CHAPTER-8: Setting up a SOC
Shahab Al Yamin Chawdhury
Cybersecurity Consultant | Enterprise Architect | Mentor by Life
So how do you fit into any of the SOC roles? How best to outline your JD/skills/activities which can be mapped to SOC matrix? SOC operation relies on the effectiveness of your roles and responsibilities. Architecting, Integration is not the whole story, OPERATIONALIZE the SOC with your skills, not WEAPONIZING it.
Since we have discussed the requirements of developing a SOC including the standards, frameworks, enterprise architecture, attack surface management, models, processes, organogram and those were in context as required to understand the pre-requisites for developing a SOC. This is not the end of the discussion and as we progress and deep dive into the abyss, I will guide you with the right context every time its required from a different perspective.
This calls for a stakeholder engagement for you which involves several steps:
1.????? Identify Your Objectives and Capabilities: Understand your business objectives and the capabilities of your organization.?This will help you focus your SOC project and control costs.
2.????? Develop Your SOC Strategy: Define the scope of your SOC, including the types of threats you need to protect against and the assets you need to protect.
3.????? Design Your SOC Solution: This includes deciding whether to have an in-house SOC, outsource it, or use a hybrid model.?You also need to decide on the size of your team and the skills they need.
4.????? Create Processes, Procedures, and Training: Develop standard operating procedures for your SOC team.?This includes processes for incident response, threat hunting, and reporting.
5.????? Prepare Your Environment: This involves setting up the physical or virtual space for your SOC.?You also need to ensure you have the necessary hardware and software.
6.????? Implement Your Solution: Deploy the technologies you’ve chosen for your SOC.?This includes security information and event management (SIEM) systems, intrusion detection systems (IDS), and other security tools.
7.????? Deploy End-to-End Use Cases: Start deploying a few use cases that focus on end-to-end threat detection and response.
8.????? Maintain and Evolve Your Solution: Cyber threats are constantly evolving, so your SOC needs to evolve too.?Regularly review and update your processes, train your team on new threats, and update your tools.
Remember, building a SOC is a major undertaking that requires careful planning and coordination of people, processes, and technologies (PPT, always comes down to PPT).?It’s well worth it when configured properly to provide adequate security for your enterprise.
How a Security Operations Center (SOC) Works in Practice
Source: What is a Security Operations Center (SOC)? (Ultimate Guide) - SOCRadar? Cyber Intelligence Inc.
1.????? Proactive Monitoring: The SOC team gathers information from various resources, including threat intelligence feeds and log files from systems all around the enterprise.?They carefully monitor the company’s assets, from on-premises servers in data centers to cloud resources.?Accurate monitoring is critical.
2.????? Incident Response and Recovery: When a potential threat is detected, the SOC coordinates the organization’s ability to take the necessary steps to mitigate damage and communicate properly to keep the organization running after an incident.?For example, recovery can include activities such as handling acute malware or ransomware incidents.
3.????? Remediation Activities: SOC team members provide data-driven analysis that helps an organization address vulnerability and adjust security monitoring and alerting tools.?For example, using information obtained from log files and other sources, a SOC member can recommend a better network segmentation strategy or a better system patching regimen.
4.????? Compliance: The SOC helps ensure that the organization is compliant with important security standards and best practices.?This includes conformity to a security policy, as well as external security standards, such as ISO 27001x, the NIST Cybersecurity Framework (CSF), and the General Data Protection Regulation (GDPR).
5.????? Coordination and Context: A SOC team member helps an organization coordinate disparate elements and services and provide visualized, useful information.?Part of this coordination is the ability to provide a helpful, useful set of narratives for activities on the network.
In addition to the above-mentioned points, the SOC performs preventative maintenance such as applying software patches and upgrades, and continually updating firewalls, whitelists and blacklists, and security policies and procedures.
This is a broad example and the specific workings can and may vary based on the organization’s needs and resource requirements.
Functions of the Sigma Rules in SOC
Sigma rules are textual signatures written in YAML (Yet Another Markup Language)?that are used in Security Operation Centers (SOCs) to detect anomalies and identify suspicious activity in log events. Here are some of their key functions:
Sigma rules standardize detection rule formats across all SIEM?and log management platforms, enabling more effective collaboration among security analysts.?They also provide flexibility, allowing companies to evolve their cybersecurity technology stack in a way that makes sense for them.
