SlideShare a Scribd company logo
1 of 9
SOC
(SECURITY OPERATION CENTER)
BY
MUKESH CHAUDHARI
The current environment is putting
new demands on security operations
Why do we build operational security
controls & capabilities?
Reduce enterprise risk.
Protect the business.
Move from reactive response
to proactive mitigation.
Increase visibility over the
environment.
Meet compliance/regulatory
requirements
What is a Security Operations Centeror
(SOC)
• A Security Operations Center is a highly skilled team following defined definitions and
processes to manage threats and reduce security risk
• Security Operations Centers (SOC) are designed to:
– protect mission-critical data and assets
– prepare for and respond to cyber emergencies
– help provide continuity and efficient recovery
– fortify the business infrastructure
• The SOC’s major responsibilities are:
– Monitor, Analyze, Correlate & Escalate Intrusion Events
– Develop Appropriate Responses; Protect, Detect, Respond
– Conduct Incident Management and Forensic Investigation
– Maintain Security Community Relationships
– Assist in Crisis Operations
Security operations centers must be responsive to the
evolving threats and provide management the
information and control that it needs
The SOC ….
• Must demonstrate compliance with regulations
• Protect intellectual property and ensure privacy properly
• Manage security operations effectively and efficiently
• Provide real-time insight into the current security posture
of your organization
• Provide security intelligence and the impact of threats on
the organization
• Enable your organization to know who did what, when -
and prove it (evidence)
Building a Security Operations Center involves multiple
domains
• People
• Do you need
24x7x365 staff?
• What are the skills
needed?
• Where do you get
staff?
• What about
training?
• How do you keep
staff?
• Metrics to measure
performance
• Capacity planning
• Technology
• SIEM architecture &
use cases
• Log types and
logging options
• Platform
integrations;
ticketing
governance, big data
• Web services to
integrate them
• Technology should
improve
effectiveness and
efficiency
• Process
• What does the plan
look like?
• How do we measure
progress and goals?
• What is the optimal
design of core
processes? (eg.
incident
management,
tuning, etc.)
• Process and
continual
improvement
• Governance /
Metrics
• Dashboard visibility
and oversight
• Policy, measurement
and enforcement
• Integrated
governance that
balances daily
operations with
strategic planning
• Ministry objectives
• Informing
stakeholders
• Informing
employees
Effective SOC has the right balance of People, Process
and Technology components
Sample Job Description
• Responsibilities
• Monitoring of security events received through alerts from
SIEM or other security tools
• Review alerts escalated by end users
• Handel end user and security services consumer initiated
incidents and initiating trouble tickets – Sev 4 tickets
• Performing Level 1 triage of incoming issues ( initial assessing
the priority of the event, initial determination of incident to
determine risk and damage or appropriate routing of security
or privacy data request)
• Monitoring of alert and downstream dependencies health
(logger, client agents, etc)
• Responsible for troubleshooting agents and logs required for
reporting when not reporting to alerting systems
• Intake intelligence actions from Intelligence teams and ticket
for appropriate operators for tool policy or tool setting tuning
• Provide limited incident response to end users for low
complexity security incidents
• Notifying appropriate contact for security events and
response
• Takes an active part in the resolution of incidents, even after
they are escalated
• Work assigned ticket queue
• Understanding and exceeding all tasked SLA commitments
• Track and report on closure of tickets per SLAs
• Escalating issues to Tier II or management when necessary
• Provide daily and weekly metrics for security and
vulnerability incidents
• 24/7 Shift work required
• Experience and Skills
• Process and Procedure adherence
• General network knowledge, TCP/IP Troubleshooting
• Ability to trace down an endpoint on the network based on
ticket information
• Familiarity with system log information and what it means
• Understanding of common network services (web, mail, DNS,
authentication)
• Knowledge of host based firewalls, Anti-Malware, HIDS
• General Desktop OS and Server OS knowledge
• TCP/IP, Internet Routing, UNIX & Windows NT
• Strong analytical and problem
• Training
• Required: Security Essentials – SEC401 (optional GSEC
certification)
• Computer Forensic Investigation – Windows In-Depth -
FOR408
• Recommended: Security Incident Handling and Forensic -
FOR 508
THANK YOU

More Related Content

What's hot

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 

What's hot (20)

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 

Similar to Soc

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
Muhammad Mudassar
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
Priyank Hada
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
Priyank Hada
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
Matthew Rosenquist
 

