CHAPTER-4: SOC Functions

CHAPTER-4: SOC Functions

I am with you throughout the book as a friend and a technical advisor, as things gets complex, just try to understand the purpose of these processes, they are laid out for a reason, once you understand the ‘reason’, you can generate new reason as well.

The primary functions of a SOC solution are to aggregate, normalize, and correlate security events to provide a holistic view of all the activities that happen in an IT infrastructure. It ingests event data from a wide range of sources across an organization’s entire IT infrastructure, including on-premises and cloud environments. Event log data from users, endpoints, applications, data sources, cloud workloads (on-cloud or on-prem), and networks, data from security hardware and software such as firewalls or antivirus software—is collected, correlated, and analyzed in real-time in conjunction with threat intelligence mapping and provided a severity score. These scores also will be mapped to ISO/IEC 27001, MITRE, PCI-DSS?and other standards, if you have a mapping of event to standards, which can correlate with those.

Most of the functions are derived from CISO provided guidelines or can be combined from collected data from experienced SOC personnel, whichever works, a manual or following standards & frameworks (there is none!) on how to do it right at the first time and all the time.

Source: What Is a Security Operations Center (SOC)? - Palo Alto Networks

It is of paramount importance that your perception is limited to your knowledge, not trying to achieve an insulting effect, but it’s true to the core, and when you realize this, I can guarantee you that you already know much, and knowledge can be grown, skills can be taught, but look for aptitude that makes us technical people, a highly effective personnel, because of their extreme competencies, and reason why I salute you, my peers. Collaboration is always the key, no matter what you say, how you present, or how many times you have documented, keep doing it, that’s the right way, and a peer who knows better, make sure you tag along with those folks, they came to peering as a blessing, not a threat. And ask for help!

That’s how a SOC manager should perform, keep learning from each other, fine tune all the processes, try making it shorter, and do share and give back, that’s how you grow. Set your ego aside, it’s doable.

Open Security Architecture (OSA) Architecture Patterns

OSA can provide benefits to IT service consumers, IT service suppliers and IT vendors, giving the entire IT community an interest in using and improving.

·??????? IT service consumers need to integrate diverse architectures from many suppliers in complex chains. They win using OSA because they can better specify or assess services or products they purchase and improve the quality of products they build. They can reduce knowledge risks from the architecture being in the supplier’s control. Additionally, they increase confidence in the ability to integrate services, improve conformance with GRC requirements and reduce audit costs.

·??????? IT service suppliers want to supply services to the maximum number of consumers, minimizing the cost to specify, implement and operate, while ensuring that the services meet the consumers’ requirements. They win using OSA as they can provide conformant solutions at the least cost to the largest market.

·??????? IT vendors want to supply products that meet market needs and have a low TCO?for the IT service supplier that will operate. They win using OSA as they can build systems with relevant and appropriate controls.

From the landscape you can derive or readily view your perspective on the provided landscapes, a screenshot follows for the “SP-011: Cloud Computing Pattern”. Each numbered item is clickable and lands you to the description (and now you have a gold mine for you to map out the business architecture mapping to your cybersecurity architecture and a complete mapping can be generated):

·??????? Total Control Catalogue: Control Catalogue (opensecurityarchitecture.org)

·??????? Patterns Landscape: Pattern Landscape (opensecurityarchitecture.org)

·??????? Threat Catalogue: Threat Catalogue (opensecurityarchitecture.org)

Source:

Source: SP-011: Cloud Computing Pattern (opensecurityarchitecture.org)

SOC Methodology

Source:

Source: The SOC methodology - SecureGlobal

In summary, a functional SOC is central to curbing cybersecurity threats that can cost businesses significant amounts in lost revenue and data breaches

Source:

Source: how threat landscapes have evolved | Download Scientific Diagram (researchgate.net)

According to a report by Kaspersky (Cybersecurity in the AI era: How the threat landscape evolved in 2023 | Kaspersky), the use of AI by cybercriminals has become more prevalent in recent years, with AI tools being used to help them in their malicious activities. The report also highlights the potential defensive applications of AI technology. As technology continues to evolve, new vulnerabilities and exploits are discovered, and attackers change their tactics to exploit them.?The global threat landscape is in a constant state of flux, with geopolitical instability, newly discovered exploits and vulnerabilities, and constantly evolving tools and shifting targets all contributing to attackers changing their modus operandi.?As a result, it is essential for organizations to stay up to date with the latest security trends and technologies to protect themselves from emerging threats.