Released by?Florian Roth?in 2017, Sigma (The Generic Signature Format for SIEM?Systems) has paved the way for platform-agnostic search. With Sigma, defenders can harness the community's power to react promptly to critical threats and new adversary tradecraft. You get a fixed-language specification for the generic rule format, a tool for converting Sigma rules into various query formats and a repository of over one thousand rules for several attack techniques.
Like YARA, or Snort Rules, Sigma is a tool for the open sharing and crowdsourcing of threat intelligence, it focuses on SIEM?instead of files or network traffic. What Snort is to network traffic, and YARA is to files, Sigma is to logs.
Most attacks on IT systems and networks manifest themselves in event logs stored in the SIEM?systems or other log storage and analysis solutions. This makes SIEM?a crucial tool to detect and alert against intruders. SIEM?detection rulesets existed in the vendor or platform-specific databases in the earlier days. The growing demand for up-to-date detections and analytics to be secure today requires sharing detection intelligence between different stakeholders and vendors. Sigma solves this challenge to make the queries and rulesets platform-agnostic.
Sigma Allows Defenders to Share Detections in a Common Language
Sigma satisfies various use cases:
·??????? Sigma has become an agnostic way of sharing detections between Researchers and Intelligence who identify new adversary behaviors.
·??????? Security teams can avoid vendor-lock-in, i.e. by defining rules in Sigma; we can more easily move between platforms.
·??????? Sigma can be utilized to crowdsource detection methods and make them usable instantly for everyone.
·??????? Using Sigma to share the signature with other threat intel communities.
Sigma rules can be converted into a search query specific to your SIEM?solution and supports various solutions:
·??????? Splunk
·??????? ElasticSearch Query Strings and DSL
·??????? Kibana
·??????? Microsoft Defender Advanced Threat Protection (MDATP)
·??????? Azure Sentinel
·??????? IBM QRadar
·??????? LogPoint
·??????? Qualys
·??????? RSA NetWitness
·??????? LimaCharlie
·??????? ArcSight
·??????? PowerShell and Grep
EQL Analytics Library
eqllib?is a library of event based analytics, written in?EQL?(Event Query Language)?to detect adversary behaviors identified in MITRE?ATT&CK?.
SOC Capabilities Matrix – Gartner
May now you can see that the garner’s capability matrix is what we have addressed throughout the book. Interestingly, they have “Data Science Model” included, but not AI.
SOC Roles & Responsibilities
Source: Next-Gen SOC - CyRadar
SOC analysts?are organized into four tiers. First, SIEM?alerts flow to?Tier 1 analysts?who monitor, prioritize, and investigate them. Real threats are passed to a?Tier 2 analyst?with deeper security experience, who conducts further analysis and decides on a strategy for containment.?
Critical breaches are moved up to a?Tier 3?senior analyst, who manages the incident and is responsible for actively hunting for threats continuously. The?Tier 4?analyst is the SOC manager, responsible for recruitment, strategy, priorities, and the direct management of SOC staff when major security incidents occur.?
The table below explains each SOC role in more detail.
Note: Please download the pdf for the fully extended table
A Cyber Security Analyst Maturity Curve
CMMC Maturity Model 2.0
The CMMC levels and associated sets of practices across domains are cumulative. More specifically, for an organization to achieve a specific CMMC level, it must also demonstrate achievement of the preceding lower levels. For the case in which an organization does not meet its targeted level, it will be certified at the highest level for which it has achieved all applicable practices.
Full documentation can be downloaded from this link: CMMC Documentation (defense.gov)
Deriving Your Job Description or Resume
Here is a git repo for you to find out how the cybersecurity JD’s are formulated: GitHub - rezaduty/cybersecurity-career-path: Cybersecurity Career Path
And here is another one to map your career which is supported and designed by SFIA v8.0 which is mapped to their KB requirements (this is particularly developed for Australian technology people):
Security Triage in Cybersecurity
Triage is a critical incident response process that allows security teams to sort through a torrent of alerts and potential threats to identify the most pressing issues. It involves immediately analyzing and prioritizing security events based on severity so that resources can be allocated accordingly.
The purpose of cybersecurity triage is to speed up the response to detected or actively unfolding IT incidents. Triage enables security analysts to jump on the most dangerous threats right away before they get out of control.
Analysts can initiate containment and mitigation steps on severe incidents while addressing less serious issues to the back of the queue for later handling.
