SlideShare a Scribd company logo
1 of 41
Session ID:
Session Classification:
Ben Rothke, CISSP CISM
Wyndham Worldwide Corp.
Building a Security Operations Center
(SOC)
TECH-203
Advanced
About me…
 Ben Rothke, CISSP, CISM, CISA
 Manager - Information Security - Wyndham
Worldwide Corp.
 All content in this presentation reflect my views
exclusively and not that of Wyndham Worldwide
 Author - Computer Security: 20 Things Every
Employee Should Know (McGraw-Hill)
 Write the Security Reading Room blog
 https://365.rsaconference.com/blogs/securityreading
2
Agenda
 Introduction
 Need for a Security Operations Center (SOC)
 Components of an effective SOC
 Deciding to insource or outsource the SOC
 Outsourced SOC = MSSP
 SOC requirements
 Q/A
3
Building a Security
Operations Center
(SOC)
4
Current information security challenges
 Onslaught of security data from disparate
systems, platforms and applications
 numerous point solutions
(AV, firewalls, IDS/IPS, ERP, access
control, IdM, SSO, etc.)
 millions / billions of messages daily
 attacks becoming more frequent / sophisticated
 regulatory compliance issues place increasing
burden on systems and network administrators
5
Why do you need a SOC?
 because a firewall and IDS are not enough
 nucleus of all information security operations
 provides
 continuous prevention
 protection
 detection
 response capabilities against threats, remotely
exploitable vulnerabilities and real-time incidents on
your networks
 works with CIRT to create comprehensive
infrastructure for managing security operations
6
SOC benefits
 speed of response time
 malware can spread throughout the Internet in
minutes or even seconds, potentially knocking out
your network or slowing traffic to a crawl
 consequently, every second counts in identifying
these attacks and negating them before they can
cause damage
 ability to recover from a DDoS attack in a
reasonable amount of time
7
Integrated SOC
8
NIDS Network A/V
IBM
Mainframe
RAS
Web Applications
Mail
Firewall
Databases
Boundary Points/
Network Nodes
DMZ / External Facing Access Middleware / Directories Internal Resources
Security
Management
Network
Management
ManagedDevicesLayer
VPN Servers
Data Integration
Presentation
Layer
Data Acquisition Layer
Event Correlation Layer
(HTTP/S, SNMP, SMTP, Syslog, API, XML, Logfile, custom)
Routers
Compliance
Management
Internet
 Event Correlation Engine
 Analysis and Filtering
 Event Enrichment
 Workflow Automation
 Integration with other systems
EventCorrelationLayer
Ethical Hacking
Data
Security Event
Correlation
Intelligence
Services (ISAC)
System /
Network
Events
Problem
Management
Asset / Change
Management
Policy
Management
Reports
SOC functions
 Real-time monitoring / management
 aggregate logs
 aggregate data
 coordinate response and remediation
 Reporting
 executives
 auditors
 security staff
 Post-incident analysis
 forensics
 investigation
9
SOC planning
 full audit of existing procedures, including
informal and ad-hoc
 planning of location, resources, training
programs, etc.
 plans change; don’t try to prepare everything
ahead of time
 sometimes best approach is not clear until you have
actually started
 build it like aircraft carrier - change built into design
10
SIM/SIEM/SEM tools
 Many SOC benefits come from good SIM tool
 consolidates all data and analyzes it intelligently
 provides visualization into environment
 Choose SIM that’s flexible and agile, plus:
 track and escalate according to threat level
 priority determination
 real-time correlation
 cross-device correlation
 audit and compliance
11
Challenge of SIM & automation
 A well-configured SIM can automate much of the
SOC process. But…
 “The more advanced a control system is, so the
more crucial may be the contribution of the
human operator”
 Ironies of Automation - Lisanne Bainbridge
 discusses ways in which automation of industrial processes may
expand rather than eliminate problems with the human operator
 don’t get caught in the hype that a SIM can
replace good SOC analysts
 no secret that they can’t
12
Which SOC?
 Outsourced
 Symantec, SecureWorks
(Dell), Solutionary, WiPro, Tata, CenturyLink
(Savvis, Qwest), McAfee, Verizon (Cybertrust /
Ubizen), Orange, Integralis, Sprint, EDS, AT&T, Unisy
s, VeriSign, BT Managed Security Solutions
(Counterpane), NetCom Systems and more
 Centralized group within enterprise
 Corporate SOC
13
In-house SOC vs. outsourced MSSP
14
The Business Case for Managed Security Services Managed Security Services Providers vs. SIEM Product Solutions
http://www.solutionary.com/dms/solutionary/Files/whitepapers/MSSP_vs_SIEM.pdf
Define the SOC requirements
 define specific needs for the SOC within the
organization
 what specific tasks will be assigned to the SOC?
