A blueprint for OT SOC - Part 1
Mohamed Atta
Cybersecurity Expert | OT/ICS | ISA/IEC 62443 Expert | GRID | CISSP | CRISC | SCADA Security Manager
Why do we need an OT SOC?
The term 5 Ws and H refers to the six basic questions to ask when gathering information or solving a problem. The questions are:
1. Who?
2. What?
3. Where?
4. When?
5. Why?
6. How?
The goal of this technique is to gain a factual answer to each question. Answers to all six questions should give clarity to whatever the questioner is trying to discover: the solution to a problem, the answer to a mystery, or even the best way to build a product.
In this series of articles, i will present the OT SOC blueprint by answering these questions
Statistical view on Cybersecurity Incident
There are many statistic about cybersecurity incident detection and response time, most of them puts the incident timing the ranges listed below. Of course it will be different from one facility to another in timing as well as impact and cost.
Of course many will argue that the defense is there and it can protect their high value assets. From my point of view this is a false sense of security, so let's break it down together in the below section
领英推荐
Prevention Atrophy
Prevention atrophy or decay in cybersecurity refers to the gradual reduction in the effectiveness of security measures over time.
If an APT with advanced skills and vast resources, they will most probably bypass your defenses, either by crafting a target attack or through insider threat, your defense will not help in this case and you must be ready for detection and response.
Time to Detect(Dwell time)
Time to Detect (Dwell Time) is the duration between when a security breach or compromise begins and when it is first detected by the organization. It reflects how long an attacker can remain undetected within a system, potentially causing damage, exfiltrating data, or escalating privileges. Shortening dwell time is critical to minimizing the impact of security incidents.
With dwell time reaching 6 months in some incidents, . This extended dwell time allows the attackers to thoroughly explore the network, understand the environment, and strategically position themselves for the final, coordinated attack that led to widespread disrubtion.
The goal of the SOC is to shorten the dwell time as much as possible
Technology Limitation
The goal of the SOC is to interrupts the attack in its early stage.
Operational Context
The need of Response Facilitation
This refers to the inability of an OT Security Operations Center (SOC) to effectively coordinate and execute response actions during an incident. This could be due to:
Compliance Requirements
Needless to say that almost every cybersecurity guideline or best practice national or international defines OT continuous monitoring as one of its controls.
This concludes part one of the series, let me know what you think and see you in the next part.
Cyber Security Analyst/Manager
2 个月Very impressive!
Looking forward to the upcoming articles in this series.
OT Cybersecurity Leader | AI Engineering Novice | Controls Engineer | Pharma | Manufacturing | Military Veteran | Practitioner
2 个月Simplified, I think it’s to improve the signal to noise ratio. Having OT tools in place but not OT folks to tune and interpret the data is of lesser value. You have to know what you’re looking at to make sense of it.
SOC && IR Manager || MSSP|CISSP|CISM|GCFA|GMON|GCIH|CCNA(RS/SEC)|CC|Qradar|Splunk|Arcsight
2 个月Keep posting ??
P.Eng., OT cybersecurity, ICS, Critical Infrastructure
2 个月These days, the regular SOC vs OT SOC focus on different events. Most traditional SOC these days don't have much understanding of OT events. Tough to provide proper monitoring in my opinion.