SOC, SecOps and SIEM - How They Work Together
SOC, SecOps and SIEM - How They Work Together
08
The Modern
Security
Operations
Center,
SecOps and
SIEM: How
They Work
Together
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 1/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
SOC processes - the incident response model and
how SIEMs power the basic operations of the SOC
What is a SOC?
An Information Security Operations Center (ISOC or SOC) is a facility where security staff monitor enterprise systems, defend against security breaches, and
proactively identify and mitigate security risks.
This website uses cookies.
We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
information. This message only appears once.
Focus Areas of a SOC
ACCEPT
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 2/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
A SOC can have several different functions in an organization, which
can be combined. Below are SOC focus areas with the level of
importance assigned to each in the Exabeam State of the SOC
survey.
SOC Facilities
This website uses cookies.
We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
Center ACCEPT
Security teams building a SOC face several common challenges:
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 3/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
Limited visibility—a centralized SOC does not always have
access to all organizational systems. These could include All three of these challenges are
endpoints, encrypted data, or systems controlled by third addressed by a Security Information
parties which have an impact on security. and Event Management (SIEM) system,
which powers daily operations in
White noise—a SOC receives immense volumes of data and
modern SOCs. Read more about SIEMs
much of it is insignificant for security. Security Information and
below in Technologies Used in the SOC.
Event Management (SIEM) and other tools used in the SOC are
getting better at filtering out the noise, by leveraging machine
learning and advanced analytics.
What is SecOps?
Security Operations (SecOps) is a collaboration between security and IT operations teams, where security and operations staff assume joint ownership and
responsibility for security concerns. It is a set of SOC processes, practices and tools which can help organizations meet security goals more efficiently.
Before SecOps
ACCEPT
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 4/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
SecOps in the
SOC
Analysts can proactively seek out security gaps and work with
operations to close them
1 2 3 4 5
“Security isn’t our top “We haven’t explored “We’re at risk, but “We have budget to “We’re knowledgable
conern. We’ve got AV solutions and don’t budget is a problem. invest in security. We about security. We
and FWs. We’re good!” belive we are at risk. We’re overwhelemed have limited continuously innovate
We’ll deal with a by the alerts we’re personnel and need to and improve our
breach if it happens.” facing. We need help maximize them.” program.”
prioritizing and
addressing threats.”
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 5/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
Management Overhelemed by Looking to capabilities that
added. alerts and logs. increase integrate into
operational their workflows.
Needs to efficiency and
prioritize them. maximize Capable of
personnel output. building their own
Concerned with DS algorithms.
optimizing budget Intrigued by the
due to limited idea of threat Interested in cost
resources. hunting. efficiency and
reduced risk from
3rd party
solutions.
Dedicated SOC Classic SOC with dedicated facility, dedicated full time staff,
operated fully in house, 24×7 operations.
Distributed SOC Some full time staff and some part-time, typically operates
8×5 in each region.
Multifunctional SOC / NOC A dedicated facility with a dedicated team which performs both
the functions of a Network Operations Center (NOC) and a SOC.
Fusion SOC A traditional SOC combined with new functions such as threat
intelligence, operational technology (OT).
Command SOC / Global SOC Coordinates other SOCs in a global enterprise, provides threat
intelligence, situational awareness and guidance.
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 6/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
Response (MDR). Managed SOCs can be outsourced completely
or co-managed with in-house security staff.
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 7/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
certifications such as CISSP or
SANS SEC401
Tier 2 Analyst Similar to Tier 1 analyst but with Receives incidents and performs deep
Incident Responder more experience including analysis, correlates with threat intelligence
incident response. Advanced to identify the threat actor, nature of the
forensics, malware assessment, attack and systems or data affected.
threat intelligence. White-hat Decides on strategy for containment,
hacker certification or training is remediation and recovery and acts on it.
a major advantage.
Tier 3 Analyst Similar to Tier 2 analyst but with Day-to-day, conducts vulnerability
Subject Matter Expert even more experience including assessments and penetration tests, and
/ Threat Hunter high-level incidents. Experience reviews alerts, industry news, threat
with penetration testing tools and intelligence and security data. Actively
cross-organization data hunts for threats that have found their way
visualization. Malware reverse into the network, as well as unknown
engineering, experience vulnerabilities and security gaps. When a
identifying and developing major incident occurs, joins the Tier 2
responses to new threats and Analyst in responding and containing it.
attack patterns.
