NIST CSF Practitioner Chapter 8 - Security Operations Center (SOC)
NIST CSF Practitioner Chapter 8 - Security Operations Center (SOC)
At the end of the chapter, we will discuss SOC alternatives and key decision criteria that an
organization should consider when selecting their best option for continuous security monitoring.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 2
Learning Objectives
• Understand
• What it will take to answer the question "Are we Secure“
• Information Security Continuous Monitoring (ISCM) definition, goals
and objectives
• The key steps in an ISCM program, SIEM solution, and SOC functions
• SOC technology solutions and how they map to cyber attacks
• SOC personnel, resources, roles, responsibilities, skills and duties
• Threat hunting approach for uncovering a threat actor's TTPs
• Incident management requirements
• SOC best practices including log sources, incident categories, threat
analysis
• Common SOC use cases, IOCs, and common log sources
• SOC alternatives (build, buy, outsource, etc.)
• Summarize the key benefits of an ISCM and include why
organizations fail to implement continuous monitoring programs
• In a given scenario, analyze and explain your rationale for the
implementation of an ISCM program
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 3
The Current Profile (Before the Factory) The Target Profile (After the Factory)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 4
Lesson
Security Operations Overview
Are We Secure?
Information Security Continuous Monitoring (ISCM)
ISCM Technical Solutions aka A SIEM
ISCM Operations aka A SOC
Security Operations
Overview
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 5
• Goals
• Provide Security Information & Event Management (SIEM)
capability
• Support threat detection
• Incident response
• Real-time collection & historical analysis of security events
• Enable Compliance reporting & incident investigation
• Objectives
• Deploy a Security Operations Center (SOC)
• Continuously monitor & improve organizational security posture
• Prevent, detect, analyze and respond to cybersecurity incidents
• Use technology & well defined process & procedures
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 6
Are We Secure?
Most IT security teams struggle to establish and maintain ongoing awareness of the state of information security in their
company. Security professionals, when asked “Are we secure?" by executives, are unable to articulate the answer in a
manner that resonates with management.
Why can't we answer this question? The chief reason is the lack of continuous monitoring and real-time visibility into
the overall security picture that plagues many organizations.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 7
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 8
1. Define an ISCM strategy. Based on risk tolerance that maintains clear visibility into
assets, awareness of vulnerabilities, up-to-date threat information and
mission/business impacts.
4. Analyze the data collected and report findings. Determine appropriate response.
6. Review and Update the monitoring program. Adjust the ISCM strategy and
measurement capabilities to increase visibility into assets and awareness of
vulnerabilities.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 9
Security Devices
Event Correlation
Servers & Mainframes Logs
True
Flows Offense
Network & Virtual Activity IP Location
Geo Location Offense Identification
Suspected
Data Activity
Credibility
Severity
Application Activity Activity Baselining & Anomaly Detection Performance
User Activity
Data security does not take care of itself. SIEM solutions take the edge off of these concerns by acting as a constant watchdog
that performs several services: logging information, correlating data, alerting security administrators as soon as a breach is
detected, and providing a dashboard of what is happening in the environment at any given time. Simply put, SIEM solutions
gives organizations visibility into their security posture by providing usable and actionable information.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 10
SIEM Basics
Situation Resolution
Security threats continue to be more sophisticated SIEM can provide a great deal of visibility into an
and advanced with each day, with the majority organization’s networks and identify extremely
often going completely undetected. sophisticated threats that may have otherwise been
hidden.
Organizations are usually scrambling to keep up and
implement new security controls to protect By integrating with other security technologies, the
themselves, which adds a new layer of complexity. SIEM solution can act as a single window into the
threats and possible breaches that your
With the rise of Advanced Persistent Threats (APTs) organization is facing.
and insider attacks, it becomes extremely difficult
for security staff to detect all the risks. SIEM technology is also becoming more advanced
with the capability to use advanced correlation
Many IT and IT Security staff are already stretched engines as well as big data analytics to provide
thin by keeping track of many different security insightful analysis and forensics into the overall
technologies that already exist. data.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 11
SIEM Capabilities
1. Data aggregation: Log management aggregates data from many sources, including
network, security, servers, databases, applications, providing the ability to consolidate
monitored data to help avoid missing crucial events.
