4 SOC Consulting
4 SOC Consulting
4 SOC Consulting
Engin Özbay
IBM Security, Turkey
Security operations in a
changing environment
2 © 2015
2012 IBM Corporation
IBM Security Services
Large existing IT
infrastructures with a
globalized workforce,
Mobile Collaboration / Cloud / 3rd party services,
BYOD Virtualization and a growing
customer base
Potential Impacts
Technology
Identity &
Vulnerability Scanners Ticketing System Change Tracking
Desktop Mgmt
Physical space
requirements and
location
Technology Scope
People
Functionality
SOC Models
© 2012 IBM
© 2015 IBMCorporation
Corporation
IBM Security Services
Charter
only operations capability
Cross-functional
Governance Self governed (IT Security)
(IT, Business, Audit, etc.)
Measures
driven quality, KPI/SLO/SLA
Metrics, analytics,
Reporting Ticket/technology driven
scorecards, & dashboards
Business Units
Executive Security Intelligence Briefings Local Reg. Security Oversight SOC Governance
Consolidated Security Analytics & Dashboards Local/Reg. Intel. Briefings Legal
SOC
Audit
Emergency
SOC
Response
Admin Support Threat Threat Threat CSIRT
Services Monitoring Triage Response Management IT Operations
Tool Integration Threat Analysis Investigations Adv. Event Analysis Corp. Incident Response Incident Mgmt
Escalations
Rule Admin Impact Analysis Incident Triage Table-top Exercises Problem Mgmt
Incident Mgmt.
Change Mgmt
Release Mgmt
Legend
Process
Vulnerability Mgmt Identity & Access SLA Mgmt Incident Mgmt
Technology
Identity &
Vulnerability Scanners Ticketing System Change Tracking
Desktop Mgmt
Process
Vulnerability Mgmt Identity & Access SLA Mgmt Incident Mgmt
Technology
Identity &
Vulnerability Scanners Ticketing System Change Tracking
Desktop Mgmt
The SOC is only as good as its people, and upfront planning for the unique people management
aspects of a 24x7 security centric organization will provide significant long term returns.
Points of Consideration:
SOC staff have a specialized skill set and experienced staff are often difficult to find
Training is expensive, time consuming, and improves marketability of staff. Compensation strategies
must be evaluated accordingly.
Retention of staff is difficult in a non-security centric organization due to continuous need for updated
training, lack of expansive career path options, and burn-out.
Beyond analysts for 24x7 coverage, other supporting functions must be considered:
- System admins, Intelligence resources, Escalation resources, Compliance officers,
Management / Supervision
Incident Mgmt
Security Reporting C C C C C A C I
Reporting
Efficiency Reporting C C C A C I
Services
Financial Reporting C C C C A I
Enterprise Incident Management C A
Optional Services Forensics Investigation C C C C C A C C
Policy Violation Handling C C C C A C
• Monitoring of security events received through alerts from SIEM • Process and Procedure adherence
or other security tools • General network knowledge, TCP/IP Troubleshooting
• Review alerts escalated by end users • Ability to trace down an endpoint on the network based on ticket
• Handel end user and security services consumer initiated information
incidents and initiating trouble tickets – Sev 4 tickets • Familiarity with system log information and what it means
• Performing Level 1 triage of incoming issues ( initial assessing • Understanding of common network services (web, mail, DNS,
the priority of the event, initial determination of incident to authentication)
determine risk and damage or appropriate routing of security or • Knowledge of host based firewalls, Anti-Malware, HIDS
privacy data request) • General Desktop OS and Server OS knowledge
• Monitoring of alert and downstream dependencies health (logger, • TCP/IP, Internet Routing, UNIX & Windows NT
client agents, etc) • Strong analytical and problem
• Responsible for troubleshooting agents and logs required for
reporting when not reporting to alerting systems Training
• Intake intelligence actions from Intelligence teams and ticket for
appropriate operators for tool policy or tool setting tuning • Required: Security Essentials – SEC401 (optional GSEC
• Provide limited incident response to end users for low complexity certification)
security incidents • Computer Forensic Investigation – Windows In-Depth - FOR408
• Notifying appropriate contact for security events and response • Recommended: Security Incident Handling and Forensic - FOR
• Takes an active part in the resolution of incidents, even after they 508
are escalated
• Work assigned ticket queue
• Understanding and exceeding all tasked SLA commitments
• Track and report on closure of tickets per SLAs
• Escalating issues to Tier II or management when necessary
• Provide daily and weekly metrics for security and vulnerability
incidents
• 24/7 Shift work required
Process
Vulnerability Mgmt Identity & Access SLA Mgmt Incident Mgmt
Technology
Identity &
Vulnerability Scanners Ticketing System Change Tracking
Desktop Mgmt
Process
Vulnerability Mgmt Identity & Access SLA Mgmt Incident Mgmt
SOC processes must be documented, consistently implemented, and based upon existing
standards / governance frameworks. Procedures must take into consideration corporate security
policy, business controls, and relevant regulatory requirements.
