Building a Next-Generation Security Operations Center
Robert Bond
?? VP of Marketing | Digital Growth Strategist | Leader in Product Marketing Management | Helping Brands Scale with Data-Driven Marketing, Compelling Storytelling & Revenue-Focused Strategies
Building an enterprise Security Operations Center (SOC) calls for careful planning and the precise coordination of people, processes, and technologies, as we covered in our previous post, 7 Steps to Building a Security Operations Center.
However, once you’ve established a solid foundation, that’s just the start. You need to iteratively improve and modernize your SOC as the cyber threats it’s designed to fend off evolve.?
In this post, we’ll consider several strategies you can adopt to take your SOC from good to great, focusing specifically on industry frameworks, technologies, and personnel.
?
SOC Industry Frameworks Come of Age
Every SOC needs formal security policies and procedures to be written, enforced, and regularly reviewed. The good news is that creating these isn’t something you need to do from the ground up. They’re readily available from the likes of the NIST Security Operations Center Framework (CSF) and MITRE ATT&CK knowledge base.?
These standards are continually being extended and refined and new use cases are being explored by your peers in the industry.
Let’s consider some recent developments in these areas.
Coming Soon: NIST’s CSF 2.0.
The CSF offers extensive, actionable guidance for SOC operations. It covers all aspects of cyber threat handling, including identification, protection, detection, response, and recovery. Periodically revisiting the CSF and refining your SOC processes will allow you to ensure your SOC is comprehensively aligned with?NIST best practices.?
Also, don’t forget that the CSF is a living document that evolves over time.?NIST initially produced the framework in 2014 and updated it in April 2018 with CSF 1.1. After considering industry and stakeholder feedback, NIST is currently planning another, even more significant, update to the framework: CSF 2.0. These updates are designed to help the framework:
According to NIST, CSF 2.0. will “reflect the ever-evolving cybersecurity landscape and help organizations more easily and effectively manage cybersecurity risk.”
NIST relies on and is currently actively seeking stakeholder feedback as they finalize their latest CSF release – so why not get involved by attending their public webinars and workshops and reviewing initial drafts of CSF 2.0?
More than a Reference Architecture: New Use Cases for the MITRE ATT&CK Framework
Since its creation in 2013, security operations professionals have relied on the?MITRE ATT&CK framework as a reference architecture. This knowledge base is a powerful tool for anyone seeking to better understand adversary tactics and techniques based on real-world observations.?
According to recent research, 48% of organizations use the MITRE ATT&CK framework “extensively” for their security operations, while 41% use it on a limited basis. When asked how important MITRE ATT&CK is for their future security operations strategy, 19% claim that it’s critical, and 62% say it’s very important.
Like NIST’s CSF, MITRE ATT&CK is a living and breathing framework. Today’s security teams are building on this foundation by experimenting with new use cases to derive even greater benefits. A new report outlines some of these novel applications and use cases:
Looking ahead, experts foresee MITRE ATT&CK driving more continuous security testing. According to one commentator:?
“MITRE ATT&CK already raised the value of threat intelligence by helping companies map atomic indicators and alerts to extended kill chains. Similarly, I believe MITRE ATT&CK will also drive the mainstreaming of continuous security testing.”
Next, let’s look at the technology aspect of the next-generation SOC.
?
Technologies to Future-proof Your SOC in 2023
The three key technologies within a typical SOC are associated with:
Common data sources include:
A security intelligence platform gathers data from all the sources listed above but also correlates it. Should a threat be detected, it will immediately send an alert to a SOC engineer.
领英推荐
This is a ticketing system that tracks events throughout their lifecycle. It also serves as a communication point between affected infrastructure and SOC teams and users. Investing in, maintaining, and updating these infrastructure elements can be expensive, which is why many organizations rely on managed solutions from third parties to defer or offset their upfront costs.
Where Do Current SOC Technology Gaps Lie?
Forbes recently asked SOC professionals what technologies they believe they need to succeed with their plans for the coming year. Their responses were interesting:
While the importance of the correct SOC technology can’t be understated, ensuring your SOC is manned by top-notch human expertise is equally, if not more important.