2. Correlation: Looks for common attributes, and links events together into meaningful
bundles. This technology provides a variety of correlation techniques to integrate different
sources, in order to turn data into useful information.
3. Alerting: The automated analysis of correlated events and production of alerts, to notify
recipients of immediate issues. Alerting can be to a dashboard, or sent via third party
channels such as email.
4. Dashboards: Tools can take event data and turn it into informational charts to assist in
seeing patterns, or identifying activity that is not forming a standard pattern.
7. Forensic analysis: The ability to search across logs on different nodes and time periods
based on specific criteria. This mitigates manual aggregation of log information or
searching through thousands and thousands of logs.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 12
ISCM Operations
Attackers target every layer of the IT Infrastructure
Network
A cyber security operations center (or " SOC ") is a location where enterprise information systems (web
sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are
continuously monitored, assessed, and defended.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 13
Cyber-Intelligence Services
CSIRT
SOC People & Process
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 14
19.90 K Annual
99.98 M Annual
Security Attacks
Security Events
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 15
“A SOC is related with the people, processes and technologies involved in providing situational awareness
through the detection, containment, and remediation of IT threats. A SOC manages incidents for the
enterprise, ensuring they are properly identified, analyzed, communicated, actioned/defended, investigated
and reported. The SOC also monitors applications to identify a possible cyber-attack or intrusion (event) and
determines if it is a real, malicious threat (incident), and if it could have a business impact.”
- Wikipedia
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 16
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 17
Lesson
SOC Technology
SOC Technology
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 18
• Goals
• SOC; inclusive of trained staff, processes & procedures and enabling
technology
• Early detection of cybersecurity events
• Comprehensive reporting system
• Demonstrable reduction of noncompliance
• Objectives
• Deployment of SEIM technology
• Development of a cybersecurity reporting system
• Development & deployment of cross-functional teams
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 19
• Helps find threats by combining Network Protection’s Protocol Analysis Module signature analysis and anomaly detection capabilities
• Enables real-time threat awareness and offense prioritization to establish definitive attack evidence and visibility into attacker
communications
• Integrates security content such as threat intelligence and vulnerability awareness
• Outstanding coverage available within full SIEM solution or targeted Network Anomaly Detection offering
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 20
Windows OS
Linux OS
Security Devices
RACF Event Correlation
AIX Servers
Serversand Mainframes
& Mainframes Logs
Z/OS
Flows A K Q J 10
Network & Virtual Activity IP Location
Geo Location Offense Identification K J 10
A
Data Activity
Credibility
Severity A K Q J 10
Application Activity Activity Baselining & Anomaly Detection Performance
A K Q J 10
Configuration Info User Activity
Network Activity
Vulnerability & Threat Application Activity
Alerts, unauthorized
User Activity log-ins, policy
violations,
configuration
changes, etc.
Exceptionally Accurate &
Extensive Data Sources + Deep Intelligence = Actionable Insight
• Centralizes enterprise security view allowing identification and remediation of excess mainframe access, threats and concerns
• Strengthens mainframe security operations and helps improve protection for critical mainframe environment
• Triggers complex correlation of threats, insider fraud and business risk as easy to understand “offenses” for further investigation and follow-ups
• Stores event data in forensically secure database to address regulation mandates
• Improves compliance reporting by simplifying audit and management efforts
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 21
Security Devices
Switches Event Correlation
Routers
Servers & Mainframes Logs
Firewalls
Flows A K Q J 10
Access Points Network and Virtual Activity
Network & Virtual Activity IP Location
NetFlow Geo Location Offense Identification
A K J 10
Data Activity
Credibility
Severity A K Q J 10
Application Activity Activity Baselining & Anomaly Detection Performance
Configuration Info A K Q J 10
User Activity
Network Activity
Vulnerability & Threat Application Activity
Alerts, unauthorized
User Activity log-ins, policy
violations,
configuration changes,
etc.