Similar to Soc (20)

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
Mash f43
Mash f43Mash f43
Mash f43
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
What Skills Does A Cybersecurity Analyst Need.pdf
What Skills Does A Cybersecurity Analyst Need.pdfWhat Skills Does A Cybersecurity Analyst Need.pdf
What Skills Does A Cybersecurity Analyst Need.pdf
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Certified SOC Analyst
Certified SOC AnalystCertified SOC Analyst
Certified SOC Analyst
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Incident response
Incident responseIncident response
Incident response
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Soc

  • 2. The current environment is putting new demands on security operations
  • 3. Why do we build operational security controls & capabilities? Reduce enterprise risk. Protect the business. Move from reactive response to proactive mitigation. Increase visibility over the environment. Meet compliance/regulatory requirements
  • 4. What is a Security Operations Centeror (SOC) • A Security Operations Center is a highly skilled team following defined definitions and processes to manage threats and reduce security risk • Security Operations Centers (SOC) are designed to: – protect mission-critical data and assets – prepare for and respond to cyber emergencies – help provide continuity and efficient recovery – fortify the business infrastructure • The SOC’s major responsibilities are: – Monitor, Analyze, Correlate & Escalate Intrusion Events – Develop Appropriate Responses; Protect, Detect, Respond – Conduct Incident Management and Forensic Investigation – Maintain Security Community Relationships – Assist in Crisis Operations
  • 5. Security operations centers must be responsive to the evolving threats and provide management the information and control that it needs The SOC …. • Must demonstrate compliance with regulations • Protect intellectual property and ensure privacy properly • Manage security operations effectively and efficiently • Provide real-time insight into the current security posture of your organization • Provide security intelligence and the impact of threats on the organization • Enable your organization to know who did what, when - and prove it (evidence)
  • 6. Building a Security Operations Center involves multiple domains • People • Do you need 24x7x365 staff? • What are the skills needed? • Where do you get staff? • What about training? • How do you keep staff? • Metrics to measure performance • Capacity planning • Technology • SIEM architecture & use cases • Log types and logging options • Platform integrations; ticketing governance, big data • Web services to integrate them • Technology should improve effectiveness and efficiency • Process • What does the plan look like? • How do we measure progress and goals? • What is the optimal design of core processes? (eg. incident management, tuning, etc.) • Process and continual improvement • Governance / Metrics • Dashboard visibility and oversight • Policy, measurement and enforcement • Integrated governance that balances daily operations with strategic planning • Ministry objectives • Informing stakeholders • Informing employees
  • 7. Effective SOC has the right balance of People, Process and Technology components
  • 8. Sample Job Description • Responsibilities • Monitoring of security events received through alerts from SIEM or other security tools • Review alerts escalated by end users • Handel end user and security services consumer initiated incidents and initiating trouble tickets – Sev 4 tickets • Performing Level 1 triage of incoming issues ( initial assessing the priority of the event, initial determination of incident to determine risk and damage or appropriate routing of security or privacy data request) • Monitoring of alert and downstream dependencies health (logger, client agents, etc) • Responsible for troubleshooting agents and logs required for reporting when not reporting to alerting systems • Intake intelligence actions from Intelligence teams and ticket for appropriate operators for tool policy or tool setting tuning • Provide limited incident response to end users for low complexity security incidents • Notifying appropriate contact for security events and response • Takes an active part in the resolution of incidents, even after they are escalated • Work assigned ticket queue • Understanding and exceeding all tasked SLA commitments • Track and report on closure of tickets per SLAs • Escalating issues to Tier II or management when necessary • Provide daily and weekly metrics for security and vulnerability incidents • 24/7 Shift work required • Experience and Skills • Process and Procedure adherence • General network knowledge, TCP/IP Troubleshooting • Ability to trace down an endpoint on the network based on ticket information • Familiarity with system log information and what it means • Understanding of common network services (web, mail, DNS, authentication) • Knowledge of host based firewalls, Anti-Malware, HIDS • General Desktop OS and Server OS knowledge • TCP/IP, Internet Routing, UNIX & Windows NT • Strong analytical and problem • Training • Required: Security Essentials – SEC401 (optional GSEC certification) • Computer Forensic Investigation – Windows In-Depth - FOR408 • Recommended: Security Incident Handling and Forensic - FOR 508