{"id":36227,"date":"2024-03-14T10:00:26","date_gmt":"2024-03-14T16:00:26","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=36227"},"modified":"2026-03-09T04:28:53","modified_gmt":"2026-03-09T10:28:53","slug":"melhores-praticas-sociais","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/","title":{"rendered":"Melhores pr\u00e1ticas de SOC que voc\u00ea deve implementar"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"SOC Best Practices\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/SOC-BEST_Masthead-1.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/\/SOC-BEST_Masthead-1-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/SOC-BEST_Masthead-1-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/SOC-BEST_Masthead-1-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-03-14T10:00:26-06:00\">Mar 14, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">SOC Best Practices You Should Implement<\/h1>\n\n\n<div class=\"bs-div bs-div-4c0c357bf69b7e1367afb30b9d59be1945441399 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('SOC%20Best%20Practices%20You%20Should%20Implement').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fsoc-best-practices-2%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Importance%20of%20Implementing%20SOC%20Best%20Practices%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fsoc-best-practices-2%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fsoc-best-practices-2%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fsoc-best-practices-2%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<p>Implementing best practices in the <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">Security Operations Center<\/a> (SOC) has always been imperative for businesses, but it is particularly crucial in today&#8217;s rapidly evolving digital landscape. Why? Well, it is a <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">SOC&#8217;s responsibility<\/a> to safeguard the organization&#8217;s sensitive data, intellectual property, and customer information by monitoring security breaches, responding to security incidents, patching vulnerabilities, and implementing security policies and procedures. But to do this effectively and strengthen the overall security posture, security operations must implement certain structures, strategies and infrastructure.&nbsp;<\/p>\n\n\n\n<p>So, what makes a successful SOC? Let&#8217;s dive in and discover the best practices your organization should have in place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are Security Operation Center Best Practices?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-aligning-strategy-with-your-organization-s-goals\">Aligning Strategy with Your Organization&#8217;s Goals<\/h3>\n\n\n\n<p>When it comes to managing security operations, it is vital to align strategy with the overall business goals. By doing so, organizations can ensure that security efforts directly contribute to the success and stability of the business as a whole.&nbsp;<\/p>\n\n\n\n<p>For example, if your business aims to protect customer data and maintain their trust, the SOC strategy should prioritize data security and privacy. By aligning with this goal, <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">SOC teams<\/a> can implement measures such as data encryption, access controls, and regular security audits to mitigate risks and safeguard sensitive information. Ultimately, aligning strategy with business goals allows us to streamline our security operations and maximize the effectiveness of our SOC.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-leverage-the-best-security-automation-tools\">Leverage the Best Security Automation Tools<\/h3>\n\n\n\n<p>Leveraging the best comprehensive and advanced <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a> tools is crucial to operating a successful SOC. These tools enable organizations to enhance efficiency and productivity in <a href=\"https:\/\/swimlane.com\/blog\/what-is-threat-detection-incident-response-2\/\">threat detection and incident response<\/a>.&nbsp;<\/p>\n\n\n\n<p>For example, utilizing an advanced <a href=\"https:\/\/swimlane.com\/blog\/siem-soar\/\">SIEM (Security Information and Event Management) <\/a>system allows us to centralize and analyze data from various sources, enabling the detection of potential threats more efficiently. Additionally, employing a powerful <a href=\"https:\/\/swimlane.com\/blog\/incident-response-platform\/\">incident response platform<\/a> can streamline the incident handling process and ensure timely response. But the best security tool is one that can do it all, and <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> is that tool. It is the triple threat of automation, generative artificial intelligence, and low code that solves the most challenging problems across your entire security organization.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-utilize-comprehensive-threat-intelligence-and-machine-learning\">Utilize Comprehensive Threat Intelligence and Machine Learning<\/h3>\n\n\n\n<p>The next best practice for SOCs is to utilize comprehensive <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence<\/a> and machine learning while also addressing the significant <a href=\"https:\/\/swimlane.com\/blog\/what-automation-has-to-do-with-ai-and-cybersecurity\/\">role of AI in cybersecurity<\/a>. Advanced technologies, such as <a href=\"https:\/\/swimlane.com\/platform\/ai\/\">Hero AI<\/a> and <a href=\"https:\/\/swimlane.com\/platform\/adaptable-playbooks\/\">Low Code Canvas<\/a>, not only enhance analysis and response capabilities for analysts but also speed up regular human processes like decision-making and problem-solving. Additionally, machine learning algorithms enable the automation of repetitive tasks, like schema inference and case summarization, allowing security teams to focus on more complex security issues.