visit
"No matter how strong a defense, a stronger offense will always shatter it.”are those practices and teams that are devoted to preventing, detecting, assessing, monitoring, and responding to cybersecurity threats and incidents.
— Byakuya Kuchiki
"A security operations center (SOC) can be defined both as a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance."
— Gartner
The main purpose of an SOC (Security Operations Center) is to ensure the proper monitoring of infrastructure in the cyber park. Firms need a reliable team who can keep their security perimeter regularly updated against new and evolving threats around the clock. Through a well-configured SOC, the company can ensure business continuity and anticipate potential risks and incidents. Information security is a process that moves through phases building and strengthening itself along the way. The point is, security is a journey, not a destination.
Fundamentally, it boils down to two things: defend the organization and find the anomaly. Different teams work together to figure out the evil and once the investigation is completed, a report is prepared and the necessary actions are initiated. Analysts work in shifts 24*7*365 in SOC environment to support the clients and their infrastructure.
Generally, an analyst will be monitoring the client infrastructure for malicious activity. In simple terms, an analyst will be sitting around having a cup of coffee waiting for alerts on the dashboard. Once an alert is triggered, the analyst triages it and starts the investigation process.
The Next-Gen SOC are adopting a much more proactive role and engage in threat hunts based on the changing trends in the cyber world. Emerging technologies like AI and Big Data have enabled the SOC to perform better using insights from past data to predict the trends.
The job requires great attention to detail and general awareness for all things cyber. Analysts are expected to be updated on changing cyber trends. A piece of basic knowledge in areas like networking, malware analysis, incident response, and cyber etiquette is the bare minimum required out of a SOC Analyst. Efficient management of SOC is a key factor for its success. Analysts, Hardware, and Software are also key elements, but the ultimate success of SOC is based on the skills of its manager. Weak or inefficient management can have disastrous consequences in terms of performance, neglected incidents, or improperly followed processes.
One of the key success factors of a SOC is the implementation of a good monitoring strategy. To ensure decent management it is obligatory to define the perimeter, technical architecture, processes of monitoring and maintenance, rules of the SOCs, points of contacts, all based on observation and the type of engagement.
Working in SOC is like riding a bike. Except the Bike is on Fire. You are on Fire. And Everything is on Fire.
A SOC is not as simple as installing a SIEM (Security Information and Event Management) and lay back hoping the tools will defend the organization.The human factor is the most crucial aspect of security operations. Organizations must ensure that their analysts are focusing on the right data and have an understanding of what’s good and bad.One of the primary directives of a SOC team is to identify and defend the perimeter. To do so the analysts need to look into the logs. Now the question is, what and where to look for them?The SOC team should consider looking into Network traffic (HTTP, SSL, DNS, DHCP, SNMP, FTP, SSH etc), Web proxy, VPN, External-facing firewall, AD, IDS, IPS. Also logs from the Host machine, AV, File hashes, Registry Modifications, Process Tree, Executing Directory, Outbound DNS queries and other Syslogs. Threat Intelligence feeds, Vulnerability information and disclosures will simplify the needle in haystack process.
The reference model for infosec is preserving the CIA triad (protecting Confidentiality, ensuring Integrity, maintaining Availability). But when it comes to blue teaming foundations, I prefer going forward with (Prevention, Detection, and Response).
Proper planning before an incident will greatly reduce the risks of an attack and greatly increase the capabilities of timely and effective detection and response if an attack occurs.A rule of thumb in cyber: More the data easier the detection.Reducing the amount of incoming data negatively impacts analysts’ ability to detect incidents and minimize false positives. Furthermore, more sophisticated attacks usually require more context to successfully pinpoint and co-relate events.Configuration management and maintenance of appliances are crucial because if not properly optimized, data sources might induce management difficulties. Using fewer sources can simplify the management of this data but also reduces the SOC’s detection capabilities. The security leaders overseeing the SOC must also have a thorough understanding of the working of SOC.
One of the most important things in cyber is Asking Questions. It’s vital that you ask questions and I believe there are no stupid questions whatsoever in cyber. The ability to weave a hypothesis and the confidence to make decisions based on what’s good and bad will be the deciding factor in your cyber career.
SOC is a decent place to start a Cybersecurity career. You can move up or keep the regime of the SOC. It just depends on whether you want to be a specialist or a generalist. There are many roles to choose from like Security Analyst, Security Engineer, SOC Manager, Security Researcher, Threat Hunter to CISO (Chief Information Security Officer).
Many folks getting into infosec are thrilled at the idea of things like threat-hunting and incident response (pinnacle of the pyramid). Adversary simulation and threat-hunting sound a whole lot cooler than excel creation and alert triage. The essence of blue teaming can be understood only if you start from the bottom and slowly move up. What use is spending your time hunting for APTs when you have vulnerable endpoints and unpatched systems waiting to be hacked?
It’s easy to get excited about jumping into the user-behaviour analytics tool or SOAR (Security Orchestration, Automation, and Response), but remember that the most important thing is establishing the basics. Always remember that infosec is a process, not a product. The people and processes on your blue team are as equally important as the technologies you put in place.
Can you fight a hacker with an SIEM?
Security Information Event Management (SIEM), are essential solutions for the successful implementation of a SOC. SIEM allow collection, aggregation, standardization, correlation, reporting, archiving, and replay events. SIEM with EDR and NDR solutions are part of a defense mechanism and not a pro-active offensive solution.I am a big fan of GIFs and I believe visuals convey more than words. Here’s one of my favourite GIFs that absolutely relates to SOC.The best part of being a SOC Analyst is getting to see a variety of events and having fun investigating them. Put simply, struggling day in and out while banging heads against the monitor.
Previously published .