Importance of Triage in Incident Response
Triage is essential for managing the overflow of security alerts faced by modern SOCs. Without triage, analysts could easily become overwhelmed and fail to identify and escalate critical incidents quickly enough. Triage allows them to cut through the noise faster and efficiently.
Security Triage Analysis Process
When a security alert or event comes in, the triage process kicks off with some initial detection and validation steps. Analysts will look to confirm whether a real incident has taken place or if an alert is just a false positive. Here are the triage analysis process steps:
???????? Detection – Validate security alert or event as a real incident vs. false positive
???????? Scoping – Quickly investigate incident to surface attack details, affected assets, related indicators, etc.
???????? Severity Classification – Assign severity level (low/medium/high) based on potential impact and damage.
???????? Escalation – Report the incident to appropriate parties based on the severity threshold.
???????? Containment – Initiate containment of high/critical incidents to isolate and limit damage.
???????? Queuing – Add lower severity incidents to the queue for future response based on resources.
???????? Eradication – For severe events, execute steps to eliminate threats from the environment.
领英推荐
???????? Recovery – For severe events, start restoration of impacted systems and data
???????? Circle Back – Continuously analyze and Triage new security alerts as they come in.
DevSecOps At A Glance
Since the folks who would be responsible for operationalizing the SOC as a whole, are the people often misunderstood for their role, its time that’s changed. Their deployments are the SOC outcome, and these folks are integrating every component what makes a SOC. In most cases, they are experts in integration on both Windows and Linux platforms, write the queries and perfected it over time, and provides actionable outcomes to the analysts, or they gradually train the analysts on how to efficiently do these tasks and activities.
SecOps consists of six elements including: Business (goals and outcomes) People (who will perform the work) Interfaces (external functions to help achieve goals) Visibility (information needed to accomplish goals) Technology (capabilities needed to provide visibility and enable people) Processes (tactical steps needed to execute on goals).
Security Operations Center processes used to be completely isolated from other parts of the organization. Developers would build systems, IT operations would run them, and security were responsible for securing them. Today it is understood that joining these three functions into one organization—with joint responsibility over security—can improve security and create major operational efficiencies.
Application security is a reactive process after deployment, where DevSecOps is proactive and controls security before deployments. The team is responsible for notifying security operations of any potential false positives and then making the appropriate exceptions so they are not inundated with false positive alerts when the application is launched. DevSecOps also notifies security operations of any data loss prevention (DLP) concerns.
When new vulnerabilities are found, application security (AppSec) validates that systems are updated and patched. Otherwise, the security team is notified that changes are required, and SecOps will need to be notified of vulnerabilities and IoCs in order to monitor systems.
Application security teams communicate frequently with the content engineering team to create new alerts, advise threat intelligence of new IoCs and gather feedback from the threat hunting team about hunts conducted on new use cases.
The Transition from a Siloed SOC to DevSecOps
Key Components of a DevSecOps Approach
Lastly, the DevOps and the SecOps both performs overlapping functions, and usually they are combined in a form to perform as a DevSecFinOps, and these personnel are the ones who are supporting and keeping the SOC infrastructure alive.
Functions of a SOC Analyst (L1, L2, L3)
?Security Operations Center (SOC) analysts play a crucial role in maintaining an organization’s cybersecurity. Here are some of their key responsibilities:
1.????? Monitoring and Protecting: SOC analysts monitor and protect the organization’s assets, including personnel data, brand integrity, intellectual property, and operation systems.
2.????? Triage Specialist (Tier 1 Analyst): Tier 1 analysts collect raw data, review alarms and alerts, confirm or adjust the criticality of alerts, and enrich them with relevant data.?They also manage and configure the monitoring tools.
3.????? Incident Responder (Tier 2 Analyst): Tier 2 analysts review higher-priority security incidents escalated by Tier 1 analysts and perform a more in-depth assessment using threat intelligence.?They design and implement strategies to contain and recover from an incident.
4.????? Threat Hunter (Tier 3 Analyst): Tier 3 analysts handle major incidents escalated by Tier 2 analysts.?They proactively identify possible threats, security gaps, and vulnerabilities.
5.????? Collaboration: SOC analysts work with other departments of the company, such as human resources or sales, to ensure that their systems are secure.
6.????? Tool Management: SOC analysts use various tools to monitor and analyze network traffic.?They monitor firewall, email, web, and DNS logs to identify and mitigate intrusion attempts.
7.????? Reporting: SOC analysts are responsible for documenting cyber incidents and implementing incident response plans.