 detecting external attacks, compliance
monitoring, checking for insider abuse, incident
management, etc.
 who will use the data collected and analyzed by
the SOC?
 what are their requirements?
 who will own and manage the SOC?
 types of security events will be fed into the SOC
15
Internal SOC
16
Advantages Disadvantages
 dedicated staff
 knows environment better
than a third-party
 solutions are generally
easier to customize
 potential to be most
efficient
 most likely to notice
correlations between
internal groups
 logs stored locally
• larger up-front investment
• higher pressure to show
ROI quickly
• higher potential for
collusion between analyst
and attacker
• less likely to recognize
large-scale, subtle patterns
that include multiple groups
• can be hard to find
competent SOC analysts
Internal SOC - Questions
1. does your staff have the competencies (skills
and knowledge) to manage a SOC?
2. how do you plan to assess if they really do
have those competencies?
3. are you willing to take the time to document all
of the SOC processes and procedures?
4. who’s going to develop a training program?
5. who’s going to design the physical SOC site?
6. can you hire and maintain adequate staff
levels?
17
Internal SOC success factors
1. Trained staff
2. good SOC management
3. adequate budget
4. good processes
5. integration into incident response
 If your organization can’t commit to these five
factors, do not build an internal SOC – it will fail
 will waste money and time and create false sense of security
 if you need a SOC but can’t commit to these
factors, strongly consider outsourcing
18
Outsourced SOC
19
Advantages Disadvantages
 avoid capital expenses – it’s their
hardware & software
 exposure to multiple customers in
similar industry segment
 often cheaper than in-house
 less potential for collusion between
monitoring team and attacker
 good security people are difficult to
find
 unbiased
 potential to be very scalable &
flexible
 expertise in monitoring and SIM
tools
 SLA
• contractors will never know your
environment like internal employees
• sending jobs outside the
organization can lower morale
• lack of dedicated staff to a single
client
• lack of capital retention
• risk of external data mishandling
• log data not always archived
• log data stored off-premises
• lack of customization
• MSSP standardize services to gain
economies of scale in providing
security services to myriad clients
Outsourced SOC – general questions
1. Can I see your operations manual?
2. what is its reputation?
3. who are its customers?
4. does it already service customers in my
industry?
5. does it service customers my size?
6. how long have its customers been with it?
7. what is its cancellation/non-renew rate?
8. how do they protect data and what is the level
of security at their SOC?
20
Outsourced SOC – staffing questions
1. what is the experience of its staff?
2. does it hire reformed hackers?
3. are background checks performed on all new
employees?
4. does it use contractors for any of its services?
5. are personnel held to strict confidentiality agreements?
6. what is the ratio of senior engineers to managed
clients?
7. what certifications are held by senior/junior staff?
8. what is its employee turnover rate?
21
Outsourced SOC – stability questions
1. Is it stable?
2. does it have a viable business plan?
3. how long has it been in business?
4. positive signs of growth from major clients?
5. consistent large account wins / growing revenue?
6. what is its client turnover rate?
7. what are its revenue numbers?
 If private and unwilling to share this information, ask for
percentages rather than actual numbers
8. will it provide documentation on its internal security
policies and procedures?
22
Outsourced SOC - sizing / costs
 should provide services for less than in-house
solution
 can spread out investment in analysts,
hardware, software, facilities over several clients
 how many systems will be monitored?
 how much bandwidth is needed?
 potential tax savings
 Convert variable costs (in-house) to fixed costs
(services)
23
Outsourced SOC – performance metrics
 must provide client with an interface providing
detailed information
 services being delivered
 how their security posture relates to overall industry
trends
 provide multiple views into the organization
 various technical, management and executive
reports
 complete trouble ticket work logs and notes
24
Outsourced SOC – SLA’s
 well-defined SLA’s are critical
 processes and time periods within which they will
respond to any security need.
 SLA should include specific steps to be taken
 procedures the company takes to assure that the
same system intrusions do not happen again
 guarantee of protection against emerging threats
