i SECURITY OPERATIONS CENTER (SOC) – All things in moderation

SECURITY OPERATIONS CENTER (SOC)

What is a Security Operations Center (SOC)?

A security operations center (SOC) is a facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis. The SOC team’s goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of processes. Security operations centers are typically staffed with security analysts and engineers as well as managers who oversee security operations. SOC staff work close with organizational incident response teams to ensure security issues are addressed quickly upon discovery.(digitalguardian.com)

Security operations centers monitor and analyze activity on networks, servers, endpoints, databases, applications, websites, and other systems, looking for anomalous activity that could be indicative of a security incident or compromise. The SOC is responsible for ensuring that potential security incidents are correctly identified, analyzed, defended, investigated, and reported.

How a Security Operations Center works?

Rather than being focused on developing security strategy, designing security architecture, or implementing protective measures, the SOC team is responsible for the ongoing, operational component of enterprise information security. Security operations center staff is comprised primarily of security analysts who work together to detect, analyze, respond to, report on, and prevent cybersecurity incidents. Additional capabilities of some SOCs can include advanced forensic analysis, cryptanalysis, and malware reverse engineering to analyze incidents.

For the SOC to be effective, it must continuously accommodate new technologies and controls in line with sweeping changes in the ongoing threat environment. This includes:
– Global Threat Intelligence: Immediately actionable intelligence providing invaluable insights and context, available in a range of formats and delivery methods.
– Threat Hunting: The real-time detection of both known and new cyber-espionage and cybercriminal campaigns targeting your critical information systems.
– Knowledge Management: Our security training programs are designed for you to obtain in-house expertise in digital forensics, malware analysis and incident response.
– Incident Response: Knowledgeable specialists, armed with extensive practical experience of fighting cyberthreats, will help you to quickly identify, isolate and block malicious activity.

Regulatory requirements

Establishing and operating a SOC is expensive and difficult; organisations should need a good reason to do it. This may include:
– Protecting sensitive data
– Complying with industry rules such as PCI DSS.
– Complying with government rules, such as CESG GPG53.

Three key functions of a SOC: people, process, and technology.

People

To begin building a powerful security operations team, it’s important to inventory your available staff.
Many organizations choose to build their SOCs with in-house resources, bringing together existing security functions and providing formal training programs for others interested in joining. Others opt for a hybrid mix of in-house and external resources. The best option for you depends on the available in-house resources, your budget, and the urgency of the threats you face. Here are some questions to ask to help determine the composition and timeline for creating your SOC:
– How many security folks, among others across the organization who will be a part of the SOC, are there?
– What is the hiring plan and budget?
– What is the total annual security budget? Can we pull any more budget from IT or other departments to support implementing the SOC?
– How much are our security pain points affecting us and how soon can we build the SOC to address them?

Process

With a SOC, incident management workflows should be established from the get-go, ensuring that each step in the process is part of a larger strategy. Workflows also help to offer clarity around each team member’s role and responsibilities so that no stone is left unturned.

To get you started, SANS offers a straightforward six-step incident response process: preparation, containment, eradication, recovery, and lessons learned. In general, SOCs should aim to have the following security processes in place before they get started:
– Monitoring
– Alerting
– Escalation
– Investigation
– Incident logging
– Compliance monitoring
– Reporting
These processes should cover all major security events that could apply to your business — from malware to phishing scams, and from zero-day attacks to advanced persistent threats (APT). Not sure what types of events to prepare for? Here are the five types of cyberattacks companies are most likely to face:
– Brute force attack
– Social engineering/cyber fraud
– DDOS
– Phishing
– Malware, spyware, ransomware
Most important of all is the process that ties each step together, ensuring the transition of each task is clearly laid out day-to-day and person-to-person. This is so that, in the event of a real attack, everyone in security operations knows their responsibility and how it fits in with the end-to-end process.

Technology

SOCs typically are based around a security information and event management (SIEM) system which aggregates and correlates data from security feeds such as network discovery and vulnerability assessment systems; governance, risk and compliance (GRC) systems; web site assessment and monitoring systems, application and database scanners; penetration testing tools; intrusion detection systems (IDS); intrusion prevention system (IPS); log management systems; network behavior analysis and Cyber threat intelligence; wireless intrusion prevention system; firewalls, enterprise antivirus and unified threat management (UTM). The SIEM technology creates a “single pane of glass” for the security analysts to monitor the enterprise.

I recently introduced you to SOC. For more information you can watch the video and material I provide below. If you have any comments on the article or have more information about SOC please share with me. I appreciate that. Thank you for reading.

Building a World-Class Security Operations Center: A Roadmap
Security Operations Center Kaspersky
Information security operations center – wikipedia
Creating and Maintaining a SOC
Building a SOC

Reference:
https://digitalguardian.com
https://www.kaspersky.com
https://wikipedia.org
https://blog.komand.com

Leave a Reply