SOC – Capability Maturity Model (SOC-CMM)

The SOC-CMM?model was initially created as a scientific research project to determine characteristics and features of SOCs, such as specific technologies or processes. From that research project, the SOC-CMM?has evolved to become the de-facto standard for measuring capability maturity in Security Operations Centers. At the core of the assessment tool lies the SOC-CMM?model. This model consists of 5 domains and 26 aspects, that are each evaluated using several questions. The domains 'Business', 'People' and 'Process' are evaluated for maturity only (blue color), the domains 'Technology' and 'Services' are evaluated for both maturity and capability (purple color). (Got really lazy here, cited from source SOC-CMM?directly)

Source:

Source: SOC-CMM?- Measuring capability maturity in security operations centers

You can download all the excel files from here, and its also provided in the job aids: SOC-CMM?- Downloads

Cybersecurity by Bill Ross

A handful of documents available for you to look into, as those guides are invaluable towards my understanding the domain of SOC from architecting to developing SoP, they can be found here:

Bill Ross | The Catholic University of America - Academia.edu

Some of his very useful contributions are:

1.????? Cybersecurity Architecture Management System Design .... CSAMS

2.????? Cyber Security Frameworks Like the NIST Cyber Security Framework or CSF

3.????? Cyber Security Architecture Development

4.????? Security Operations Center (SOC) or Strategic Operating Procedure

5.????? Cybersecurity Tools

NOC amp; SOC Visibility Requirement

Every Hardware, Operating Systems, Virtual Machines, Applications must enable the enterprise grade compliance visibility & reporting services which aids for capacity planning & management as per ISO-20000, ISO-27001, ISO-22301, CISECURITY, ITIL, COBIT, Q4IT, PCI-DSS?report generation, which requires data collection from various HW & SW sources (IT Governance). Full Admin (root & admin) access for various agent installations for the following services both for Windows & Linux Systems: (this is not an exhaustive list):

Primary visibility requirements:

1.????? ?People

2.????? ?Processes

3.????? ?Technology

4.????? ?Affiliations

5.????? ?Business

6.????? ?Visibility

And the SOC visibility requirements (a 49 point visibility requirements, change as you see fit, copy the spreadsheet and paste into an excel file):

Integrated Intelligence for a Threat-informed Defense

A good blend of human intelligence and powerful automation provides real-time visibility into your organization’s ability to manage threat exposure. Offensive engagements are somewhat customized to meet your needs and security posture maturity level and can scale to address even the largest, most complex environment. I would not recommend this offensive approach differently, as the mentality that drives this type of operation always leads to increased incoming threats, as you would be testing hacker’s ability to penetrate your defense. But in a government or in a military installation it may be required to withstand and counter-attack your threat sources.

???????? IAM (Identity & Access Management): Please be mindful that in most cases Windows servers needs to be enrolled as a member server of an Active Directory or any popular LDAP?(Lightweight Directory Access Protocol)?providers, and Linux servers should have identical authentication systems like FreeIPA.

???????? HSM servers: Hardware security modules, where Thales has the most supported appliances which can be used to key or token generations for your applications, meet various FIPS requirements etc.

???????? Cloud security: Ensure a secure, efficient cloud infrastructure through comprehensive assessments.

???????? PLC, SCADA, IoT, ICS: Streamline your design or all the PLC devices, and do not put your devices into a standard networking device. Rather, use industry standard frameworks like IEC 62443‐2‐1 to reduce the vulnerabilities. Since we are talking about cyber security, it is good practice to have device’s configuration checked, once it is updated or reconfigured.

???????? Device configurations: In many ways, IT folks are not used to have benchmarked configurations, they simply configure what needs to be done to achieve a primary functionality leaving the device prone to attacks. You should consult with a practitioner on the benchmark configurations or take professional services, or you can go to the CISECURITY site and download the benchmarked configuration files freely available.