Tier 4 SOC Manager Similar to Tier 3 analyst, Like the commander of a military unit,
Commander including project management responsible for hiring and training SOC
skills, incident response staff, in charge of defensive and offensive
management training, strong strategy, manages resources, priorities and
communication skills. projects, and manages the team directly
when responding to business critical
security incidents. Acts as point of contact
for the business for security incidents,
compliance and other security
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 8/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
The foundational
technology of a SOC is a Security Information and Event Management (SIEM) system, which aggregates system logs and events from security tools
from across the entire organization. The SIEM uses correlation and statistical models to identify events that might constitute a security incident, alert SOC staff about
them, and provide contextual information to assist investigation. A SIEM functions as a “single pane of glass” which enables the SOC to monitor enterprise systems.
Traditional Tools Used in the SOC Next-Gen Tools Leveraged by Advanced SOCs
Security Information and Event Management Next-generation SIEMs which include machine
(SIEM) learning and advanced behavioral analytics,
threat hunting, built-in incident response and
Governance, risk and compliance (GRC) SOC automation
systems
Network Traffic Analysis (NTA) and Application
Vulnerability scanners and penetration testing Performance Monitoring (APM) tools
tools
Endpoint Detection and Response (EDR), which
Intrusion Detection Systems (IDS), Intrusion helps detect and mitigate suspicious activities
Prevention Systems (IPS), and wireless on hosts and user devices
intrusion prevention
User and Entity Behavioral Analytics (UEBA),
Firewalls and Next-Generation Firewalls which uses machine learning to identify
(NGFW) which can function as an IPS suspicious behavioral patterns
SOC Monitoring
ACCEPT
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 9/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
SOC Processes
Facilitated by a SIEM: Key Examples
Malware investigation
The SIEM can help security staff combine data about malware detected across the
organization, correlate it with threat intelligence and help understand the systems and
data affected. Next-gen SIEMs provide security orchestration capabilities, a
visualization of incident timelines, and can even automatically “detonate” malware in a
threat intelligence sandbox.
HR investigation
When an employee is suspected of direct involvement in a security incident, a SIEM
can help by drawing in all data about the employee’s interaction with IT systems, over
long periods of time. A SIEM can uncover anomalies like logins into corporate systems
at unusual hours, escalation of privileges, or moving large quantities of data.
SOC Processes
How SecOps and DevSecOps are
Transforming the SOC
This website uses cookies.
We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
Security
combine it with other information that you’ve provided to them orOperations Centerfrom
that they’ve collected processes
your use ofused to be completely
their services. You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
information. This message only appears once. isolated from other parts of the organization. Developers would
build systems, IT operations would run them, and security were
responsible for securing them. Today it isACCEPT
understood that joining
these three functions into one organization—with joint responsibility
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 11/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
over security—can improve security and create major operational
efficiencies.
Here are a few ways in which a SOC can integrate its processes with
dev and IT:
1 2 3 4 5
This website uses cookies.
We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
information. This message only appears once.
ACCEPT
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 12/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
Event Classification Prioritization and Investigation Containment and Recovery Remediation and Mitigation Assessment and Audit
Tier 1 Analysts monitor user Tier 1 Analysts prioritize, select Once a security incident has been SOC staff work to identify broad SOC staff assess the attack and
activity, network events, and the most important alerts, and identified, the race is on to gather security gaps related to the attack mitigation steps, gather additional
signals from security tools to investigate them further. Real more data, identify the source of and plan mitigation steps to forensic data, draw final
identify events that merit security incidents are passed to the attack, contain it, recover data prevent additional attacks. conclusions and
attention. Tier 2 Analysts. and restore system operations. recommendations, and finalize
auditing and documentation.
A SIEM is a foundational technology in a SOC—here is how a SIEM can help with each incident response stage:
Alert generation and ticketing Searching and exploring data Context on incidents and security Reporting and dashboarding Compliance
orchestration reporting
A SIEM collects security data from A SIEM can help Tier 1 and Tier 2 Remediation and mitigation are an
organizational systems and analysts search, filter, slice and When a real security incident is ongoing activity, and they require One of the core functions of a SIEM
security tools, correlates it with dice, and visualize years of identified, a SIEM provides context visibility of the status and activity is to produce reports and audits
other events or threat data, and security data. Analysts can easily around the incident—for example, of critical security and IT systems. for regulatory requirements and
generates alerts for suspicious or pull and compare relevant data to which other systems were SIEMs have a cross-organization standards like PCI DSS, HIPAA and
anomalous events. better understand an incident. accessed by the same IPs or user view which can provide this SOX—both on an ongoing basis and
credentials. visibility. following an incident or breach.