Exceptionally Accurate &
Extensive Data Sources + Deep Intelligence = Actionable Insight
• Centralizes enterprise security view allowing identification and remediation of network device access, threats and concerns
• Strengthens network security operations and helps improve protection for critical switches, routers, firewalls
• Triggers complex correlation of threats, insider fraud and business risk as easy to understand “offenses” for investigation and follow-ups
• Stores event data in forensically secure database to address regulation mandates
• Improves compliance reporting by simplifying audit and management efforts
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 22
Security Devices
Event Correlation
Servers & Mainframes Logs
A K Q J 10
Flows
Databases
Network & Virtual Activity IP Location
Data Warehouses Geo Location Offense Identification K J 10
A
Hadoop based Data Activity
Activity
systems Credibility
Severity K Q J 10
File shares A
Application Activity Activity Baselining & Anomaly Detection Performance
A K Q J 10
Configuration Info User Activity
Network Activity
Vulnerability & Threat Application Activity
In-depth data activity
monitoring and
User Activity
security insights
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 23
Security Devices
Event Correlation
Servers & Mainframes Logs
A K Q J 10
Flows
Network & Virtual Activity IP Location
Web applications Geo Location Offense Identification K J 10
A
Mobile applications Data Activity
Web services Credibility
K Q J 10
Desktop applications Application Activity Severity A
Application Activity Activity Baselining & Anomaly Detection Performance
A K Q J 10
Configuration Info User Activity
Network Activity
Vulnerability & Threat Application Activity
Application
User Activity vulnerability
assessments
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 24
Security Devices
Event Correlation
Servers & Mainframes Logs
A K Q J 10
Flows
Network & Virtual Activity IP Location
Geo Location Offense Identification A K J 10
Data Activity
Credibility
Servers A K Q J 10
Severity
Clients Application Activity Activity Baselining & Anomaly Detection Performance
Mobile devices A K Q J 10
Configuration Info
Configuration Info User Activity
POS, ATM, Kiosks
Network Activity
Vulnerability & Threat Application Activity
Endpoint intelligence
User Activity data from Endpoint
Manager
• Increases vulnerability database accuracy improving offense and risk analytics to limit potential offenses
• Establishes baseline for endpoint states and improves alerting on variations to detect threats other SIEMs might miss
• Speeds remediation of discovered offenses using Endpoint Manager automation
• Represents AV/DLP alerts within consolidated enterprise security view helping correlate advanced threat activities
• Improves compliance reporting with deep endpoint state data
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 25
Security Devices
Event Correlation
Servers & Mainframes Logs
A K Q J 10
Flows
Network & Virtual Activity IP Location
Geo Location Offense Identification A K J 10
Data Activity
Credibility
A K Q J 10
Severity
Application Activity Activity Baselining & Anomaly Detection
Server Vulnerability Performance
Endpoint Vulnerability A K Q J 10
Configuration Info User Activity
Web App Vulnerability
Network Vulnerability Network Activity
Vulnerability
Vulnerability&&Threat
Threat Application Activity
IOCs
Vulnerability & Threat
User Activity Information
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 26
Security Devices
Event Correlation
Servers & Mainframes Logs
A K Q J 10
Flows
Network & Virtual Activity IP Location
Geo Location Offense Identification A K J 10
Data Activity
Credibility
A K Q J 10
Severity
Application Activity Activity Baselining & Anomaly Detection Performance
A K Q J 10
Configuration Info User Activity
Network Activity
Vulnerability & Threat Application Activity
Identity information
User log-ins User Activity
Activity and user activity from
User
Access rights IAM products
Group memberships
• Provides ability to insert user names into reference sets used for writing searches, reports, and rules
• Improves ability to defend against insider threats involving privilege escalations or inappropriate data access
• Facilitates compliance reporting by pairing user identities with access to sensitive data
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 27
Lesson
SOC People
SOC Resources
SOC Roles / Responsibilities / Skills
SOC Analyst Levels, Functions, Schedule
SOC People
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 28
• Goals
• Staff with qualified analysts, security engineers and SOC Manager
• Objectives
• Seek individuals with an
• Understanding of basic computer science:
• Understanding of IT operations:
• Ability to communicate:
• Understanding of adversary motivations:
• Understanding of security operations concepts:
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 29
• Each role is equally important and an effective SOC requires good cooperation
between the roles while also following the Standard Operating Procedures (SOP) in
place.
• SOC resources cover all shifts (24 x 7), including one-hour shift transfers, considering
time off, sick days and holidays.