???????? Real-IP usage: In any case, the lower usage also reduces your footprint in the internet. Properly designed secured gateways coupled with WAF?or CASB?(Cloud Access Security Broker) would provide significant protection. Do remember that every vendor’s device can come with infiltration chips that cannot be detected by your firewalls, therefore, it is of paramount importance that the circuit level understanding is a must trait before a solution is derived.

An offensive security team performs a variety of functions (not attacking the attackers) to enhance an organization’s cybersecurity posture.?Here are some key functions:

1.????? Security Reviews and Threat Modeling Support: The team gets involved early in the design phase of a system to provide feedback before code is deployed or operational processes are established.

2.????? Security Assessments: The team conducts hands-on offensive security testing and finds and exploits vulnerabilities for defensive purposes.

3.????? Red Team Operations: The team simulates attacks on the organization’s systems to identify vulnerabilities and assess the effectiveness of existing security measures, and in offensive cases, they attack the adversaries as well, either to check their strength or track them if they make any mistake retrying to attack, but the unknown scenario always emerges, as the attacker might start weaponizing with robust and more sophisticated attacks.

4.????? Purple Team Operations: The team works with the defensive security team (Blue Team) to improve the organization’s overall security.

5.????? Tabletop Exercises: The team conducts simulated incident response exercises to test the organization’s readiness to handle security incidents.

6.????? Research and Development: The team stays updated with the latest threats and vulnerabilities and develops new strategies to counter them.

7.????? Predictive Attack Analysis and Incident Response Support: The team predicts potential attack vectors and provides support during actual security incidents.

8.????? Collaboration with the defensive team: Working closely with the defensive (blue team) and IT teams to ensure that identified vulnerabilities are promptly addressed and security controls are continuously improved.

9.????? Security Education and Training: The team helps improve the organization’s security culture and overall security posture.

10.?? Gathering Threat Intelligence: The team collects information about emerging threats and threat actors.

11.?? Informing Risk Management Groups and Leadership: The team provides valuable input to risk management groups and leadership about the organization’s security posture.

Integration into Engineering Processes: The team works closely with the engineering team to integrate security into the development process.

The Importance of Having a Data Scientist Team in Cyber Security Operation Center

Cyber security is one of the most critical and challenging domains in the modern world. With the increasing volume and complexity of data, cyber threats, and attacks, it is essential to have a robust and proactive defense system that can protect the systems and data from internal or external risks. Data science, the branch of AI that involves studying and analyzing large volumes of data using various tools and techniques, can play a vital role in enhancing cyber security. In this blog post, we will explore how data science can help cyber security and why having a data scientist team in a cyber security operation center (CSOC) is important.

How Data Science Can Help Cyber Security

Data science can help cyber security in different ways:

  • Detecting anomalies and patterns: Data science can help identify unusual or suspicious activities or behavioral pattern in the network or system using various methods such as clustering, classification, or regression. For example, data science can help detect malware, phishing, or denial-of-service attacks by analyzing network traffic, email content, or system logs.
  • Predicting vulnerabilities and risks: Data science can help assess the potential weaknesses or threats in the system or data using various techniques such as forecasting, simulation, or optimization. For example, data science can help predict the likelihood of a breach, the impact of an attack, or the best countermeasures to take, and some specialized tools to implement.
  • Preventing and responding to attacks: Data science can help prevent or mitigate the damage caused by cyber-attacks using various approaches such as reinforcement learning, natural language processing, or computer vision. For example, data science can help automate the response to an incident, generate alerts or reports, or communicate with the stakeholders.

Why Having a Data Scientist Team in SOC is Important

A SOC is a centralized unit that monitors, analyzes, and responds to cyber security incidents. A SOC typically consists of various roles and functions, such as analysts, engineers, managers, or coordinators. However, having a data scientist team in a SOC can add significant value and benefits, such as:

  • Enhancing the capabilities and performance of the SOC: A data scientist team can help the SOC leverage the power of data science to improve its efficiency, effectiveness, and accuracy. For example, a data scientist team can help the SOC develop and deploy advanced analytics systems, tools, or models that can automate, optimize, or augment the cyber security processes and tasks.
  • Providing insights and solutions for complex problems: A data scientist team can help the SOC discover and understand the hidden patterns and insights from the data that can help solve complex or novel cyber security problems. For example, a data scientist team can help the SOC identify the root causes, trends, or correlations of cyber security incidents, or recommend the best actions or strategies to take.
  • Innovating and experimenting with new ideas and technologies: A data scientist team can help the SOC explore and experiment with new ideas and technologies that can enhance or transform the cyber security domain. For example, a data scientist team can help the SOC apply the latest research or developments in data science, such as deep learning, graph analytics, or quantum computing, to cyber security challenges or opportunities.