Points of Consideration:
The SOC’s mission must be clearly defined – Incident discovery, CERT, etc.
SOCs differ from NOCs, and an alarm does not always equate to action.
Processes must take into consideration evaluation and incorporation of a constantly changing stream
of potentially actionable threat intelligence.
Best practices for incident investigation, response, and mitigation must be maintained and updated as
technologies are added, change, or mature.
Process
Vulnerability Mgmt Identity & Access SLA Mgmt Incident Mgmt
Technology
Identity &
Vulnerability Scanners Ticketing System Change Tracking
Desktop Mgmt
Technology
Identity &
Vulnerability Scanners Ticketing System Change Tracking
Desktop Mgmt
Technology for a SOC build is the foundation on which the organization demonstrates the ability to
provide security continuously, even under times of duress such as persistent attack, natural
disaster, facilities failure, etc.
Points of Consideration:
SOC technologies (SIEM, trouble ticketing, incident management, etc.) are often special purpose,
costly, and challenging to maintain due to their overall complexity
The number of disparate systems and volume of device / event data will typically require a dedicated IT
staff for system administration
Capacity management can be challenge due to the need to support peak loads which may include
DDoS, monthly batch processing, etc
The management and reporting systems must be flexible enough to accommodate process and
security policy as well as changes in the technology landscape
19 © 2015 IBM Corporation
IBM Security Services
© 2015 IBM
© 2015 IBMCorporation
Corporation
IBM Security Services
Executive Security Intelligence Briefings Local Reg. Security Oversight SOC Governance
Business Units
Consolidated Security Analytics & Dashboards Local/Reg. Intel. Briefings Legal
SOC
Audit
Emergency
SOC
Response
Admin Support Threat Threat Threat CSIRT
Services Monitoring Triage Response Management
Adv. Event Analysis IT Operations
Investigations Escalations Corp. Incident Response Incident Mgmt
Tool Integration Threat Analysis Problem Mgmt
Impact Analysis Incident Triage Incident Mgmt. Table-top Exercises
Rule Admin Change Mgmt
Release Mgmt
OT Operations
SOC Platform Components
Security Device Data Event Data (Int./Ext.) Event Patterns Correlation
Aggregate Security Events Log Data (Transactional) Unstructured Data (Big Data) Custom Rules
Technology
Legend
SOC
Getting Started
Develop a Strategy then a Plan
© 2015 IBM
© 2015 IBMCorporation
Corporation
IBM Security Services
Assessment
Design & Run &
Workshop Optimize
Build Enhance
Strategy
• Educational, People and Governance
share best
• Define the mission Processes and Practices
practices
• Table-top, guided • Assess current Technology
SOC maturity operations and
capabilities • Laying the • Leveraging acquired • Business aligned
assessments
foundation of knowledge and threat management
• Set high-level • Define future capabilities experience and metrics
vision environment
• Designing effective • Instituting formal • Drive for best
• Develop next steps • Develop roadmap staffing models and feedback and review practices
roadmap for action supporting mechanisms • Integrated operations
for action processes / • Driving further value with improved
technology from the technology communications
• Conducting training • Expanding business • Seek opportunities
and testing coverage and for cost takeout
• Implementing functions • Continuous
tracking and • Tuning and improvement
reporting refinement
capabilities
SOC / SIEM • Review security policies and SOC/SIEM mission/charter • 1-5 Days
Workshop • Review IBM SOC / SIEM Operating Model Point of View • Workshop Readout
• Review components needed to implement security operation center Deliverable
• Platform Arch., processes, organization, metrics/reporting, governance
• Discuss best practices for each components and industry trends
• Develop client feedback report
SOC Maturity • Review security policies and SOC/SIEM mission/charter • 1-5 Days