This brings us to our third element of a future-ready SOC – people.
?
Next-generation SOC Staffing Strategies
According to the?SANS 2022 SOC Survey, the greatest barrier facing security teams seeking to optimize their utilization of their SOCs is high staffing requirements. However, SOC specialists are expensive and in short supply.
To understand the problem and consider potential workarounds, first, let’s look at the key roles in a SOC team and what they do:
Enterprise SOCs are well-known for?high staff turnover?rates – the average employee spends an average of just 26 months with an organization. This short employment average often prevents SOC teams from acquiring the organizational-specific knowledge they need to manage discovered incidents without dedicated third-party support and/or guidance from more senior colleagues.?
Gartner predicts that by 2024, more than 90% of buyers looking to outsource to security services providers will focus on threat detection and response services.
Here are some SOC roles and tasks that are frequently outsourced:
Penetration Testing: Third-party penetration testing experts take care of performing advanced security verification using your company’s unique schedule, processes, and prioritization levels.?
The best outsourcing partners will involve ethical hackers as part of the process of finding and remediating vulnerabilities in software, web applications, operating systems, networks, and more. They’ll base their penetration tests on your business and risk management requirements and focus on the areas of your IT environment deemed most critical.?
24/7 Analysts: One of the most commonly outsourced SOC functions is that of the Tier 1 analyst. This employee performs 24/7/365 monitoring of security alerts and associated data feeds from systems and networks. Further, these analysts work within your processes to provide a preliminary analysis of relevant events and triage based on the criticality/severity of the event. They’ll then escalate events using your criteria and direct issues to appropriate members of incident response teams or Tier 2 analysts to eliminate threats quickly and efficiently.
Incident Handling/Response: A good outsourcing provider will partner with you to mitigate threats by leveraging their dedicated incident response experts. They’ll work within your playbooks and processes and follow key steps like generating response actions, authorizing responses, and quarantining threats. In addition, they’ll implement secure backups, leverage logs and security alerts to detect malicious activity, and monitor identity and access management.
?
SOC around the Clock: SOC-as-a-Service
Over the last few years, the trend toward outsourcing SOC responsibilities to specialist managed security services providers (MSSPs) has spawned what’s known as SoC-as-a-Service (SOCaaS).
In SOCaaS arrangements, the MSSP typically takes responsibility for some or all elements of the enterprise SOC. Some organizations are initially a little reticent to go this route, fearing they’ll lose control of their overall security plan. However, that’s an unlikely outcome, and most see the opposite happen – they reap the benefits of having an expert step them through the process of developing, honing, and improving their SOC strategy, ultimately feeling even more confident and in control of their operations than ever before.
When entering into a SOCaaS arrangement, you usually sign up for a fixed-price contract that comes with a monthly or annual fee. Your provider will commit to specific service level agreements (SLAs) that govern the terms of the contract, making them a more efficient and cost-effective alternative to an all-in-house SOC.
A managed service SOC can also help address any potential skills gap challenges in your security team and free up existing IT experts to focus on other business-critical issues. This ensures a reliable SOC is operational in your organization around the clock.
?
Conclusion
Organizations that go the outsourcing route generally report the total cost of their third-party SOC services to be significantly lower than the cost of purchasing, installing, and maintaining the same technology and services in-house. This strategy also eliminates many upfront CapEx expenditures, not to mention the cost of hiring, managing, and retaining scarce and highly sought-after SOC specialists.
SOCs play a business-critical role in protecting organizations from insider and external threats. As we move into 2023, we can expect SOCs – whether in-house, outsourced, or a hybrid models – to take their rightful place at the top of the business agenda.
The Funnel Master ???? | Master of Sales Funnels | Elevating Your Business with Strategic Funnel Building ????
1 年Sounds like a challenging yet rewarding project! ????
?? 24K+ Followers | Real-Time, Pre-Qualified Leads for Businesses | ?? AI Visionary & ?? Digital Marketing Expert | DM & AI Trainer ?? | ?? Founder of PakGPT | Co-Founder of Bint e Ahan ?? | ??DM for Collab??
1 年Sounds like a challenging but rewarding project! ??