Data science and cyber security are two interrelated and complementary disciplines that can benefit from each other. Data science can help cyber security in various ways, such as detecting, predicting, preventing, or responding to cyber-attacks. Having a data scientist team in a SOC can help enhance the capabilities and performance of the SOC, provide insights and solutions for complex problems, and innovate and experiment with new ideas and technologies. Therefore, having a data scientist team in a SOC is important and valuable for any organization that wants to protect its systems and data from cyber risks.

Challenges of Having a Data Scientist Team in CSOC

  • Finding and retaining qualified talent: Data science is a highly sought-after skill in the market, and there is a shortage of data scientists who have both the technical expertise and the domain knowledge of cyber security.?Moreover, data scientists may face high turnover rates due to the competitive nature of the industry and the attractive opportunities elsewhere. Appropriate prioritizing of shifts for security analysts is a must have.
  • Integrating and aligning with the existing SOC functions: Data science teams need to work closely with other SOC roles and functions, such as analysts, engineers, managers, or coordinators, to ensure that their outputs are relevant, actionable, and consistent.?However, this may require overcoming the challenges of communication, collaboration, and coordination across different teams, cultures, and processes.
  • Ensuring data quality, security, and privacy: Data science teams rely on large volumes and varieties of data to perform their tasks, such as network traffic, system logs, or threat intelligence. However, ensuring that the data is accurate, complete, and up to date can be challenging, especially in a dynamic and complex cyber environment. Moreover, data science teams need to adhere to the strict standards and regulations of data security and privacy, such as encryption, anonymization, or consent, to protect the data from unauthorized access or misuse.

Data Scientists Data Requirements From a SOC

The data scientist’s data requirements from a SOC may vary depending on the specific tasks and goals of the data science team. However, some general data requirements are:

  • Access to relevant and reliable data sources: Data scientists need to have access to various types of data that are relevant to the cyber security domain, such as network traffic, system logs, threat intelligence, incident reports, vulnerability scans, etc. These data sources should be reliable, accurate, complete, and up-to-date, and should cover the entire enterprise infrastructure and data assets.
  • Ability to collect, store, and process large volumes and varieties of data: Data scientists need to have the tools and technologies to collect, store, and process large volumes and varieties of data, such as structured, unstructured, or semi-structured data, in a scalable and efficient manner. These tools and technologies should support data ingestion, integration, transformation, cleansing, and analysis, and should be compatible with the existing SOC functions and systems.
  • Ability to apply appropriate data science methods and techniques: Data scientists need to have the skills and knowledge to apply appropriate data science methods and techniques to the data, such as descriptive, predictive, or prescriptive analytics, machine learning, deep learning, natural language processing, computer vision, etc. These methods and techniques should be suitable for cyber security problems and objectives and should be validated and evaluated for their performance and accuracy.
  • Ability to communicate and visualize the data and results: Data scientists need to have the ability to communicate and visualize the data and results in a clear and understandable manner, using various tools and formats, such as dashboards, reports, charts, graphs, etc. These tools and formats should be tailored to the needs and preferences of the different stakeholders, such as analysts, engineers, managers, or coordinators, and should provide actionable insights and recommendations.