SOC
• SOC Manager actively directs the SOC strategy by prioritizing tasks, appropriate Roles &
decisions for mitigating incidents, ensure minimal impact to the business as new Responsibilities
attacks and threats emerge
Source: “Building a World Class Security Operations Center: A Roadmap”, May, 2015, Alissa Torres
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 30
Tier 2 Performs deep dive incident analysis by correlating data Advanced network forensics, host-based forensics,
from various sources; determines if a critical system or incident response procedures, log reviews, basic
Incident Responder data set has been impacted; advises on remediation; malware assessment, network forensics and threat
provides support for new analytic methods for detecting intelligence.
threats.
Tier 3 Processes in-depth knowledge on network, endpoint, Advanced training on anomaly-detection; tool-specific
threat intelligence, forensics and malware reverse training for data aggregation and analysis and threat
Subject Matter engineering, as well as the functioning of specific intelligence.
Expert / Hunter applications or underlying IT infrastructure; acts as an
incident “hunter”, not waiting for escalated incidents;
closely involved in developing, tuning and implementing
threat detection analytics.
Tier 4 Manages resources to include personnel, budget, shift Project management, incident response management
scheduling and technology strategy to meet SLAs; training; general people management skills.
SOC Manager communicates with management; serves as
organizational point person for business-critical incidents;
provides overall direction for the SOC and input to the
overall security strategy.
Source: “Building a World Class Security Operations Center: A Roadmap”, May, 2015, Alissa Torres
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 31
Data Loss Prevention (DLP) Familiar with basic DLP concepts and popular Understanding of DLP engine, rule sets, and
products. Able to recognize priority alerts and operations. Can perform basic DLP tuning
escalate. procedures based on findings.
Data Integrity / File Integrity / Host Knowledge of system security and data Experience configuring OS specific host policies to
intrusion prevention service (HIPS) integrity concepts used to monitor and alert identify, monitor, and alert on data, file, and
on data, file, and system changes. system changes.
Digital forensics Basic understanding of forensics concepts as Demonstrates knowledge and experience
they apply to digital attacks and evidence conducting forensic investigations and solid
handling understanding of evidence, chain of custody, and
its application to security operations.
Source: “Building a World Class Security Operations Center: A Roadmap”, May, 2015, Alissa Torres
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 32
Networks
Tier 1
Tier 2
Front Lines Alert
Incident
Analyst Responder SME /
Hunter
Tier 1
Alert Applications
Analyst Threats
SME /
SME / SOC
Hunter
Hunter Manager
Tier 1
Alert
Analyst
Tier 2
Tier 1 Incident
Front Lines Alert Responder SME /
Analyst
Hunter
Servers
SOC Manager
In addition to SOC analysts, a security operations center requires a ringmaster for its many moving parts. The SOC manager often fights
fires, within and outside of the SOC. The SOC manager is prioritizes work and organizes resources with the ultimate goal of detecting,
investigating and mitigating incidents that could impact the business. The SOC manager develops a workflow model and implements
standard operating procedures (SOPs) for the incident-handling process that guides analysts through triage and response procedures.
Source: “Building a World Class Security Operations Center: A Roadmap”, May, 2015, Alissa Torres
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 33
Source: “Building a World Class Security Operations Center: A Roadmap”, May, 2015, Alissa Torres
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 34
Lesson
SOC Process / Procedures
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 35
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 36
• Goal
• A cyber threat hunting capability to iteratively search out and identify
• Threats
• Understanding of the adversary
• Cybersecurity incident response process
• Objectives
• Handle cyber events in a way that
• Limits damage
• Reduces recovery time & costs
• An incident response plan that includes a policy that defines
• An incident
• A step-by-step process that is followed when an incident occurs
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 37
The quality and quantity of the data that an organization collects from its IT
environment is a strong factor in determining their level of Hunting Maturity.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 38
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 39
HM0 organizations are not considered HM1 is the first level in which any type of HM2 is the most common level among
to be capable of hunting. hunting occurs, even though it is minimal. organizations that have hunting programs.
Organizations rely primarily on Organizations rely primarily on automated Organizations learn and apply procedures
automated alerting tools such as IDS, alerting to drive their incident response process, developed by others on a somewhat regular
SIEM or antivirus to detect malicious but they supplement with some routine basis.
activity across the enterprise. collection of IT data.