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ensure-visibility-across-the-entire-network\">Ensure Visibility Across the Entire Network<\/h3>\n\n\n\n<p>By having complete visibility, SOC analysts can proactively monitor the network for any suspicious activity, <a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\">type of cybersecurity attack<\/a> or <a href=\"https:\/\/swimlane.com\/blog\/insider-threat-detection\/\">insider threat<\/a> and identify potential vulnerabilities. Network monitoring and visibility techniques such as network traffic analysis, log analysis, and <a href=\"https:\/\/swimlane.com\/blog\/power-of-idps-in-cybersecurity\/\">intrusion detection systems<\/a> (ISD) are vital in ensuring this secure environment. Moreover, having those security automation tools we suggested previously in place, like <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> and SIEM, can provide real-time alerts and insights into any potential security breaches.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-continuous-network-monitoring\">Continuous Network Monitoring<\/h3>\n\n\n\n<p>Continuous network monitoring is another best practice for a successful <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a> so security incidents can be detected and responded to promptly, minimizing the potential impact on the business. And implementing best practices for continuous network monitoring involves a couple of key steps. Firstly, it is important to establish a baseline of regular network activity to detect any anomalies. This can be achieved through the use of network monitoring tools that provide real-time information about network traffic. In addition to this, the SOC must ensure that the monitoring systems are regularly updated to detect the latest threats and vulnerabilities.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-secure-and-patch-vulnerabilities\">Secure and Patch Vulnerabilities<\/h3>\n\n\n\n<p>Now, proactive and <a href=\"https:\/\/swimlane.com\/blog\/automating-vulnerability-lifecycle-management\/\">automated vulnerability management<\/a> also plays a central role in SOC operations, ensuring any potential weak spots are addressed well before they can be exploited. Conducting regular vulnerability assessments, implementing effective patch management processes, and maintaining secure configurations are all essential practices.&nbsp;<\/p>\n\n\n\n<p>Organizations can identify and prioritize necessary patches by regularly scanning systems and applications for vulnerabilities. Having this proactive approach in place minimizes the likelihood of an attack and, ultimately, strengthens the overall security posture. But remember, securing and patching vulnerabilities is an ongoing process requiring diligence, prompt action and, most importantly, an automated setup.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-implement-efficient-soc-processes\">Implement Efficient SOC Processes<\/h3>\n\n\n\n<p>Lastly, once these six SOC best practices are in place, the last step is to establish and implement efficient SOC processes. The following five SOC procedures should be optimized to maximise efficiency so operations can promptly detect and respond to security incidents:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Event classification<\/strong> &#8211; where security events are categorized based on their severity and impact.&nbsp;<\/li>\n\n\n\n<li><strong>Triage<\/strong> &#8211; where the events are evaluated and prioritized for further analysis and response. <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/siem-alert-triage\/\">SIEM Triage<\/a> and <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/edr-alert-triage\/\">EDR Triage<\/a>, in particular, help security teams with the overwhelming number of alerts coming in from their respective tools.&nbsp;<\/li>\n\n\n\n<li><strong>Analysis<\/strong> &#8211; This involves investigating the events in detail, gathering relevant information, and determining the appropriate action to be taken.<\/li>\n\n\n\n<li><strong>Remediation<\/strong> &#8211; This involves taking necessary steps to mitigate the identified risks and resolve the security incidents. It may include applying patches, updating configurations, or implementing additional security measures.<\/li>\n\n\n\n<li><strong>Reporting<\/strong> &#8211; This benefits the organization when it is centralized for CISOs and other leadership, as this can spur strategy revision, stronger communication and advice for future threat prevention.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-enhance-your-security-operations-with-soc-best-practices-nbsp\">Enhance Your Security Operations with SOC Best Practices&nbsp;<\/h2>\n\n\n\n<p>It is crucial for organizations to invest in these SOC practices to mitigate risks, improve threat detection and response capabilities, and safeguard their data. By proactively adopting SOC best practices, businesses can stay one step ahead of cyber threats and ensure the resilience of their security operations. To learn more about how Swimlane Turbine will enhance and automate an organization&#8217;s SOC, request a live demo below. <\/p>\n\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-7b016bdc4caf8b4fa85303bb12025fab68803ef2 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-7b016bdc4caf8b4fa85303bb12025fab68803ef2 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/DragDrop.gif' class='img-fluid'   alt='roi report swimlane security automation' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/DragDrop.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-request-a-demo\">Request a demo<\/h2>\n\n\n\n<p>If you haven&#8217;t had the chance to explore Swimlane Turbine yet, request a demo.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-cdfc885ebd52d5653fc9de8946ee15c2fe234d7c\"><style>.bs-pro-button-p-btn-cdfc885ebd52d5653fc9de8946ee15c2fe234d7c .