Common Data Science Methods and Techniques Used in SOC

  • Descriptive analytics: This technique involves summarizing and visualizing the data to understand what has happened or is happening in the cyber environment.?For example, descriptive analytics can help the SOC create dashboards, reports, charts, or graphs to monitor the network activity, system performance, or threat landscape.
  • Predictive analytics: This technique involves applying statistical or machine learning models to the data to forecast what will happen or is likely to happen in the cyber environment.?For example, predictive analytics can help the SOC estimate the probability of a cyber-attack, the impact of a vulnerability, or the behavior of an adversary.
  • Prescriptive analytics: This technique involves using optimization or simulation models to the data to recommend what should be done or is best to be done in the cyber environment.?For example, prescriptive analytics can help the SOC determine the optimal allocation of resources, the best response strategy, or the most effective countermeasure.
  • Anomaly detection: This technique involves identifying and flagging the data points that deviate from the normal or expected patterns in the data. For example, anomaly detection can help the SOC detect malicious or suspicious activities, such as malware, phishing, or denial-of-service attacks, by analyzing the network traffic, email content, or system logs.
  • Clustering: This technique involves grouping the data points that have similar characteristics or features in the data. For example, clustering can help the SOC segment the data into different categories, such as users, devices, or threats, based on their attributes, behaviors, or relationships.
  • Classification: This technique involves assigning labels or categories to the data points based on predefined criteria or rules in the data. For example, classification can help the SOC identify the type or severity of a cyber incident, such as malware, phishing, or denial-of-service, based on the features, patterns, or signatures of the data.
  • Natural language processing: This technique involves processing and analyzing the textual or spoken data using various methods, such as text classification, named entity recognition, sentiment analysis, topic modeling, machine translation, speech recognition and generation, or text summarization. For example, natural language processing can help the SOC extract information, insights, or emotions from the text or speech data, such as emails, reports, blogs, or podcasts, related to cyber security.

Limitations of Using Data Science in SOC

  • Limited access to data: Data science requires access to various types of data that are relevant to cyber security, such as network traffic, system logs, threat intelligence, etc.?However, these data may not be publicly available or easy to obtain due to privacy, legal, or technical constraints.
  • Data quality issues: Data science relies on the quality and reliability of the data to perform accurate and meaningful analysis.?However, the data used in SOC may have issues such as missing values, errors, inconsistencies, or noise, which can affect the validity and usefulness of the results.
  • Bias in data and algorithms: Data science can be biased due to various factors, such as the way the data is collected, processed, or interpreted, or the way the algorithms are designed, trained, or evaluated.?Bias can lead to unfair or discriminatory outcomes, which can harm the reputation or trustworthiness of the SOC.
  • Lack of skilled staff: Data science requires a combination of technical skills, domain knowledge, and analytical thinking, which are in high demand and short supply in the market.?Finding and retaining qualified data scientists for SOC can be challenging and costly.
  • Lack of integration and alignment: Data science needs to be integrated and aligned with the existing SOC functions, such as monitoring, analysis, response, and reporting.?However, this may require overcoming the barriers of communication, collaboration, and coordination across different teams, cultures, and processes.

Ethical Considerations When Using Data Science in Cyber Security

  • Data privacy and security: Data science requires access to various types of data that are relevant to cyber security, such as network traffic, system logs, threat intelligence, etc. However, these data may contain sensitive or personal information that needs to be protected from unauthorized access or misuse.?Data science teams must respect the users’ privacy and data security rights, and adhere to the relevant laws and regulations, such as GDPR or HIPAA.
  • Bias and fairness: Data science relies on algorithms and models that are trained and tested on data. However, these algorithms and models may be biased due to various factors, such as the way the data is collected, processed, or interpreted, or the way the algorithms are designed, trained, or evaluated. Bias can lead to unfair or discriminatory outcomes, such as false positives or negatives, or misclassification of cyber incidents or threats.?Data science teams must ensure that their algorithms and models are unbiased and fair, and that they do not harm or disadvantage any groups or individuals.
  • Transparency and accountability: Data science involves complex and sophisticated methods and techniques that may not be easily understood or explained by the data science teams or the users. However, these methods and techniques may have significant impacts on cyber security decisions and actions, such as detection, prediction, prevention, or response.?Data science teams must ensure that their methods and techniques are transparent and accountable, and that they can provide clear and understandable explanations or justifications for their results and recommendations.

