Ir Soc
Ir Soc
• Ransomware
• Insider threats
• Phishing and social engineering
• Privilege escalation attacks
• DDoS attacks
• Man-in-the-middle attacks
• Supply chain attacks
An incident response plan usually includes:
• An incident response playbook including the roles and responsibilities of each member of the
CSIRT throughout the incident response lifecycle.
• A business continuity plan outlining procedures for restoring critical systems and data as quickly as
possible if there’s an outage.
• An incident response methodology that details the specific steps to be taken at each phase of the
incident response process, and by whom.
• A communications plan for informing company leaders, employees, customers and law
enforcement about incidents.
• Instructions for collecting and documenting information about incidents for postmortem review
and (if necessary) legal proceedings.
How incident response works
Most incident response plans follow the same general incident response
framework based on models developed by the National Institute of
Standards and Technology (NIST) and SANS Institute. Common incident
response steps include:
The evolving threat landscape
Traditional Approach
•IT Operations
•Focus and budget on New Approach
preventive technologies
•Incident Response & Intelligence
•Reactive approach
•Focus on Detection
•Proactive role
Technologies
• Visibility
• Response time, efficiency,
Processes efficacy
• Integration with the IT and
• Best practice driven
business context
• Repeatable procedures
• Automation
• Tight integration with the
business
People • Effectiveness
measurement
• Specialization • Intelligence sharing
• Center of Excellence
• Focus on intelligence
• Well-defined roles and
responsibilities
Implementing a SOC model
.. bringing theory into practice
SIEM
Analyst L2
Threat
• The successfully implementation of a SOC
Analyst
Incident
Process Analysis
Intelligence
model could be slowed down by a
L1
SOC
Analyst
number of factors:
SOC
Centralize
Manager 1 Manager 2
Alerts
HR
Breach
Coordinator Shift
Network
Visibility – Undefined roles and responsibilities
Host
Handoff
Report
– Conflicting goals
Visibility CISO
Breach Legal
KPIs IT Measure
Efficacy
– Budgets spread between departments
Process
Finance
– Vague metrics
IT
Handoff eFraud
– Processes not fully automated
DLP – Technologies not appropriate
SOC model
Responsibilities
CIO
Roles and
Business Mgr.
Threat Intel Analyst SOC Manager CISO/CSO Privacy Officer
Compliance
SOC Management
Legal
HR
L1 Analyst L2 Analyst
Analysts Cross-functional teams
Orchestrate &
Manage
Processes
Incident IT Security
Breach SOC Program
Management Management Risk
Management
Management
Evidence Cabinet
L1
L3
2U
L1
SoC Mgr
2U
2U
L2
Conference Room
2U
Are we ready to accept the challenge?
Structured model to
Technologies
face the new threats
Threat
Processes
Intelligence
Visibility
Advanced threats People
Big data
and
Analytics
UEBA stands for User and Entity Behavior Analytics, a cybersecurity technology that
uses machine learning, statistical analysis, and behavior analytics to detect anomalous
activities and potential threats by monitoring the behavior of users, devices, and
entities within an organization.
Micro-Segmentation:
• Divide the network into small, isolated zones and enforce strict access controls at the endpoint level.
• Prevent lateral movement by attackers within the network.
Continuous Verification:
• Continuously validate the trustworthiness of endpoints through factors like device health, user behavior,
and location.
Dynamic Policies:
• Apply policies that adapt to changing conditions, such as endpoint vulnerabilities or suspicious activities.
Context-Aware Access:
• Incorporate context such as the endpoint's compliance state, geolocation, and time of access before
granting permissions.
Active Directory Security
Some of the techniques used in this type of malware analysis are virus scanning, packer detection, file
fingerprinting, debugging, and memory dumping. Dynamic analysis involves a sandbox environment
so that analyzing the behavior of malware while running the program won't affect other systems.
Network Detection & Response (NDR) / Network
Security
Continuous monitoring is an approach where an organization constantly monitors its IT systems and
networks to detect security threats, performance issues, or non-compliance problems in an
automated manner. The goal is to identify potential problems and threats in real time to address them
quickly.
Attack Surface Management
An effective attack surface management approach requires information such as IP address, device
type, whether it is in current use, its purpose, its owner, its connections to other assets, and possible
vulnerabilities contained within it.
Digital Threat Monitoring
Project Phases
Resources
Phase 1: Planning – xx weeks
• Personnel: Project Manager, Security Engineers, System Integrators,
Phase 2: SOC Room Design and Construction – xx weeks
Construction Team.
Phase 3: SOC Components Implementation – xx weeks
• Tools & Technologies: SIEM, SOAR, Monitoring Tools, Security
Phase 4: Testing and Optimization – xx weeks Appliances, Construction Materials.
Phase 5: Go-Live and Handover – xx weeks • Support: Ongoing support from Veridos’s dedicated team.
Milestones
• Completion of SOC Room Construction: End of Week xx
• SOC Components Setup: End of Week xx
• Testing and Optimization: End of Week xx
• Final Deployment and Handover: End of Week xx
Training and Support
Training
We will provide comprehensive training sessions for your security team to ensure they are
proficient in using and managing the SOC. Training will cover all key components and
include hands-on exercises. Additionally, we will offer training on maintaining the SOC
room and IT infrastructure.
Ongoing Support
Our support services include 24/7 monitoring, regular updates, and incident response
assistance. We will ensure that your SOC remains effective and up-to-date with the latest
security technologies. Additionally, we offer maintenance support for the SOC room and IT
infrastructure.
Cost Estimate
Payment Terms