Assessment • Assess client environment against IBM SOC / SIEM Maturity Model • Maturity Assessment
Workshop • Establish future state target maturity by component Deliverable
• Analyze current and future targets vs. industry maturity benchmarks
• Identify gaps, opportunities for improvement, prioritize improvements
• Develop preliminary recommendations for SOC program
Use Case / • Review security policies and SOC/SIEM mission/charter • 4-8 Weeks
Rule (UCR) • Review business/technical requirements, risk tolerance, cost constraints • Assessment Report
Assessment • Review Use Case Models and rule architecture and design
• Identify gaps, opportunities for improvement
• Prepare high level Use Case / Rule recommendations
Use Case / • Review security policies and SOC/SIEM mission/charter • 4-8 Weeks
Rule UCR • Review business/technical requirements, risk tolerance, cost constraints • Use Case Assessment and
Strategy • Review Use Case Models and rule architecture and design Strategy Deliverable
• Identify gaps, opportunities for improvement
• Identify UCR scenarios and tailor the decision model
• Identify target state, prioritize improvements, finalize UCR strategy
SOC/SIEM • Develop Macro / Micro Design for Security Operation Center • 2-3 Months
Design • Key scope elements; platform, process, organization, reports, governance • SOC/SIEM design method
• Data source logical/physical scope and integration architecture • Design phase method/plan
• Develop use case and rule macro and micro design • Workshop decks/schedules
• Develop SOC operational model, logical/physical platform architecture • Key scope element baselines
• Finalize SOC process scope, context diagram, core/non-core processes • SOC capacity modeling tool
• Develop organization conceptual/logical model (roles), governance model
• Develop key metrics, reporting architecture, report list
• Product selection decision model and preliminary recommendations (opt.)
• Finalize SOC / SIEM Macro and Micro Design Deliverables
SOC/SIEM • Prepare SOC implementation plan, conduct SOC build, test, deployment • 4-6 Months
Implementation • Key scope elements; platform, process, organization, reports, governance • Implementation method/plan
• Execute procurement for selected products, services (opt.) • MSS build, test, deploy plans
• Finalize MSS implementation plan and build, test and deploy MSS (opt.) • Workshop decks/schedules
• Build, test and deploy data sources, integration API’s • Use case / rule frameworks
• Build, test, deploy use cases and conduct rule tuning • Key scope element baselines
• Build, test and deploy SOC processes, metrics, SLA’s/SLO’s, Ops Manual • SOC capacity modeling tool
• Build, test and deploy organization design, role descriptions • PoC, pilot, sim. live ops. plan
• Build, test and deploy metrics, reports and executive dashboards
• Build, test and deploy SOC governance processes
• Conduct transition; Proof of Concept, Pilot Op’s, Simulated Live Op’s
• Security Operation Center Go-Live, Update Phase N Design Plan
© 2015 IBM Corporation
IBM Security Services
Essential Practices
IBM Solution :
IBM Security Services Team reviewed the client’s business and technical
requirements, risk tolerance and cost constraints. After analyzing the requirements
IBM developed a 3 year SOC Strategy and Roadmap with ongoing Phase
implementations. Additionally the following high-level tasks were performed
Global Installation of the QRadar monitoring tool
Archer Ticketing System implementation (security tickets)
Designed the SOC Organization, Process, People Model
SOC Capacity Modeling
Hired and Trained the client’s SOC Staff (~12 resources)
Implemented SOC Operational Reporting and Executive Dashboards
Client Benefits:
Reduced risks & costs associated with security incidents and data breaches
Addressed compliance issues by establishing clear audit trails for incident response
Improved security posture with enterprise-wide security intelligence correlating
events from IT & business critical systems/applications.
