Building a SOC involves three key elements: enlisting talented people, giving them an analytics pipeline to power processes, and obtaining business buy-in. There are different types of SOCs like virtual, dedicated, and distributed models. Data sources like endpoints, networks, and identities are essential. An analytics pipeline with enrichments, correlations, and anomaly detection is important. Processes like threat modeling, responding to threats, and using playbooks guide the SOC. People fill tiers like SOC I to triage events and SOC II to correlate and respond. Feedback loops help continuously improve the SOC. Technology supports processes but processes are more important than any single technology.