SOC Workshop
SOC Workshop
Next-Gen
SOC
Chintan Gurjar
About Me
Situation
● Juggling business, compliance, and consumer obligations.
● SOC has become resource intensive. Need PPT (People Process Technology).
Complication
● Huge of amount of data sources
● No correlation
● Lack of standardization
● Poor visibility
● Lack of communication among other teams to security teams
● Cost cutting
Resolution
● Convert security events and threat information with actionable intelligence.
Traditional SOC vs. Next-Gen SOC
SOC
Next-Gen SOC Organizational Entity
https://www.soc-cmm.com/downloads/SOC-CMM_whitepaper.pdf
BENEFITS OF NEXT-GEN SOC (INTETEGRATED SOC)
Tactical Benifts
● Find threats earlier in the cyber kill chain
● Focus efforts on real threats than traditional daily events and alerts
● Dynamic correlation to rule logic improvisation by working with SIEM and other team
Operational Benefits
● Intelligence-driven processes
● Improved effectiveness of SIEM, NGFWs, IPS, IDS, and SWGs.
Strategic Benefits
● Executives can understand relevant threats and appropriately allocate resources where necessary.
● Improved internal and external communication with top executives and board members
Metrics are key to action
Results Benefits
After completion of this phase, you will know the Activity will enable you to:
current maturity state of your SOC and will have ● Understand difference traditional vs next-gen
an idea what of where the re-defining process SOC
needs to be started. ● Know where you stand
● Optimize security operation through next-gen
processes
Assess
Process:
1. Discuss scope, goal, responsibilities, etc.
2. Put everything on the whiteboard.
3. Organize notes and remove duplicates.
4. Finalize benefits, goals, and objectives of SOC.
Assess
“Things we understand
but not aware of” “Things we are neither
6. Identify what to outsource/insource.
aware of nor
understand”
Assess
Problem = Disjoint teams and no communication 1. Security operations should not be handled haphazardly; a
consistent and transparent communication should be
Solution = Collaboration through transparent communication maintained.
Process:
1. Brainstorm threats Low to Critical
2. Identify critical assets in your organization
3. Identify crown jewel data in your organization
4. Discuss what can be the threats to your critical assets and data
1. Consider past incidents of your organizations
2. Consider incidents' case studies from other organizations
3. Consider threat modelling techniques
4. Consider talking threat intelligence team (in-house or vendor)
Assess
Team Management, retain and Provide clear career path and in-house, external
People motivate resources trainings along with CTFs, incentives and reward
program
People
SOC Manager
VM Analyst External 3rd Parties
(Minimum)
Assess
Determine how many head Create a head acount post analysis and also think about budget allocation. Get approval from
count are needed actually the amangement. Align business need with the head count.
SOC is the scale problem, large number of repetitive work, huge amount of big data. As a
Burnout problem
manager, you need to solve the burnout problem
Keep people motivated all the Develop learning mindset, look at the bigger picture, incentives, long-term learning, attention
time in spite of repetitive work to details, out of work learning, etc.
Prepare a specific and detailed RACI matrix and allocate responsibilities to avoid duplication
Set proper separation of duties
of work
How much and when you are investing in training and how you are setting S.M.A.R.T goal to
Training and development ROI utilize that knowledge into real practical world. Think of the return you will get on your
investment of training.
Understanding and meeting If you don’t know what they need, you can’t deliver. Understand their need, align business
stakeholder requirement requirement with SOC drivers, define key metrics to deliver before starting the process
Assess
Process
Technology challenges
False positive Risk/Threat based Cost challenges while Log collection and
management prioritization increasing visibility integration
Security Incident
Security Monitoring Management & Security Analytics
Response
Vulnerability
Threat Hunting Threat Intelligence
Management
Putting all together – People > Process > Technology > Service
https://www.soc-cmm.com/downloads/SOCTOM%20whitepaper.pdf
Assess
External Perimeter
1. Define attack possibilities on each
layer.
Internal Network
2. Discuss possible attacks/threats on
Host each layer based on the target
device.
Application
3. Discuss what devices/solutions can
Data potentially provide log information.
sarahah.top/u/chintangurjar
Phases of SOC implementation
Results Benefits
● A defined security and gap pressure posture Activity will enable you to:
● Identified optimization opportunities ● Identify planning gaps specific to your
● An ideal target state (where you want to be) organization’s threat landscape.