IBM Confidential
IBM Security Services
Client Situation :
Profile:
The client had made a board-level commitment to raise the visibility, effectiveness
and efficiency of the global security program. A few high-level issues: Global property and casualty insurer.
Multiple day delays in identifying threats Third largest insurer in the United
Extreme incident false positive ratios with current MSSP States.
Labor intensive program, without clear lines of responsibility Fortune 100 company.
Minimal security analytics & dashboards
Operates in 900 location s distributed
IBM Solution : across 18 countries.
IBM Security Services Team began with a full day SOC optimization workshop to
The company has 50,000+ employees
educate the client program team, review and validate the client’s vision and
worldwide.
strategy. After the workshop and recommendations, the client requested IBM’s
support to help them plan, design and build the SOC including the following:
SOC Architecture development
SIEM operationalization (ArcSight)
Remedy Ticketing System implementation (security tickets)
Designed the SOC organization including capacity models
Developed best-practice core SOC process and created supporting
documentation & artifacts & trained client staff
Implemented Security Operational Reporting and Executive Dashboards
Managed transition from previous MSSP to IBM Managed Services
Client Benefits:
Reduced incident identification time from hours to minutes and streamlined
operations further reducing risks & associated costs & improved global security
with end to end incident management
Created an industry leading view into the overall security position allowing them to
better manage their entire environment
IBM Confidential
IBM Security Services
Client Situation :
Profile:
The client had invested into a SOC that was focused on policy violation and wanted
to expand the capabilities of their existing investment: UK based financial services group.
Compliance focused SOC Retail, commercial, wealth and asset
Significant challenges with existing technology management, international and
SOC manpower outsourced to 3rd Party insurance arms.
Minimal security analytics & dashboards, non-existent Security Intelligence Operates in almost every community in
IBM Solution : the UK.
IBM Security Services Team began with a 2 week SOC maturity assessment to Over 100,000 employees (2014)
gauge the client’s current and future capabilities and to review and validate the
client’s vision and strategy. After the assessment, recommendations were
presented to the client and IBM lead the transformation programme including:
Developed best-practice core SOC process and created supporting
documentation & artifacts & trained client staff
Establish a Security intelligence function
Accelerate development and implementation of a Ticketing System
Reviewed the SOC organisation and identified improvements
Demonstrated the importance of capacity modelling
Implemented Security Operational Reporting and Executive Dashboards
Client Benefits:
Increased efficiency from the existing SOC staff handling more events in a defined
and repeatable way.