These roles and responsibilities may vary depending on the organization’s size, industry, and cybersecurity maturity.
Functions of a Triage Specialist (Tier 1 Analyst), in a SOC
A Triage Specialist, also known as a Tier 1 Analyst, in a Security Operations Center (SOC) has several key responsibilities:
Source: An introduction to SOC (Security Operation Center) | PPT (slideshare.net) by Ahmad Haghighi
Some of the components that a SOC has visibility and alerts on
These responsibilities are crucial for maintaining the security posture of an organization.?They provide the first line of defense against cyber threats.
Functions of an Incident Responder (Tier 2 Analyst), in a SOC
Tier 2 Analyst in a SOC is an Incident Responder, also known as a Tier 2 Analyst, in a Security Operations Center (SOC) has several key responsibilities:
These responsibilities are crucial for maintaining the security posture of an organization.?They provide the second line of defense against cyber threats.
Functions of A Threat Hunter (Tier 3 Analyst) in a SOC
In a Security Operations Center (SOC) has several key responsibilities:
These responsibilities are crucial for maintaining the security posture of an organization.?They provide the third line of defense against cyber threats.
Functions of a Cyber Threat Intelligence Manager
Cyber Threat Intelligence (CTI) Manager plays a crucial role in an organization’s cybersecurity framework. Here are some of their key responsibilities:
Planning: They plan the collection, processing, analysis, and dissemination of information about threats against applications, systems, or industries.
These responsibilities help organizations avoid financial losses and reputational damages due to data breaches.?They also enable organizations to cut down unnecessary costs.
Functions of a ‘SOC Manager’ in a SOC
A SOC (Security Operations Center) Manager plays a crucial role in an organization’s cybersecurity framework. Here are some of their key responsibilities:
These responsibilities help organizations avoid financial losses and reputational damage due to data breaches.?They also enable organizations to cut down unnecessary costs.
Functions of a Security Architect in a SOC
A Security Architect in a Security Operations Center (SOC) plays a crucial role in maintaining an organization’s cybersecurity. Here are some of their key responsibilities:
Source: Microsoft Cybersecurity Reference Architectures (MCRA) - Security documentation | Microsoft Learn
These responsibilities help organizations avoid financial losses and reputational damage due to data breaches.?They also enable organizations to cut down unnecessary costs.
______________________________________________________________________________________
?? FREE eBook - 476 Pages
?? Complete Guide to Cyber Security Operation Center??
I’ve recently completed a book on SOC, a project close to my heart, that delves into the exciting realm of Security Automation, Orchestration, and Hyper-automation platforms in the SOC. If you’ve ever found yourself overwhelmed by the multitude of cybersecurity solutions, this post is designed to be your personal guide on developing a fully functional SOC.
This eBook comes with plenty of examples and illustrations to help you understand complex concepts, data collection requirements to incident response, automations, playbooks, integrations requirements under the scope of IT, IS and Cybersecurity.
A big shout out to Brad Voris for his review of the book, his insights made this book even richer.
Knowledge Areas Covered
? Enterprise architecture strategy to better formulate your SOC.
? Visibility & data ingress requirements for your SOC
? SOC functions, KPI’s, processes, frameworks, and automation requirements
? Derive your Analyst-JD aligned to international frameworks
? SOC organogram with Red, Blue, Purple team’s maturity, tactics, functions, activities
? SIEM & SOAR architecture design guidelines to achieve more from these integrations.
? Detection engineering with OSINT, CTEM.
? Incident response with CSIRT, DFIR.
? Tabletop exercises explained and operationalized
? Artificial Intelligence & Data Science in SOC
? How to develop your Open-source based SOC, full hardware BoQ, Network Design is provided
? Bonus Chapters: IT Project Management, VA/PT Plan, ITIL Strategy Frameworks, Jurisdiction Assignment Matrix etc.
?? Download the eBook
?? Download this eBook (pdf): https://lnkd.in/gTRnhmPp
?? DM me for the DOCX version of the book.
?? Join Discord: Please DM me on LinkedIn, I will Send you the link to join.
?? 1000+ Job aids – download extra documentation.
?? 60 Body of Knowledge (BoK) links.
?? 1500+ curated list of VA/PT tools as job aids.
?? 200+ References to support your SOC operations even further.
?? Download all the available documents from here: https://lnkd.in/eNNUm9XW
?? Download Job Aids: https://lnkd.in/gCKq6R-D
If you find it useful and informative, please share/repost the book with your network.