Examples of Unethical Use of Data Science in Cyber Security

  • Data breaches: Data breaches involve unauthorized access or disclosure of sensitive or personal data by hackers, insiders, or third parties. Data breaches can cause serious harm to the data owners, such as identity theft, fraud, or blackmail.?For example, Equifax, one of the largest credit bureaus in the U.S., suffered a massive data breach in 2017 that compromised the personal information of approximately 147 million people.
  • Deepfakes: Deepfakes are synthetic media that use data science techniques, such as deep learning, to manipulate or generate realistic images, videos, or audio of people or events. Deepfakes can be used for malicious purposes, such as spreading misinformation, impersonating someone, or blackmailing someone. For example, a deepfake video of former U.S.?President Barack Obama was created and released on LinkedIn by researchers to demonstrate the potential dangers of this technology.
  • Cyberattacks: Cyberattacks are deliberate attempts to disrupt, damage, or gain unauthorized access to a computer system or network. Cyberattacks can use data science techniques, such as machine learning, to enhance their effectiveness, stealth, or adaptability.?For example, a cyberattack on a Ukrainian power grid in 2016 used machine learning to evade detection which caused a blackout.
  • Malicious AI Models Backdooring Computers: AI models can be manipulated to perform malicious activities, including backdooring computers. For instance, code uploaded to the AI developer platform Hugging Face was found to covertly install backdoors on end-user machines. This was achieved by exploiting the serialization process, a method used in Python to convert objects and classes into a byte stream. When the malicious model was loaded onto an end-user device, it opened a reverse shell, granting a remote device full control of the user’s device. This demonstrates that AI models, like any other software, can pose serious risks if not carefully vetted.
  • AI Making Costly Mistakes: AI systems can make mistakes that lead to financial losses, wasted time, and even lawsuits. For example, one study estimates that 70% of AI initiatives see no or minimal impact due to factors like lack of expertise, misunderstanding of AI capabilities, and under-budgeting. Missteps in AI implementation can lead to underwhelming results, costing organizations time, money, and energy. Moreover, the misuse of AI in industries like healthcare and insurance has led to a wave of lawsuits.
  • Customer Lawsuits: As AI technologies become mainstream, so will legal cases involving these systems. There have been numerous lawsuits against companies for allegedly using AI to infringe on copyrights or to deny claims. For instance, OpenAI, the makers of GPT-4 and DALL·E, are being sued by authors for unlawfully using their work to train its large language models. Similarly, insurers like Humana, Cigna, and UnitedHealthcare are facing class actions for allegedly deploying advanced technology to deny claims.

In summary, while AI has the potential to bring significant benefits, it also comes with risks and challenges. It’s crucial for organizations to implement robust security measures, ensure proper use of AI, and stay updated with the legal implications of AI use.

Does Offensive Security Mean to Attack the Attacker?

No, offensive security does not mean attacking the attacker. Offensive security, also known as penetration testing or red teaming, involves authorized professionals simulating cyber-attacks on an organization's systems, networks, and applications. The primary goal is to identify vulnerabilities and weaknesses before malicious attackers can exploit them. The offensive security team works to understand potential entry points, security flaws, and areas where improvements can be made in an organization's cybersecurity defenses.

In offensive security, the activities are conducted ethically and with explicit permission from the organization being tested. The focus is on improving security by identifying and addressing weaknesses, not on attacking external threat actors. The offensive security team operates within legal and ethical boundaries, adhering to a predefined scope and rules of engagement.

In contrast, when we talk about defending against attackers, it falls under the domain of defensive security. Defensive security involves implementing measures to protect systems, networks, and data from unauthorized access, attacks, and other security threats. Defensive security measures include firewalls, intrusion detection systems, antivirus software, access controls, and other safeguards to prevent, detect, and respond to security incidents.

Overall, offensive security and defensive security work hand-in-hand to create a comprehensive and resilient cybersecurity strategy for organizations. The offensive side helps identify weaknesses, while the defensive side focuses on implementing safeguards and responding to potential threats.

______________________________________________________________________________________

?? FREE eBook - 476 Pages

?? Complete Guide to Cyber Security Operation Center??


I’ve recently completed a book on SOC, a project close to my heart, that delves into the exciting realm of Security Automation, Orchestration, and Hyper-automation platforms in the SOC. If you’ve ever found yourself overwhelmed by the multitude of cybersecurity solutions, this post is designed to be your personal guide on developing a fully functional SOC.

This eBook comes with plenty of examples and illustrations to help you understand complex concepts, data collection requirements to incident response, automations, playbooks, integrations requirements under the scope of IT, IS and Cybersecurity.