Next Gen SIEM Next Gen SIEM Next Gen SIEM Next Gen SIEM
Next-generation SIEMs leverage Next-generation SIEMs are based Next-generation SIEMs provide Next-generation SIEMs leverage
machine learning and behavioral on data lake technology that Security Orchestration and machine learning and data science
analytics to reduce false positives allows organizations to store Automation (SOAR) capabilities. capabilities that establish smart
and alert fatigue, and discover unlimited data at low cost. They They integrate with other security baselines for groups of users and
hard-to-detect complex events like also leverage machine learning systems and can automatically devices. This allows faster and
lateral movement, insider threats and User Event Behavioral perform containment actions. For more accurate detection of
and data exfiltration. Analytics (UEBA) to easily identify example, quarantine an email insecure systems or suspicious
high risk events and surface them infected by Malware, download activity.
This website uses cookies. to analysts. and test the Malware in a threat
intel our
We use cookies to personalize content and ads, to provide social media features and to analyze sandbox.
tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
information. This message only appears once.
ACCEPT
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 13/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
Here are a few important metrics that can help understand the
scale of activity in the SOC, and how effectively analysts are
handling the workload.
Mean Time to Detection (MTTD) Average time the SOC takes to detect an How effective the SOC is at processing
incident important alerts and identifying real
incidents
Mean Time to Resolution (MTTR) Average time that transpires until the How effective the SOC is at gathering
SOC takes action and neutralizes the relevant data, coordinating a response
threat and taking action
Total cases per month Number of security incidents detected How busy the security environment is
and processed by the SOC and the scale of action the SOC is
managing
Types of cases Number of incidents by type—web The main types of activity managed by
attack, attrition (brute force and the SOC and where security
destruction), email, loss or theft of preventative measures should be
equipment, etc. focused
Analyst productivity Number of units processed per analyst How effective analysts are at covering
—alerts for Tier 1, incidents for Tier 2, maximum possible alerts and threats
threats discovered for Tier 3
Case escalation breakdown Number of events that enter the SIEM, The effective capacity of the SOC at each
alerts reported, suspected incidents, level and the workload expected for
confirmed incidents, escalated incidents different analyst groups
This website uses cookies.
We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
information. This message only appears once.
ACCEPT
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 14/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 15/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
Prev
Next
CH01 CH02
CH03 CH04
CH05 CH06
This website uses cookies.
CH07 We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We alsoCH08
share information about your use of our site with our social media, advertising and analytics partners who may
combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
Incident Response and Automation
information. This message only appears once.
The SOC, SecOps and SIEM
Security Automation and Orchestration (SOAR) - the future of incident response A comprehensive guide to the modern SOC - SecOps and next-gen tech
ACCEPT
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 16/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
READ MORE READ MORE
CH09 CH10
Evaluating and Selecting SIEM Tools - A Buyer's Guide SIEM Essentials Quiz
Evaluation criteria, build vs. buy, cost considerations and compliance SIEM Essentials Quiz
PRODUCT
Exabeam Advanced Analytics
PARTNERS
SOLUTIONS
Compliance
Threat Detection
Cloud Security
IoT Monitoring
SOC Automation
This website uses cookies. ABOUT
We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
Media
combine it with other information that you’ve provided to them or that they’ve collected from your use of their Kit You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
services.
information. This message only appears once.
SUPPORT
ACCEPT
CAREERS
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 17/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
LEARN
Library
Newsroom
Glossary
Exabeam vs Competitors
Analyst Corner
BLOG
Information Security
SIEM
UEBA
DLP
Incident Response
SIEM GUIDE
What is SIEM?
SIEM Architecture
UEBA
SIEM Analytics
SIEM Concepts
This website uses cookies.
We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
information. This message only appears once.
CONTACT
2 Waters Park Dr., Suite 200 San Mateo, CA 94403
ACCEPT
1.844.EXABEAM
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 18/19
9/11/2019 SOC, SecOps and SIEM: How They Work Together
1.844.EXABEAM
[email protected]
© 2019 Exabeam
Terms and Conditions — Privacy Policy — Ethical Trading Policy — Sitemap
This website uses cookies.
We use cookies to personalize content and ads, to provide social media features and to analyze our tra ic. We also share information about your use of our site with our social media, advertising and analytics partners who may
combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. Please refer to our Privacy Policy for more
information. This message only appears once.
ACCEPT
https://www.exabeam.com/siem-guide/the-soc-secops-and-siem/ 19/19