They may make minor changes, but are not
They incorporate signature updates or These organizations are intel-driven, they base yet capable of creating new procedures
threat intelligence indicators, and their detection in large part on available threat themselves.
create their own signatures or intelligence. They track latest threat reports
indicators, but these are fed directly from a combination of open and closed sources. HM2 organizations usually collect a large
into the monitoring systems. amount of data from across their
HM1 organizations routinely collect at least a enterprise.
The human effort at HM0 is directed few types of data from their enterprise into a
primarily toward alert resolution. central location such as a SIEM or log
management product.
HM0 organizations also do not collect
much information from their IT systems Some may actually collect a lot of information.
so their ability to proactively find
threats is limited. When new threats come to their attention,
analysts are able to extract the key indicators
from these reports and search historical data to
find out if they have been seen in at least the
recent past.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 40
HM3 organizations can be quite effective at finding and combating HM4 organizations are extremely effective at resisting adversary
threat actor activity. actions.
Organizations have at least a few hunters who understand a variety The organization is essentially the same as one at HM3, with one
of different types of data analysis techniques and are able to apply important difference: automation.
them to identify malicious activity.
Any successful hunting process will be operationalized and turned
Instead of relying on procedures developed by others, these into automated detection.
organizations are usually the ones who are creating and publishing
the procedures. This frees the analysts from the burden of running the same
processes over and over, and allows them instead to concentrate
Analytic skills may be as simple as basic statistics or involve more on improving existing processes or creating new ones.
advanced topics such as linked data analysis, data visualization or
machine learning. Data collection is typically more advanced. The high level of automation allows them to focus their efforts on
creating a stream of new hunting processes, which results in
The key at this stage is for analysts to apply these techniques to constant improvement to the detection program as a whole.
create repeatable procedures, which are documented and
performed on a frequent basis.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 41
IT Administrators monitor systems and networks for events, or observable occurrences, which may evolve into an incident. The major
phases of the incident response process include preparation, detection and analysis, containment, eradication and recovery, and post-
incident activity.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 42
Step 1: Organizations establish Incident Management capability consisting of policies and procedures, system documentation, Incident
Response Team (IRT), and monitoring, communication, and mitigation tools. Network and security monitoring tools are used to evaluate
traffic across the network against policies and configurations that have been defined to implement effective security controls.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 43
Step 2: Detecting potential security incidents may be difficult since many initially evade recognition by the sole use of monitoring tools.
Knowing how a system usually behaves and learning which symptoms can indicate potential incidents is a way to recognize when you
should investigate. Correlation and analysis of events may help to identify potential incidents that may have been overlooked, which could
become a more serious problem. Early awareness of potential incidents can stop damage, disclosure, and other harmful effects before they
happen. Incident detection and analysis may take several individuals reviewing activity before it is realized that an incident has occurred.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 44
Step 3a: There is a delicate balance between protecting evidence from an incident and containing an incident to prevent further impact. If
evidence is destroyed, it may be difficult to determine the root cause and prosecute the attacker. Containment strategies vary based on the
type of incident. Criteria for determining the appropriate strategy include the potential damage to and theft of resources, need for evidence
preservation, service availability (e.g., network connectivity, services provided to external parties), time and resources needed to implement
the strategy, effectiveness of the strategy (e.g., partially contains the incident, fully contains the incident), and duration of the solution
(emergency workaround vs. temporary workaround vs. permanent solution)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 45
Step 3b: After an incident has been contained and evidence preserved, as appropriate, eradication may be necessary to eliminate
components of the incident. Deleting malicious code and disabling breached user accounts are examples of eradication. For some
incidents, eradication is either not necessary or is performed during recovery. During recovery, IT Administrators restore systems to
normal operation and, as necessary, harden systems to prevent similar incidents. Recovery may involve such actions as restoring systems
from clean backups, rebuilding systems from scratch, replacing compromised files with clean versions, installing patches, changing
passwords, and adding or strengthening other security controls.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 46
Step 4: As an IT Administrator, you may be asked to participate in such “lessons learned” exercises to discuss: Exactly what happened,
and at what times? How well did staff and management perform in dealing with the incident? Were the documented procedures followed?
Were they adequate? What information was needed sooner? Were any steps or actions taken that might have inhibited the recovery? What
would the staff and management do differently the next time a similar incident occurs? What corrective actions can prevent similar
incidents in the future? What additional tools or resources are needed to detect, analyze, and mitigate future incidents?