A big shout out to Brad Voris for his review of the book, his insights made this book even richer.


Knowledge Areas Covered

? Enterprise architecture strategy to better formulate your SOC.

? Visibility & data ingress requirements for your SOC

? SOC functions, KPI’s, processes, frameworks, and automation requirements

? Derive your Analyst-JD aligned to international frameworks

? SOC organogram with Red, Blue, Purple team’s maturity, tactics, functions, activities

? SIEM & SOAR architecture design guidelines to achieve more from these integrations.

? Detection engineering with OSINT, CTEM.

? Incident response with CSIRT, DFIR.

? Tabletop exercises explained and operationalized

? Artificial Intelligence & Data Science in SOC

? How to develop your Open-source based SOC, full hardware BoQ, Network Design is provided

? Bonus Chapters: IT Project Management, VA/PT Plan, ITIL Strategy Frameworks, Jurisdiction Assignment Matrix etc.

?? Download the eBook

?? Download this eBook (pdf): https://lnkd.in/gTRnhmPp

?? DM me for the DOCX version of the book.

?? Join Discord: Please DM me on LinkedIn, I will Send you the link to join.

?? 1000+ Job aids – download extra documentation.

?? 60 Body of Knowledge (BoK) links.

?? 1500+ curated list of VA/PT tools as job aids.

?? 200+ References to support your SOC operations even further.


?? Download all the available documents from here: https://lnkd.in/eNNUm9XW

?? Download Job Aids: https://lnkd.in/gCKq6R-D

If you find it useful and informative, please share/repost the book with your network.




?

David César

Capitaine chez C.E.S.A.R. | E-volve !

11 个月

Understanding the purpose behind SOC functions is key to unleashing their full potential. ??? #infosec Shahab Al Yamin Chawdhury

要查看或添加评论,请登录

Shahab Al Yamin Chawdhury的更多文章

  • CHAPTER-11: SOC Reference Architecture

    CHAPTER-11: SOC Reference Architecture

    TRY TO GRAB THE KNOWLEDGE OF FINDING AND STUDYING REFERENCE ARCHITECTURES AS MUCH AS POSSIBLE, THE PROVIDED RA LINKS…

    1 条评论
  • CHAPTER-10: INCIDENT RESPONSE

    CHAPTER-10: INCIDENT RESPONSE

    Your knowledge mapping is the first milestone a SOC can have who can describe clearly, what’s happened, how things got…

  • CHAPTER-9: Zero Trust Security

    CHAPTER-9: Zero Trust Security

    Notify each risk types with correlated data, the moment you have notified this, now it’s the server admin’s task to…

    2 条评论
  • CHAPTER-8: Setting up a SOC

    CHAPTER-8: Setting up a SOC

    So how do you fit into any of the SOC roles? How best to outline your JD/skills/activities which can be mapped to SOC…

  • CHAPTER-7: SOC Organogram

    CHAPTER-7: SOC Organogram

    Red must know how Blue is detecting Red’s evasive techniques, and Blue must know how Red is using which technique to…

  • CHAPTER-6: Processes for a SOC

    CHAPTER-6: Processes for a SOC

    Along came a spider, deeper mapping of ATT&CK frameworks on enterprise networks with matrix and KPI’s, always think of…

  • CHAPTER-5: Foundational Information Security Principles

    CHAPTER-5: Foundational Information Security Principles

    Models, frameworks, roadmaps, control requirements mapping is all about basic principles laid out by body of knowledge…

  • CHAPTER-3: SIEM & SOAR - Better Together

    CHAPTER-3: SIEM & SOAR - Better Together

    Understand the integrated functional requirements both for SIEM & SOAR so that majority of the event correlation is…

    2 条评论
  • CHAPTER-2: An Enterprise Architecture Strategy

    CHAPTER-2: An Enterprise Architecture Strategy

    You need to understand the pre-requisites prior entering into the security infrastructure operations The role of…

    1 条评论
  • Chapter-1: Overview of Deploying SOC

    Chapter-1: Overview of Deploying SOC

    Overview Pull yourself together for the first step, you will never know what’s out there for you if you don’t take the…

    1 条评论

社区洞察

其他会员也浏览了