0% found this document useful (0 votes)
327 views10 pages

Security Operations Centre Soc Buyers Guide

The document provides guidance for organizations considering procuring a Security Operations Centre (SOC) from a third party. It summarizes the core functions of a SOC, including detecting and responding to threats. It outlines different types of SOCs based on factors like budget, data sensitivity, and internal capabilities. It also provides tips for defining SOC requirements, such as ensuring logs can be accessed and regularly reviewing which analytics are providing benefit.

Uploaded by

ep230842
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
327 views10 pages

Security Operations Centre Soc Buyers Guide

The document provides guidance for organizations considering procuring a Security Operations Centre (SOC) from a third party. It summarizes the core functions of a SOC, including detecting and responding to threats. It outlines different types of SOCs based on factors like budget, data sensitivity, and internal capabilities. It also provides tips for defining SOC requirements, such as ensuring logs can be accessed and regularly reviewing which analytics are providing benefit.

Uploaded by

ep230842
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.

UK

G UI DANC E

Security operations centre (SOC) buyers guide


Guidance is for organisations that are considering procuring a Security Operations
Centre (SOC) from a third party.

Introduction

This guidance is for organisations that are considering procuring a Security


Operations Centre (SOC) from a third party. It is equally applicable for those
seeking to establish their own in-house SOC. It summarises the core functions of a
SOC, and includes the different deployment options available, the SOC lifecycle,
and other high-level considerations.

What does a SOC do?

The key aims of a SOC are:

to detect and respond to threats, keeping the information held on systems


and networks secure
to increase resilience by learning about the changing threat landscape
(both malicious and non-malicious, internal and external)
to identify and address negligent or criminal behaviours

to derive business intelligence about user behaviours in order to shape


and prioritise the development of technologies

Why might you need a SOC?

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 1/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

Some examples of why you might need a SOC include:

you are running an online service for the public


you host a number of sensitive databases which are accessed by staff on
your premises, by remote staff, or by customers or partners
you have several different office locations and a unified security function
delivers cost savings
you share large quantities of sensitive data with other organisations

you require a single point of visibility for all your threats

What type of SOC is best for you?

SOCs come in a variety of flavours and can cover the entire incident management
process. This can include:

integration, management and review of traffic feeds

protective monitoring

initial triage and analysis


vulnerability management

alerting and response

incident management
root cause analysis

patching & remediation

correlation management, Security Information and Event Management (SIEM)


tuning

continuous improvement

key management
The functions that your organisation require will depend on a number of factors,
including but not limited to:

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 2/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

your budget

whether or not you choose a third party supplier

your willingness to share your information feeds with a commercial supplier


your own willingness/capability to perform forensic investigations

how you manage business continuity

whether you need an on-premise or an off-premise service (or a hybrid of the


two)

if you outsource your SOC, it will likely be multi-tenanted. This means that any
threat intelligence generated from your data feeds will be used to improve
the service delivered to other customers. Consider the sensitivity of your data,
your requirements and whether you'd be comfortable with a multi-tenanting
arrangement (noting the higher costs of a dedicated service and the
potential benefits to you derived from being a co-tenant).
how well you know the range of threats posed to your organisation

whether your requirements are unique - a generic service may suffice if your
requirements are typical of other organisations

Top tips before you start

When defining your SOC requirements, we recommend you consider the following:

Logs are not an end in themselves. It’s tempting to think they are, but it’s the
way they are correlated that provides the power of a SOC. Logs must be
collected, aggregated, analysed, stored and minimised. Most importantly,
they must be available to your SOC at all times.

SIEM is not a panacea. Be wary of any supplier that tells you that security
information and event management (SIEM) is a panacea for all your analytic
needs. Good SOC analysts don’t develop anything in the SIEM until they've
proved an idea using scripts and logs first. A good supplier will have a content
development checklist and a standard process for proposing, justifying and
implementing rulesets in your SIEM.

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 3/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

Don’t assume your business wants to hear what the SOC finds. Your SOC
has detected something; who will care and what you do next? Work back
from the end of the incident and verify you can achieve each stage before
levying a requirement upon your SOC. Ensure the action you wish to take is
legal and covered by internal policy.

Review regularly which SIEM content is providing benefit, and use stats to
justify its existence. Your SOC is an invaluable source of business intelligence
and management information.

Establish the basics. Don't bother with advanced concepts until you're
confident you have the basics covered. Expensive and complex SIEM tools are
all the rage, often the temptation is to jump from zero to 'behavioural
analytics' using an expensive SIEM that nobody understands properly. Well
trained and quality staff are crucial.

A secure SOC protects itself

An SOC exists to help manage your risks more effectively, which means the SOC
itself must be protected adequately. A SOC must have mechanisms, processes
and procedures to ensure that it can protect itself against threats comparative
to those being faced by its customers. This includes protecting the service itself,
and also the data within it.

The SOC provider must be able to demonstrate that they understand the


architecture of their monitoring system. A supplier ought to be able to provide
documentation to include:

an overview of the system elements, such as perimeter, host and network,


and specific application-based agents

clearly annotated network diagrams, which demonstrate a comprehensive


understanding of how the SOC architecture is designed and managed

related technical documentation which demonstrates how architectural


components are used to actively monitor the environment
mechanisms for managing the control of privileged user access

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 4/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

the monitoring and control of privileged user access, demonstrating an


understanding of who has access and their activity

which parts of the architecture allow for automation, and which parts require
analysts

descriptions of what the sensors within the monitoring service actually do

Feeding your SOC

Where will your information feeds come from? What inputs will you feed into your
SOC? It depends on the kind of services you are running, but it might include:

data from the organisation's vulnerability management

records of high-value database commands


requests made to your web servers

records of high-value privileged administrator commands

outputs from web content filters

logs from the mail gateway

logs of DNS requests made by your internal systems and servers

logs from your federated authentication system

if you use cloud, you may need to incorporate any alerting provided by the
cloud service into your SOC, e.g. breaches of Data Loss Prevention policy

A fuller picture of the logs and other outputs which can feed your SOC are shown
below (this can also be downloaded at the bottom of the page). Discuss with your
supplier how you will determine which inputs are required to deliver the best
service to your business.

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 5/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

The SOC lifecycle

A good SOC needs you to work with it. It's not uncommon for SOC suppliers to
send their customers alerts, but to never receive a reply. Obviously, an
organisation should not derive any security from simply knowing that a SOC is in
place.

A successful SOC will undergo some transformations during its lifetime, from
requirements capture at start-up, through to effective operations. To adapt to
the ever-changing threat landscape and to the introduction of new technologies,
a SOC must learn from what it finds. As a result, false positives will be reduced, the
reporting process will become smoother, and high impact threats will be detected
sooner. A good contract with a SOC provider will not concentrate solely on initial
requirements but will incorporate the ability of the SOC to evolve and adapt.

Start-up and requirements capture

In many cases, the service you are offered will be multi-tenanted, with other
organisations benefiting from the threat intelligence generated from your feeds

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 6/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

and vice versa. Provided you can gain assurance from your supplier that:

sensitive information about your business is kept in the strictest of


confidence

your data is subject to appropriate levels of logical separation within the


provider’s environment

- you may judge the benefits to outweigh the risks.

The starting point for negotiations may be the default service offered by a
supplier. It is normal for organisations new to SOC to think that their business is
somehow unique, but do not underestimate the benefits which a default service
can deliver. Listen to what is provided by default and use your technical experts to
analyse and identify any adaptations needed in order to meet your own business
requirements. This is the cheapest and easiest approach to take.

Ensure your prospective provider understands your business. This involves a


significant commitment of your time and expertise. Make sure you’re conveying to
your provider:

your business objectives


your operational environment

your risk appetite and incident reporting thresholds


how long you need data retained

In return, your provider needs you to understand:

its core offering, so you understand what you need over and above that
offering

that it depends on you to tell it when and to whom to send alerts


what third parties it's reliant on to deliver its service to you
Together the ‘supplier’ and the ‘authority’ need to agree:

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 7/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

how SOC-related tasks will be divided; well-defined governance and


ownership is essential to agree responsibilities
business continuity priorities/business impacts

escalation matrix/incident workflows


establishment of SLAs and KPIs, to set levels of expectation

rules and responsibilities around data sharing (including MI)


the boundary interfaces and inter-relationships with any network operations
or incident response capabilities within your organisation
Operations and data sharing

During operation of your SOC service, your supplier is processing and analysing
security monitoring data and applying your policy, compliance and business rules
to identify and verify security incidents. Should an incident occur, the supplier’s job
is to respond according to the agreements in place with you, working to return the
service to normal operations. As a SOC enters the operational phase, your
resourcing overheads will diminish, but expect a number of false positives to occur
while the supplier learns to understand the way your business operates.
For example, you may have a small number staff who are constantly on the move.
For these staff, a logon from an IP geolocated in Dubai (from a user who logged on
six hours earlier from an IP in the UK) may at first seem suspicious, but is in fact not.
Over time, a good supplier will learn what constitutes genuinely anomalous
behaviour. Until then, false positives can be a good opportunity to test the
reporting chain.

Continuous improvement

SOC providers need to appreciate the different operational environments and


business objectives of their customers. They should be able to adapt their offering
in order to meet any changes in these requirements, in order to deliver a service
which can continue to meet a customer’s needs. This involves learning from past
experiences to deliver an improving service that strikes the right balance between
cost of operations, security and customer fatigue.

Suppliers should generate comprehensive and meaningful management


information to help customers understand the patterns in incidents, near misses,

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 8/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

root cause and methods of resolution. Retaining the right data, at the right level of
detail, for the appropriate periods of time is therefore an important requirement.
Note some data may be subject to UK statutory laws on retention.

Tools and technologies

The tools employed as part of a SOC capability are key to ensuring that a SOC
provider is able to actively monitor and detect the latest threats. New SOC
technologies are constantly emerging, so it is unlikely that the technologies in your
SOC will remain the same over the duration of a typical contract. The tools
deployed by the SOC should be properly commissioned and managed
appropriately. The toolset should not only take into account technological
developments in the marketplace, but more importantly changes in customer
requirements. If the cost of your SOC services increases in the wake of a new tool,
it will be prudent to ask your supplier to:

explain the business and technical reasons for implementing new


technologies
demonstrate that the tool(s) is configured in line with developer’s
recommendations

ensure SOC staff are trained in the use of the tools


ensure SOC have a strategic understanding of how the tools contribute to the
customers’ overall SOC needs

PUBLISHED

23 September 2016

REVIEWED

23 September 2016

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 9/10
7/26/2020 Security operations centre (SOC) buyers guide - NCSC.GOV.UK

VERSION

1.0

WRIT T EN FOR i

Small & medium sized organisations

Large organisations

Public sector

https://www.ncsc.gov.uk/guidance/security-operations-centre-soc-buyers-guide 10/10

You might also like