Module 1 - Importance of SOC
Module 1 - Importance of SOC
▪ Course expectations
▪ Course resources
▪ You will be able to describe the goals and expectations of the course
▪ What is SIEM?
▪ SIEM Types
▪ Rule Creation
▪ Ask questions if you are not sure about something during or after
class while practicing with the materials.
▪ Network interfaces
▪ Course folder
▪ Create a course folder on your local machine. Place everything related to this course in
this folder.
2. These centers usually have security analysts that review data to detect threats in
real-time and respond when necessary.
3. The SOC is a virtual radar that detects cyberattacks and protects the following:
Brand name, Profit / Income, Perimeter, Employees, Customers, Organizational
Assets, etc.
Monitoring:
2. There may overlap with other parts of the operations teams, especially
regarding issues of availability, which can be the responsibility of both
the SOC team and other operations teams, not necessarily security
related (IT Department, Fraud, Financial etc.).
2. In order to do so, the SOC needs to gather threat intelligence that can guide the
actions of the SOC.
3. This can take many forms and utilize various sources such as social media,
Computer Emergency Response Teams (CERT) warnings, vendor briefings,
observations from our systems, etc.
2. The external regulation is often legal (e.g., GDPR, Computer Misuse Act, etc.), but may also be
sector standards such as the Payment Card Industry Data Security Standard (PCI DSS), which is
the standard organizations must adhere to in order to process credit card data.
3. One of the responsibilities of the SOC is to validate the organization’s compliance with
such regulations. Failing to comply with regulations may lead to fines and legal actions
against the organization.
1. Handle and manage information security incidents 8. Validate information security policies
2. Collect data from the organization (logs, flows, and 9. Vulnerabilities management
more)
10. Threat intelligence process
3. Threat Hunting
11. Management reporting
4. Monitor defense systems such as IPS, Firewalls,
and more
4. Threat Hunters
5. SIEM Engineer
6. SOC Manager
▪ CIA triad:
▪ Availability:
data and services are available when needed.
▪ Integrity:
preventing unauthorized changes.
▪ Confidentiality:
preventing unauthorized access.
▪ Private information:
▪ Personally Identifiable Information (PII): ID, Address, Phone Number, Email,
Passport, Full Name.
▪ Classified documents
▪ Usually achieved using some form of hashing to identify a change was made.
▪ Making sure data and services are available to authorized users when needed.
▪ The degree by which the information is available to the right users when needed.
▪ A sales office at a small start-up fell victim to ransomware .The ten workers could not sell the
company's product for one and a half days.