 recovers losses in the event service doesn’t deliver as
promised
 commitments for initial device deployment, incident
response/protection, requests for security policy &
configuration changes, acknowledgement of requests
25
Outsourced SOC - Transitioning
 ensure adequate knowledge transfer
 create formal service level performance metrics
 establish a baseline for all negotiated service levels
 measure from the baseline, track against it, adjusting
as necessary.
 create internal CIRT
 identify key events and plan the response
 hold regular transition & performance reviews
 be flexible
 schedule formal review to adjust SLA’s after 6 months
of service operation and periodically thereafter
26
Outsourced SOC – Termination
 all outsourcing contracts must anticipate the
eventual termination at the end of the contract
 plan for an orderly in-house transition or a
transition to another provider
 develop an exit strategy
 define key resources, assets and process
requirements for continued, effective delivery of the
services formerly provided by the outgoing provider
27
Outsourcing: don’t just trust - verify
 Call Saturday night 2AM
 Who’s answering? Do they sound competent?
 Reports
 Are they to your liking? Can they create complex
reports?
 Set off a few alarms
 Are they calling/alerting you in a timely manner?
 True process for real-time threat analysis?
 Or simply a glorified reporting portal that looks
impressive
28
Mike Rothman on MSSP
 We have no illusions about the amount of effort required to
get a security management platform up and running, or what it
takes to keep one current and useful.
 Many organizations have neither the time nor the resources to
implement technology to help automate some of these key
functions.
 So they are trapped on the hamster wheel of pain, reacting
without sufficient visibility, but without time to invest in gaining
that much-needed visibility into threats without diving deep
into raw log files.
 A suboptimal situation for sure, and one that usually triggers
discussions of managed services in the first place.
29
http://securosis.com/blog/managed-services-in-a-security-management-2.0-world November 2011
SOC analysts
 Good SOC analysts hard to find, hard to keep
 Have combination of technical knowledge and
technical aptitude
 hire experienced SOC analysts
 pay them well
 you get what you pay for
30
SOC analyst – skill sets
31
• O/S proficiency
• network protocols
• chain of custody issues
• ethics
• corporate policy
• services
• multiple hardware
platforms
• attacks
• directories
• routers/switches/firewall
• programming
• forensics
• databases
• IDS
• investigative processes
• applications
• and much more
SOC analyst - qualities
 extremely curious
 ability to find answers to difficult problems / situations
 abstract thinker
 can correlate IDS incidents and alerts in real-time
 ethical
 deals with low-level details while keeping big-
picture view of situation
 can communicate to various groups that have
very different requirements
 responds well to frustrating situations
32
SOC analyst burnout
 SOC analysts can burnout
 have a plan to address this
 extensive training
 bonuses
 promotions
 management opportunities
 job rotation
33
SOC management
 management and supervision of a SOC is a key
factor to ensure its efficiency
 while analysts, other staff, hardware and
software are key elements, a SOC’s ultimate
success is dependent on a competent SOC
manager.
 inadequate/poor management has significant
consequences
 from process performance decrements, to incidents
being missed or incorrectly handled
34
SOC processes and procedures
 SOC heavily process-driven
 processes work best when documented in
advance
 usability and workflow critical
 documentation
 adequate time must be given to properly document
many different SOC functions
 corporate networks and SOC are far too complex to
be supported in an ad-hoc manner
 documentation makes all the difference
35
Sample SOC runbook table of contents
36
SOC metrics
 measured by how quickly incidents are:
 identified
 addressed
 handled
 must be used judiciously
 don’t measure base performance of an analyst
simply on the number of events analyzed or
recommendations written
37
Additional references
38
Apply
39
Apply
 obtain management commitment to a SOC
 ensuring adequate staffing and budget
 define your SOC requirements
 decide to have SOC in-house or outsourced
 in-house – create detailed and customized processes
 outsourced – ensure their process meets your
requirements
 create process to ensure SOC is effective and
providing security benefits to the firm
40
Ben Rothke, CISSP CISM
Manager – Information Security
Wyndham Worldwide
Corporation
www.linkedin.com/in/benrothke
www.twitter.com/benrothke
www.slideshare.net/benrothke
41

