Security Operation Center (SOC)
What is a SOC?
Image Source: https://cybrhawk.com/security-operations-center/
SOC brings the organizations’ IT security monitoring and incident response activities in to a single location and hold the responsibility of handling internal breaches and cyber-attacks.
The Importance of Having a SOC
Organizations, regardless of their size is always subjected
to cyberattacks, malware infections and data breaches which lead to the hindrances
for ensuring the three most important aspects of information security (CIA) :
- Confidentiality
- Integrity
- Availability
With the rapid development of cyber attacks in this
information driven era, organizations are focusing more on solving these
security issues, providing rapid solutions by setting up a SOC, either by the
organization itself or through a security services provider.
How Does a SOC Operate?
As the first step in establishing an organizations’ SOC, the strategy needs to be clearly defined. This strategy needs to be aligned with organizations’ business goals. The second step is to set up the infrastructure supporting the strategy. A typical SOC infrastructure includes firewalls, IPS/IDS, breach detection solutions, probes, and a security information and event management (SIEM) system. SIEM aggregates and correlates data from security feeds.
Responsibilities of a SOC Team
Taking Stock of Available Resources
Implement and Manage Security Tools
Preparation, Investigation, Containment and Prevention of Incidents
It is vital for the SOC team members to be on the know of
newest security innovations and the latest trends in cybercrimes. Creation of
security roadmap and a disaster recovery plan is of utmost importance.
With the insights taken from SIEM system, the SOC team looks
into suspicious activity within IT systems and networks. The SOC should
correlate and validate alerts. SOC staff can contextualize these events within
the network environment of the business, and coordinate response activities
with key staff in real time.
Reduce Downtime and Ensure Business Continuity
Even though the most desired state of no interruptions of
downtimes is far from being possible, organizations need to operate under minimal
or no downtime to carry out business processes smoothly and intact. In an
instance of a breach, it is mandatory for the SOC to inform the stakeholders of
the event proactively, while acting to keep critical infrastructure from the
security events. SOC has to make sure that the redundancy is in place to
guarantee the business continuity.
Security Strategy
The security strategy should be in line with the business
strategies, including all the departments like IT, IR, HR, legal, compliance
and other groups.
Alert Ranking and Management
Prioritizing the threats, so that the most urgent ones are handled first, is a crucial task expected to be performed by SOC.
Threat Response
Recovery and Remediation
SOC works to restore the systems and recover any lost data
once an incident has taken place. Upon the success of this remediable steps, the
network will return to the state it was in prior to the incident.
Apart from above, SOC is responsible for root cause investigation,
security refinement and improvement and compliance management.
References
https://www.mcafee.com/enterprise/en-us/security-awareness/operations/building-a-soc.html
https://digitalguardian.com/blog/what-security-operations-center-soc
https://resources.infosecinstitute.com/topic/security-operations-center/
https://www.exabeam.com/security-operations-center/security-operations-center-roles-and-responsibilities/


In the modern digital world it is critical for the organizations to ensure the information security. This article gives a good understanding about how the modern enterprises can use SOCs to protect against cyber attacks. Good work.
ReplyDeleteThank you Santhoopa!
DeleteYou have explained everything with a nice flow Pramodi. Keep it up!
ReplyDeleteThank you Ruvishka.
DeleteGood article Pramodi. Are there any criteria when selecting a soc team?
ReplyDeleteYes Chamal. Usually a SOC team is comprised of three tiers of analysts and SOC manager. 1st tier is support security analyst who receives and looks into alerts daily. Reviews the most recent SIEM alerts to see their relevance and urgency. Carries out triage to ensure that a genuine security incident is occurring. Oversees and configures security monitoring tools.
DeleteThe second tier is security analyst addresses real security incidents. They can be identified as incident responders. They evaluate incidents identified by tier 1 analysts. Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack. Analyzes running processes and configs on affected systems. Carries out in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted. Creates and implements a strategy for containment and recovery.
Third tier deals with critical incidents. Carries out vulnerability assessments and penetration tests to assess the resilience of the organization and to isolate areas of weakness that need attention. Reviews alerts, threat intelligence, and security data.
There is no firm structure as such, one that fits for all. Based on the organizations' budget and requirements, team can be structured. Even option for outsourcing is available.
Good read pramodi! As SOC has many features and benefits, nearly how much cost will it be?
ReplyDeleteIt definitely is a highly subjective matter Rajitha. It depends on whether you are going to adopt a fully in house SOC or a hybrid one or going for a MSSP. Then again, what SIEM your organization choose (Since there is a wide array of options with different cost plans), and other technologies you decide to go for evaluating the context of the organization in terms of business needs. The staffing model is going to account for most of the allocated budget for the SOC, and the model depends on the context of the business we are focusing on. I think it's a tough job to come up with a rough value without the context given.
Delete