Soc 1
Soc 1
Basics of Security
Operations Center (SOC)
By VIEH Group
Note: This document is not created by a professional content writer so any mistake and
error is a part of great design
Disclaimer
This document is created and generated by VIEH Group. The information provided
herein is for educational purposes only and does not constitute legal or professional
advice. While we have made every effort to ensure the accuracy and reliability of the
document. Any reliance you place on the information contained in this document is
strictly at your own risk. VIEH Group shall not be liable for any damages arising from
Happy reading !
basics of SOC, its functions, structure, and key components, along with
Functions of a SOC
exfiltration.
Real-World Example:
discovered that the system has been compromised and is being used as
2. Incident Response:
Real-World Example:
determine the extent of the breach and any data exfiltration. They work
3. Vulnerability Management:
remediation.
Real-World Example:
4. Threat Intelligence:
known malware.
Real-World Example:
Armed with this intelligence, the SOC updates its detection systems to
within the organization. They also share the intelligence with other
Structure of a SOC
continuous improvement.
Real-World Example:
The SOC manager meets regularly with the organization's CISO and IT
SOC's capabilities.
SOC Analysts:
SOC analysts are the frontline defenders who monitor security events,
Real-World Example:
incidents. They analyze log data, network traffic, and system alerts to
breaches. They also work closely with other teams, such as the incident
incident handling.
response team in the SOC takes the lead in coordinating the incident
the impact of the incident, and engage other teams, such as system
external threat feeds, analyze the latest attack trends, and provide
Real-World Example:
advisories for the SOC analysts. This information helps SOC analysts to
SIEM systems collect, correlate, and analyze security event data from
Real-World Example:
A SIEM system ingests log data from network devices, servers, and
alerts, drill down into specific events, and take appropriate action to
attacks, and generate alerts. They can identify known attack signatures,
prevention.
Real-World Example:
Log management systems collect and store logs from various systems,
Real-World Example:
servers, firewalls, and other relevant sources. SOC analysts can search
logs, SOC analysts can track user access patterns, identify unauthorized
valuable threat intelligence feeds and data. These platforms help SOC
Real-World Example:
Real-World Example:
critical incidents.
and evasion methods. SOC teams need to stay updated with the
help SOC teams keep pace with the changing threat landscape.
roles effectively.
making.
Conclusion