● Formalized security operation SOPs ● Formalize the implementation process with an
official policy and guide.
Design
Become a leader in Should focus on continually improving the security posture and resilience of the organization
its industry to maintain a competitive advantage.
Provide
Should prioritize transparency in its communication and reporting and accountability in its
transparency and
incident response processes.
accountability
Should focus minimizing the risk of security breaches, downtime that could disrupt business
Increase revenue
operations and damage the organization's reputation.
Design
A financial services company's vision is to be SOC's long-term objectives should focus on protecting the
the preferred choice for customers seeking organization's systems and data from threats such as cyber-
investment and wealth management attacks and data breaches to maintain customer trust and
services confidence.
Design
A government agency's values SOC's principles and practices should prioritize transparency in its
include transparency and communication and reporting and accountability in its incident response
accountability. processes.
A manufacturing company's goal SOC's outcomes should focus on implementing security controls that
is to increase efficiency and minimize the risk of disruptions to production and reduce the time and
reduce costs. resources required for incident response.
• Explain how these resources align with the organization's goals and objectives
or business’s requirements.
• Identify any areas where additional resources may be needed to support the
target SOC.
• Identify how existing resources can be utilized with time allocation, priority
setting, cross-team training and functioning.
Design
sarahah.top/u/chintangurjar
Phases of SOC implementation
● Establishing a formal agreement with stakeholders ● Support your decision to implement a security
to secure their backing operations program with the approval of
● Creating a comprehensive approach to acquiring stakeholders.
materials and resources ● Identify the appropriate sourcing strategy and
● Allocating specific roles and tasks to personnel subsequent SLAs.
involved in the project ● Formalize the implementation process with an
● Producing a timeline with the most important goals official and prioritized roadmap.
and objectives listed first
● Developing a system to track progress and make
necessary adjustments
Implement
Define all the SOC roles and responsibilities, along with specific initiatives, objectives, goals, tasks and log them
into RACI matrix.
◦ Responsible: This person is responsible for completing the task. There can
be multiple people with this role for a single task.
◦ Consulted: These are the people who need to be consulted before the task
can be completed. They may have expertise or information that is necessary
for the task to be done effectively.
◦ Informed: These are the people who need to be kept informed about the
task, but are not directly involved in its completion.
Implement
Managem
ent Budget
Reviews
Continual
Improvement
New
Staff Organization
Structure
Technolo
gy
Audits
Process or
Maturity Assess
ments
Phases of SOC implementation
Reporting by Activities
• Summary of all security incidents and response activities.
• Summary of risk assessment and vulnerability scans.
• Summary of security policy and procedure enforcement.
• Summary of patch management and application updates.
• Summary of network and system monitoring activities.
• Summary of user training and awareness activities.
• Summary of user access control and privileges.
• Summary of security architecture status and security events.
• Summary of security posture and performance metrics.
• Summary of security incident management process.
• Summary of security incident response and remediation activities.
• Summary of security audits and compliance activities.
• Summary of third-party vendor assessment and risk management.
• Summary of physical security measures and access control.
• Summary of incident response and forensics activities.
Report
Daily reports
• Summary of key events and incidents that occurred during the day
• Status of ongoing investigations and remediation efforts
• Summary of security controls that have been tested or are being monitored
• Status of security projects and initiatives
Weekly reports
• Summary of key events and incidents that occurred during the week
• Status of ongoing investigations and remediation efforts
• Metrics on the number of alerts, incidents, and false positives
• Trends in attack types and vectors
• Status of security controls and their effectiveness
Report
Monthly reports
• Summary of key events and incidents that occurred during the month
• Trend analysis of security metrics over the past month
• Review of security policies and procedures, including any updates or changes
• Status of security projects and initiatives
• Summary of security training and awareness efforts
Yearly reports
• Summary of key events and incidents that occurred during the year
• Trend analysis of security metrics over the past year
• Review of security policies and procedures, including any updates or changes
• Status of security projects and initiatives
• Summary of security training and awareness efforts
• Review of incident response plans and procedures
• Summary of security risk assessment results
Project Execution Summary
Collaborate to
Identify specific
improve Identify critical
Identify technology and
Why build SOC? organization’s threats to your
obligations tool
state of organization
requirements
knowledge
Start executing
Provide Improve SOPs
project in Get feedback & Repeat the
reporting on and relevant
quarterly suggestions entire process
quarterly basis documents
phases
Define initiative start and end date with responsibilities
Questions to think about: