane","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/","url":"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/","name":"Quels indicateurs de cybers\u00e9curit\u00e9 dois-je surveiller\u00a0? | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png","datePublished":"2024-04-09T14:00:00+00:00","dateModified":"2024-04-22T20:13:56+00:00","description":"Que sont les indicateurs de s\u00e9curit\u00e9\u00a0? Les op\u00e9rations de s\u00e9curit\u00e9 (SecOps) traitent une grande quantit\u00e9 de donn\u00e9es\u00a0; il est donc crucial de choisir les bons indicateurs de cybers\u00e9curit\u00e9 \u00e0 suivre. Automatisez vos indicateurs de s\u00e9curit\u00e9 avec Swimlane.","breadcrumb":{"@id":"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/WG_SecurityMetrics_Masthead.png","width":1200,"height":626,"caption":"Security Metrics"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/fr\/blog\/soar-security-metrics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"What Security Metrics Should I Be Looking At?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/fr\/#website","url":"https:\/\/swimlane.com\/fr\/","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","description":"Automatisation par IA agentique pour chaque fonction de s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/swimlane.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/fr\/#organization","name":"Plateforme d&#039;automatisation de la s\u00e9curit\u00e9 low-code et SOAR | Swimlane","url":"https:\/\/swimlane.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/37442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/sw_resource\/37442\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media\/37443"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/media?parent=37442"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/tags?post=37442"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-type?post=37442"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-topic?post=37442"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/resource-industry?post=37442"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/fr\/wp-json\/wp\/v2\/blog-category?post=37442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}