Increased awareness of their own systems and future threats making use of
Security Intelligence
Better able to understand and highlight the benefits of the SOC due to improved
metrics and reporting
33 IBM Confidential
IBM Security Services
ευχαριστώ
Hindi
Tack
Swedish
Greek
Спасибо
Teşekkürler Gracias
Thai
Russian
Spanish
Hvala
Slovenian
Simplified Chinese
Korean
Köszönöm Hungarian
Japanese
40 © 2015
2012 IBM Corporation
IBM Security Services
“IBM burst into the Leader category by demonstrating superb global delivery capabilities”
41 © 2015 IBM Corporation
IBM Security Services
Integration
Integrated with 400+ products and vendor platforms
SIEM, log management, network anomaly
detection, and risk management combined in a
single console
Expertise
Embedded 3rd party security feeds including
IBM X-Force
Tight integration with InfoSphere Guardium
and IBM Identity Manager & Access Manager
for optimized data & user security
Solution:
A series of business and technical workshops were conducted to start
the assessment as the client needed to refocus their operations on Solution components:
security, while retaining maintain regulatory compliance. These IBM Q-Radar SIEM
workshops then advanced to a full security operations design,
integrating disparate business unit requirements, focusing analysis on IBM Security Services
important log sources, and reorganizing the department. Ultimately, the SOC Workshop & Design
client chose to have IBM staff their new SOC, reducing the total number IBM Security Services
of hired staff and overall cost. Professional Security
Services
Benefits: Overall SOC costs were reduced and the resulting
organization is more focused and effective.
Solution:
A business and technical workshop was conducted to start the
assessment and help the client envision the end-state should look like
and how to initiate the centralization process. Leveraging a deployed Solution components:
IBM Q-Radar installation, the solution involves creating a two redundant IBM Security Services
SOC’s to centralize security intelligence and device management SOC Workshop
operations. These SOC’s will work cooperatively using the best-practice
operational models derived from IBM MSS Global SOC’s providing a IBM Q-Radar
single, measurable view of security across their global operations. IBM Security Services
Managed SIEM
Benefits: A centralized operational model allows the economies of scale
to drive costs down, while improving the effectiveness of the security
operations and threat intelligence sharing.
45 © 2015
2012 IBM Corporation
IBM Security Services
Backup Pages
Assessment • Build new and integrate existing • Continue documentation and • Maintain and update SOC
processes and procedures update as necessary documentation
• Align SOC operations across the • Implement process improvement • Evaluate, measure and improve
enterprise program processes
• Drive business through metrics
• Manage risk and compliance
• Deliver SOC Workshop • Identify stakeholders • Deliver training: on the job, • Maintain dedicated SOC manager
• Perform SOC Maturity • Define roles, responsibilities, and job intrusion analysis, and Technology and analyst positions
SOC People
• Architect & design SIEM • Install & configure SIEM • Operate and maintain SIEM solutions •Operate and Maintain SIEM
solutions solutions • Implement dashboards •Maintain architecture and product
SOC Technology
• Plan Use Cases • Establish data feeds • Develop operational and business documentation
• Map operations to • Implement Use Cases reports • Perform health check on SIEM
regulatory and business • Build content • Investigate using advanced analytics environment at planned intervals
requirements • Design analyst workstations • Manage incidents via cases • Perform capacity planning
• Health check • Integrate threat intelligence • Develop steady-state technology
costs
Exceptionally Accurate
Extensive Data Sources + Deep Intelligence = and Actionable Insight
49 © 2015 IBM Corporation
Security Intelligence
IBM Security Services
Who?
An internal user
What?
Oracle data
Where?
Gmail
PCI compliance at
risk?
Real-time detection of
possible violation
Unencrypted Traffic
IBM Security QRadar QFlow saw a cleartext service running on the Accounting server
PCI Requirement 4 states: Encrypt transmission of cardholder data across open, public
networks
Compliance Simplified
Out-of-the-box support for major compliance and regulatory standards
Automated reports, pre-defined correlation rules and dashboards
Operational
Managed SIEMOverview
Service Overview
Compliance Policy
Analysis Rules Best Practices Remediation
Guidelines
Monitors
dashboard
24x7 Incident closely
Real Time Data sources Expert Knowledge
Management
Real-Time
Alert/Exception
COMPLIANCE
Log Data
ENGINE
Service
Reporting
Scheduled Log
DASHBOARD and
sources REPORTING Compliance
ENGINE Reporting
Anomaly
Reporting
Custom Reporting
(Anomaly / Forensics)
Raw Log access
Project Timeline
Ongoing Maturation