More Related Content

What's hot

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfTapOffice
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat huntingVikas Jain
 
Security operation center
Security operation centerSecurity operation center
Security operation centerMuthuKumaran267
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 

What's hot (20)

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 

Similar to Rothke rsa 2012 building a security operations center (soc)

Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsyPrezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsyAzim191210
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystInfosecTrain
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integrationMichael Nickle
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016Sarah Bark
 
Communicating SOC Status
Communicating SOC StatusCommunicating SOC Status
Communicating SOC StatusAdam Alhafid
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalOscar Williams
 

Similar to Rothke rsa 2012 building a security operations center (soc) (20)

Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsyPrezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
 
SOC Models Comparison
SOC Models ComparisonSOC Models Comparison
SOC Models Comparison
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analyst
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
CA_Module_2.pdf
CA_Module_2.pdfCA_Module_2.pdf
CA_Module_2.pdf
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
 
Communicating SOC Status
Communicating SOC StatusCommunicating SOC Status
Communicating SOC Status
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
 

More from Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 

More from Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Rothke rsa 2012 building a security operations center (soc)

  • 1. Session ID: Session Classification: Ben Rothke, CISSP CISM Wyndham Worldwide Corp. Building a Security Operations Center (SOC) TECH-203 Advanced
  • 2. About me…  Ben Rothke, CISSP, CISM, CISA  Manager - Information Security - Wyndham Worldwide Corp.  All content in this presentation reflect my views exclusively and not that of Wyndham Worldwide  Author - Computer Security: 20 Things Every Employee Should Know (McGraw-Hill)  Write the Security Reading Room blog  https://365.rsaconference.com/blogs/securityreading 2
  • 3. Agenda  Introduction  Need for a Security Operations Center (SOC)  Components of an effective SOC  Deciding to insource or outsource the SOC  Outsourced SOC = MSSP  SOC requirements  Q/A 3
  • 5. Current information security challenges  Onslaught of security data from disparate systems, platforms and applications  numerous point solutions (AV, firewalls, IDS/IPS, ERP, access control, IdM, SSO, etc.)  millions / billions of messages daily  attacks becoming more frequent / sophisticated  regulatory compliance issues place increasing burden on systems and network administrators 5
  • 6. Why do you need a SOC?  because a firewall and IDS are not enough  nucleus of all information security operations  provides  continuous prevention  protection  detection  response capabilities against threats, remotely exploitable vulnerabilities and real-time incidents on your networks  works with CIRT to create comprehensive infrastructure for managing security operations 6
  • 7. SOC benefits  speed of response time  malware can spread throughout the Internet in minutes or even seconds, potentially knocking out your network or slowing traffic to a crawl  consequently, every second counts in identifying these attacks and negating them before they can cause damage  ability to recover from a DDoS attack in a reasonable amount of time 7
  • 8. Integrated SOC 8 NIDS Network A/V IBM Mainframe RAS Web Applications Mail Firewall Databases Boundary Points/ Network Nodes DMZ / External Facing Access Middleware / Directories Internal Resources Security Management Network Management ManagedDevicesLayer VPN Servers Data Integration Presentation Layer Data Acquisition Layer Event Correlation Layer (HTTP/S, SNMP, SMTP, Syslog, API, XML, Logfile, custom) Routers Compliance Management Internet  Event Correlation Engine  Analysis and Filtering  Event Enrichment  Workflow Automation  Integration with other systems EventCorrelationLayer Ethical Hacking Data Security Event Correlation Intelligence Services (ISAC) System / Network Events Problem Management Asset / Change Management Policy Management Reports
  • 9. SOC functions  Real-time monitoring / management  aggregate logs  aggregate data  coordinate response and remediation  Reporting  executives  auditors  security staff  Post-incident analysis  forensics  investigation 9
  • 10. SOC planning  full audit of existing procedures, including informal and ad-hoc  planning of location, resources, training programs, etc.  plans change; don’t try to prepare everything ahead of time  sometimes best approach is not clear until you have actually started  build it like aircraft carrier - change built into design 10
  • 11. SIM/SIEM/SEM tools  Many SOC benefits come from good SIM tool  consolidates all data and analyzes it intelligently  provides visualization into environment  Choose SIM that’s flexible and agile, plus:  track and escalate according to threat level  priority determination  real-time correlation  cross-device correlation  audit and compliance 11