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 47
Lesson
SOC Services
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 48
• Goals
• Improved ROI: Reduce costs by outsourcing security operations and leveraging
investments in technology and trained resources
• Enhanced security posture: Manage risks through skilled resources, defined processes,
and leading edge technologies
• Regulatory & policy compliance: Security policy and regulations relating to log
retention, data protection, data privacy, etc.
• Business aligned reporting: Integrated view of threats, vulnerabilities, performance and
compliance dashboard for effective decision making relating to security
• Objectives
• Deploy capabilities for 24 x 7
• Monitoring & managing security infrastructure
• Operational security issues
• Deploy IT security tools to solve security issues
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 49
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 50
• Penetration Testing: Pen testing helps organizations identify how a malicious user can gain
unauthorized access to assets and affect the security of systems, files, logs and/or information
assets. Pen testers attempt to access to the organization’s sensitive information by exploiting
vulnerabilities in applications, systems and / or information. The tester will analyze the
collected data and create a report with recommendations to mitigate vulnerabilities that were
discovered.
• Web Application Testing: Application analysis is an important part of enterprise security. Web
application testing can find and fix security flaws in software and prevent the damage that
unforeseen vulnerabilities can cause to a business.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 51
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 52
• Managed SIEM: Security devices generate threat data in the form of logs or events. The data is collected
in near-real time and send it to managed SIEM, which performs correlation and classification of events.
The SIEM filters out benign security events and escalates identifies incidents most likely to pose a threat.
Each incident is assigned a risk rating with reference to the specific threat-detection use case.
• Threat Detection: Threat categories are based on a near-real-time, behavior-based, multifactor correlation
capability. The SIEM evaluates and correlates reputational and behavioral patterns and characteristics, as
well as signature-based detection methods. The solution includes research and threat analyses conducted
by the security intelligence team, composed of use cases, event correlation, watch lists, findings, threat
intelligence, threat actor tactics, techniques and procedures and known indicators of compromise.
• Device Health Monitoring and Management: Device availability and health monitoring platform uses IP
blacklists to help protect against known threats. Applications are kept up to date with the latest software
patches, configuration and policy management, and backup and restore capabilities.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 53
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 54
Lesson
SOC Options
SOC Alternatives
SOC Decision Criteria
Closing Thoughts on SOCs
SOC Options
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 55
SOC Alternatives
Do It Yourself (DIY)
Central Log Management Security Information and Event
Management (SIEM)
OR
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 56
• Event Log Sources: Operating systems, devices and applications all generate logs that contain system-
specific events and notifications.
• Log Collection and Storage: Organizations deploy centralized syslog servers or use commercial products to
address the log acquisition, transport and storage issues.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 57
• SIEM Operations: A SIEM is an in-house technology that supports threat detection and security incident
response through collection and analysis of security events from a variety of event and data sources.
• Once you have the logs, to get real value, you need a solution that will find problems and sort through
the massive amounts of data quickly.
• SIEMs provide the layer of technology that allows one to say with confidence that not only are logs being
gathered but they are also being reviewed.
• SIEM also allows for the importation of data that isn't necessarily event-driven (such as vulnerability
scanning reports) - hence the "Information" portion of SIEM.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 58
• MSSP Services: MSSPs use high-availability security operation centers (either from their own
facilities or from other data center providers) to provide 24/7 services designed to reduce the
number of operational security personnel an enterprise needs to hire, train and retain to
maintain an acceptable security posture. With an MSSP, log monitoring and management is
a service, so organizations are able to rely on MSSP experts to monitor and manage event
logs instead of doing it themselves.
• MSSP Advantages:
• Extension of the security team
• Expertise without staff turnover
• Specialized duties and defined processes
• Advanced threat detection and global threat intelligence
• Knowledge of incidents and events
• Less time that organizations need to spend reviewing logs
• MSSP Weaknesses:
• Lack of detailed knowledge & understanding of the organization’s IT and business environment
• Alerts may be basic and require customers to perform triage and forensics
• Any deviation from MSSPs basic services come at an additional cost
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 59
Co-Managed SIEM
• Purpose: Co-management uses a roles-based security model to outline rules of engagement
inside the customer’s environment by enabling the service provider to be actively logged in
and monitoring real time without sending customer data to a third-party.
