OWASP Security Operations Centre (SOC) Framework Project Presentation
OWASP Security Operations Centre (SOC) Framework Project Presentation
Framework Project
Agenda
• Centralized
• Distributed
• In-hose
• Constituency
• Managed
• Hybrid
Centralized
• One Team
• One Central Location
• Close to HQ
• Most Common
• Most Feasible
• 24x7
Distributed
• Multiple Teams
• May have Multiple sets of Dashboards
• Small Team in SOC & rest outside the SOC
• Follow the Sun vs 24x7
In-house
• External SOC
– UnManaged
• No write access to security devices
– Managed
• Has write access to security devices
Managed
• No authority
• Shared authority
• Full authority
• Situations of Containment
• Pre-agreements
• Reactive
• Proactive (pushing emergency patches)
Processes
• Normalization
• Storage Usage
• Evidence preservation
• Deduplication
Retention
• Real-time
• Network Monitoring - Net Flows
• Perimeter
• Configuration
• Critical Files changes
• Privileged use
• IDS/IPS
• 24/7 Shift Schedules
• Follow the sun
• UBA/UEBA
Alerting
a) Detection
b) Analysis
c) Prioritization
d) Response
e) Containment
f) Eradication
g) Recovery
h) Forensic Investigation
i) Learning
Detection
• Based on Impact
• For Example:
– Level 1 Incidents that could cause significant harm
– Level 2 Compromise of or unauthorized access to noncritical systems
or information
– Level 3 Situations that can be contained and resolved by the
information system custodian, data/process owner, or HR personnel
Response
• 1st Action
• Isolation of incident so it doesn’t spread & cause further
damage
• Disconnection of affected devices from Network & Internet
• Short term & long term containment Strategies
• Questions to address
– What’s been done to contain the breach short term?
– What’s been done to contain the breach long term?
– Has discovered malware been quarantined from the environment?
– What sort of backups are in place?
Eradication
• KPIs
• SLA
• MTTD
• MTTR
• E.g.:
– Response Time
– No of Incidents
– Pro Active – Lead Time to Patch Vulnerabilities
– No of False Positives
Communication
• Within SOC
• Internal
• External
• Alternative Channels
• Call centre, Email messages, Phone calls, Walk-in reports
• SOC website
• Cyber tip feeds (from other SOCs)
• SOC can’t afford to miss tips
• Post incident communication
People & Skills
• Segregation of Duties
• Access to Admins
• Artificial Intelligence is not a substitute
• SOC Analyst
• Incident Handler
• SOC Expert
• SOC Manager
For more information, queries, feedback and updates:
OWASP Security Operations Center (SOC) Framework Project