  • 12. Challenge of SIM & automation  A well-configured SIM can automate much of the SOC process. But…  “The more advanced a control system is, so the more crucial may be the contribution of the human operator”  Ironies of Automation - Lisanne Bainbridge  discusses ways in which automation of industrial processes may expand rather than eliminate problems with the human operator  don’t get caught in the hype that a SIM can replace good SOC analysts  no secret that they can’t 12
  • 13. Which SOC?  Outsourced  Symantec, SecureWorks (Dell), Solutionary, WiPro, Tata, CenturyLink (Savvis, Qwest), McAfee, Verizon (Cybertrust / Ubizen), Orange, Integralis, Sprint, EDS, AT&T, Unisy s, VeriSign, BT Managed Security Solutions (Counterpane), NetCom Systems and more  Centralized group within enterprise  Corporate SOC 13
  • 14. In-house SOC vs. outsourced MSSP 14 The Business Case for Managed Security Services Managed Security Services Providers vs. SIEM Product Solutions http://www.solutionary.com/dms/solutionary/Files/whitepapers/MSSP_vs_SIEM.pdf
  • 15. Define the SOC requirements  define specific needs for the SOC within the organization  what specific tasks will be assigned to the SOC?  detecting external attacks, compliance monitoring, checking for insider abuse, incident management, etc.  who will use the data collected and analyzed by the SOC?  what are their requirements?  who will own and manage the SOC?  types of security events will be fed into the SOC 15
  • 16. Internal SOC 16 Advantages Disadvantages  dedicated staff  knows environment better than a third-party  solutions are generally easier to customize  potential to be most efficient  most likely to notice correlations between internal groups  logs stored locally • larger up-front investment • higher pressure to show ROI quickly • higher potential for collusion between analyst and attacker • less likely to recognize large-scale, subtle patterns that include multiple groups • can be hard to find competent SOC analysts
  • 17. Internal SOC - Questions 1. does your staff have the competencies (skills and knowledge) to manage a SOC? 2. how do you plan to assess if they really do have those competencies? 3. are you willing to take the time to document all of the SOC processes and procedures? 4. who’s going to develop a training program? 5. who’s going to design the physical SOC site? 6. can you hire and maintain adequate staff levels? 17
  • 18. Internal SOC success factors 1. Trained staff 2. good SOC management 3. adequate budget 4. good processes 5. integration into incident response  If your organization can’t commit to these five factors, do not build an internal SOC – it will fail  will waste money and time and create false sense of security  if you need a SOC but can’t commit to these factors, strongly consider outsourcing 18
  • 19. Outsourced SOC 19 Advantages Disadvantages  avoid capital expenses – it’s their hardware & software  exposure to multiple customers in similar industry segment  often cheaper than in-house  less potential for collusion between monitoring team and attacker  good security people are difficult to find  unbiased  potential to be very scalable & flexible  expertise in monitoring and SIM tools  SLA • contractors will never know your environment like internal employees • sending jobs outside the organization can lower morale • lack of dedicated staff to a single client • lack of capital retention • risk of external data mishandling • log data not always archived • log data stored off-premises • lack of customization • MSSP standardize services to gain economies of scale in providing security services to myriad clients
  • 20. Outsourced SOC – general questions 1. Can I see your operations manual? 2. what is its reputation? 3. who are its customers? 4. does it already service customers in my industry? 5. does it service customers my size? 6. how long have its customers been with it? 7. what is its cancellation/non-renew rate? 8. how do they protect data and what is the level of security at their SOC? 20
  • 21. Outsourced SOC – staffing questions 1. what is the experience of its staff? 2. does it hire reformed hackers? 3. are background checks performed on all new employees? 4. does it use contractors for any of its services? 5. are personnel held to strict confidentiality agreements? 6. what is the ratio of senior engineers to managed clients? 7. what certifications are held by senior/junior staff? 8. what is its employee turnover rate? 21
  • 22. Outsourced SOC – stability questions 1. Is it stable? 2. does it have a viable business plan? 3. how long has it been in business? 4. positive signs of growth from major clients? 5. consistent large account wins / growing revenue? 6. what is its client turnover rate? 7. what are its revenue numbers?  If private and unwilling to share this information, ask for percentages rather than actual numbers 8. will it provide documentation on its internal security policies and procedures? 22
  • 23. Outsourced SOC - sizing / costs  should provide services for less than in-house solution  can spread out investment in analysts, hardware, software, facilities over several clients  how many systems will be monitored?  how much bandwidth is needed?  potential tax savings  Convert variable costs (in-house) to fixed costs (services) 23