• Co-Management Services: Provides guidance, support and expertise for SIEM and other
security solutions, while the organization maintains full control of their data and
technologies. The service provider acts as an extension of the organization’s security team,
ensuring technologies are running efficiently.
• Co-Management Benefits:
• Customers work directly with the service provider to understand the environment while tuning and
optimizing the technology specific to customer’s needs.
• Removes the “black box” issues created by an MSSP trying to make judgments from afar, instead of
working directly in the customer’s environment
• Co-Management Challenges
• Co-managed security services must coordinate security tasks the in-house company performs vs.
security capabilities the outside party is going to perform.
• Boundary lines between client and provider need to mesh properly to avoid duplication and to
prevent openings in security at the boundaries.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 60
1
10
2 2. Industry Regulations
9. Business Need
9
3
8. Vendor Relationship 8 ? 3. Geographic Footprint
4
4. Timeline
7
7. Budget
6 5
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 61
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 62
Summary
Security Operations Center (SOC)
Deliverables Engineering
Business Technology
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Slide 63
A well-developed and well-run SOC can perform real-time threat detection and incident response with SOC
analysts that can deliver rapid security intelligence to stakeholders and senior management identifying when
an attack starts, who is attacking, how the attack is being conducted, and what data or systems are being
compromised. A SOC is an essential component of a continuous monitoring security capability.
Because the network is constantly being evaluated, continuous monitoring greatly improves the level of
situational awareness for IT managers. Situational awareness is the awareness of current elements in the
monitored environment that are relevant because they may potentially impact that environment today or in
the future.
Situational awareness through full network visibility is a key means for mitigating risk. Effective command and
control requires a fundamental awareness of what's occurring across the affected domain. With this
awareness, negative situations can be recognized and managed as they occur.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Review Questions:
3. Which of the following devices are typical data sources for a Security Information
and Event Management (SIEM) solution?
A. Servers and mainframes
B. Application activity
C. Vulnerabilities and threats
D. All of the above
9. Which of the following are the four steps of incident response as defined by NIST
Publication 800-61?
A. Identify; Protect; Detect; Respond and Recover
B. Plan; Do; Check; Act
C. Preparation; Detection & Analysis; Containment, Eradication & Recovery;
Post-incident Activity
D. Preparation; Detection; Analysis; Action on Objectives
2. A
ICSM is maintaining ongoing awareness of information security, vulnerabilities,
and threats to support organizational risk management decisions. Answer B
describes a firewall. Answer C describes anti-virus software. Answer D describes
an Intrusion Detection System.
3. D
All of the above are data sources for a SIEM
4. B
SIEM solutions typically provide correlation of logs / events, activity baselining
and anomaly detection, IP reputation. Choices A, C and are incorrect because
SIEM solutions do not provide network access control, vulnerability scanning,
network segmentation, threat modeling, or user access control.
5. C
The purpose of a SOC is to monitor threat, vulnerability, security event logs of
applications, databases, servers, networks, desktops for detecting and
responding to security events. Answer A describes a Help Desk. Answer B
describes a Network Operations Center (NOC). Answer D describes Threat
Sharing.
6. B
Managed Firewalls is a Managed Network Security Service. All other answers, A,
C, D, are Security Consulting and Testing Services.
7. B
A Tier 2 Incident Responder performs deep dive incident analysis by correlating
data from various sources; determines if a critical system or data set is impacted.
Answer A describes a Tier 1 Analyst. Answer C describes a Tier 3 Subject Matter
Expert / Hunter. Answer D describes a SOC manager.
8. B
Cyber Threat Hunting is the process of proactively and iteratively searching
through networks to detect and isolate advanced threats that evade existing
security solutions. Answer A is patch management. Answer C is configuration
management. Answer D describes Information Security Continuous Monitoring
(ICSM).
9. C
The four steps of incident response as defined by NIST Publication 800-61 are:
Preparation; Detection & Analysis; Containment, Eradication and Recovery;
Post-incident Activity.
10. D
Average workforce salary is not typically a consideration when deciding whether
to build a SOC vs. Outsourcing to an MSSP. All other answers A, B, C are
considerations.