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/pt\/tag\/soc\/'><span class='tag-content'>SOC<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d02df53ac80 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/vulnerability-and-patch-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mar 3, 2026<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Vulnerability Management vs. Patch Management Explained<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d02df53c2c8 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Swimlane ARMOR Framework<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d02df53d620 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":36228,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":36228,"learn_more_label":"","image_alt_text":"Automation ","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[199],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,77],"class_list":["post-36227","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soc","resource-type-blogs","blog-category-security-automation","blog-category-platform"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Importance of Implementing SOC Best Practices | Swimlane<\/title>\n<meta name=\"description\" content=\"Learn SOC best practices with Swimlane. Understand how aligning strategy, leveraging automation tools, and taking advantage of AI &amp; machine learning improves your SOC\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/melhores-praticas-sociais-2\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Importance of Implementing SOC Best Practices | Swimlane\" \/>\n<meta property=\"og:description\" content=\"Learn SOC best practices with Swimlane. Understand how aligning strategy, leveraging automation tools, and taking advantage of AI &amp; machine learning improves your SOC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/melhores-praticas-sociais-2\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T10:28:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Importance of Implementing SOC Best Practices | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"Learn SOC best practices with Swimlane. Understand how aligning strategy, leveraging automation tools, and taking advantage of AI &amp; machine learning improves your SOC\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/\",\"url\":\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/\",\"name\":\"The Importance of Implementing SOC Best Practices | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png\",\"datePublished\":\"2024-03-14T16:00:26+00:00\",\"dateModified\":\"2026-03-09T10:28:53+00:00\",\"description\":\"Learn SOC best practices with Swimlane. Understand how aligning strategy, leveraging automation tools, and taking advantage of AI & machine learning improves your SOC\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png\",\"width\":1120,\"height\":666,\"caption\":\"SOC Best Practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOC Best Practices You Should Implement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/pt\/#website\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A import\u00e2ncia da implementa\u00e7\u00e3o das melhores pr\u00e1ticas de SOC | Swimlane","description":"Aprenda as melhores pr\u00e1ticas de SOC com a Swimlane. Entenda como alinhar a estrat\u00e9gia, aproveitar as ferramentas de automa\u00e7\u00e3o e tirar proveito da IA e do aprendizado de m\u00e1quina aprimora seu SOC.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/melhores-praticas-sociais-2\/","og_locale":"pt_PT","og_type":"article","og_title":"The Importance of Implementing SOC Best Practices | Swimlane","og_description":"Learn SOC best practices with Swimlane. Understand how aligning strategy, leveraging automation tools, and taking advantage of AI & machine learning improves your SOC","og_url":"https:\/\/swimlane.com\/pt\/blogue\/melhores-praticas-sociais-2\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-09T10:28:53+00:00","og_image":[{"width":1120,"height":666,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"The Importance of Implementing SOC Best Practices | Swimlane","twitter_description":"Learn SOC best practices with Swimlane. Understand how aligning strategy, leveraging automation tools, and taking advantage of AI & machine learning improves your SOC","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/","url":"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/","name":"A import\u00e2ncia da implementa\u00e7\u00e3o das melhores pr\u00e1ticas de SOC | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png","datePublished":"2024-03-14T16:00:26+00:00","dateModified":"2026-03-09T10:28:53+00:00","description":"Aprenda as melhores pr\u00e1ticas de SOC com a Swimlane. Entenda como alinhar a estrat\u00e9gia, aproveitar as ferramentas de automa\u00e7\u00e3o e tirar proveito da IA e do aprendizado de m\u00e1quina aprimora seu SOC.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/SOC-BEST_Masthead-1.png","width":1120,"height":666,"caption":"SOC Best Practices"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/soc-best-practices-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"SOC Best Practices You Should Implement"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/36227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/36227\/revisions"}],"predecessor-version":[{"id":54815,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/36227\/revisions\/54815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/36228"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=36227"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=36227"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=36227"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=36227"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=36227"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=36227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}