  • 24. Outsourced SOC – performance metrics  must provide client with an interface providing detailed information  services being delivered  how their security posture relates to overall industry trends  provide multiple views into the organization  various technical, management and executive reports  complete trouble ticket work logs and notes 24
  • 25. Outsourced SOC – SLA’s  well-defined SLA’s are critical  processes and time periods within which they will respond to any security need.  SLA should include specific steps to be taken  procedures the company takes to assure that the same system intrusions do not happen again  guarantee of protection against emerging threats  recovers losses in the event service doesn’t deliver as promised  commitments for initial device deployment, incident response/protection, requests for security policy & configuration changes, acknowledgement of requests 25
  • 26. Outsourced SOC - Transitioning  ensure adequate knowledge transfer  create formal service level performance metrics  establish a baseline for all negotiated service levels  measure from the baseline, track against it, adjusting as necessary.  create internal CIRT  identify key events and plan the response  hold regular transition & performance reviews  be flexible  schedule formal review to adjust SLA’s after 6 months of service operation and periodically thereafter 26
  • 27. Outsourced SOC – Termination  all outsourcing contracts must anticipate the eventual termination at the end of the contract  plan for an orderly in-house transition or a transition to another provider  develop an exit strategy  define key resources, assets and process requirements for continued, effective delivery of the services formerly provided by the outgoing provider 27
  • 28. Outsourcing: don’t just trust - verify  Call Saturday night 2AM  Who’s answering? Do they sound competent?  Reports  Are they to your liking? Can they create complex reports?  Set off a few alarms  Are they calling/alerting you in a timely manner?  True process for real-time threat analysis?  Or simply a glorified reporting portal that looks impressive 28
  • 29. Mike Rothman on MSSP  We have no illusions about the amount of effort required to get a security management platform up and running, or what it takes to keep one current and useful.  Many organizations have neither the time nor the resources to implement technology to help automate some of these key functions.  So they are trapped on the hamster wheel of pain, reacting without sufficient visibility, but without time to invest in gaining that much-needed visibility into threats without diving deep into raw log files.  A suboptimal situation for sure, and one that usually triggers discussions of managed services in the first place. 29 http://securosis.com/blog/managed-services-in-a-security-management-2.0-world November 2011
  • 30. SOC analysts  Good SOC analysts hard to find, hard to keep  Have combination of technical knowledge and technical aptitude  hire experienced SOC analysts  pay them well  you get what you pay for 30
  • 31. SOC analyst – skill sets 31 • O/S proficiency • network protocols • chain of custody issues • ethics • corporate policy • services • multiple hardware platforms • attacks • directories • routers/switches/firewall • programming • forensics • databases • IDS • investigative processes • applications • and much more
  • 32. SOC analyst - qualities  extremely curious  ability to find answers to difficult problems / situations  abstract thinker  can correlate IDS incidents and alerts in real-time  ethical  deals with low-level details while keeping big- picture view of situation  can communicate to various groups that have very different requirements  responds well to frustrating situations 32
  • 33. SOC analyst burnout  SOC analysts can burnout  have a plan to address this  extensive training  bonuses  promotions  management opportunities  job rotation 33
  • 34. SOC management  management and supervision of a SOC is a key factor to ensure its efficiency  while analysts, other staff, hardware and software are key elements, a SOC’s ultimate success is dependent on a competent SOC manager.  inadequate/poor management has significant consequences  from process performance decrements, to incidents being missed or incorrectly handled 34
  • 35. SOC processes and procedures  SOC heavily process-driven  processes work best when documented in advance  usability and workflow critical  documentation  adequate time must be given to properly document many different SOC functions  corporate networks and SOC are far too complex to be supported in an ad-hoc manner  documentation makes all the difference 35
  • 36. Sample SOC runbook table of contents 36
  • 37. SOC metrics  measured by how quickly incidents are:  identified  addressed  handled  must be used judiciously  don’t measure base performance of an analyst simply on the number of events analyzed or recommendations written 37
  • 40. Apply  obtain management commitment to a SOC  ensuring adequate staffing and budget  define your SOC requirements  decide to have SOC in-house or outsourced  in-house – create detailed and customized processes  outsourced – ensure their process meets your requirements  create process to ensure SOC is effective and providing security benefits to the firm 40
  • 41. Ben Rothke, CISSP CISM Manager – Information Security Wyndham Worldwide Corporation www.linkedin.com/in/benrothke www.twitter.com/benrothke www.slideshare.net/benrothke 41