SlideShare a Scribd company logo
1 of 18
LIBRARYRESEARCH PROJECT
SOC & SIEM
SUBMITTEDBY
Sonukumarsingh
PREVIEW
 INTRO
 SECURITY OPERATIONS CENTER (SOC)
 COMPONENTS : SOC
 RESPONSIBILITIES : SOC
 SIEM
 WHY SIEM IS NECESSARY?
 DIFFERENT SIEM TOOLS
 CONCLUSION
INTRO
SECURITY OPRATIONS CENTER (SOC)
 Security Operations Center is a team consists of cybersecurity experts and trained
engineers.
 It is different than other IT departments because SOC is dedicated to performing advanced
IT security operations.
 Security operations centre services are aimed at preventing any threats to cybersecurity
by early detection and response to any incident of hacking or data breach.
 It is a centralized and the most significant unit of a company that is responsible for
handling its security operations.
 The SOC team of an organization protects significant and confidential company data,
along with the brand integrity and business systems of the company.
SECURITY OPRATIONS CENTER (SOC)
COMPONENTS : SOC
 People.Organizations have the tendency to often give security a big budget for
procurement of a lot of tools & equipment, but will not give required importance to people that
implement the solution
 Processes.Timely detection and controlling the damage requires gaining greater visibility
into an environment with continuous monitoring capabilities.
 Technology. Security Information and Event Management (SIEM) technologies have
been at the heart of Security Operations Centers.
WORK FLOW : SOC
OPERATIONS : SOC
 Log Collection
 Log Retention & Archival
 Log Analysis
 Monitoring of security Environment for security events
 Event Correlation
 Incident Mgt
 Threat Identification & Reaction
 Reporting
• The basic responsibilities of a SOC team include the following:-
 Asset discovery and management involves obtaining a high awareness of all
tools, software, hardware and technologies used within the organization. These
also focus on ensuring all assets are working properly and regularly patched and
updated.
 Continuous behavioral monitoring includes examining all systems 24/7 year-
round. This enables SOCs to place equal weight on reactive and proactive
measures as any irregularity in activity is instantly detected. Behavioral models
train data collection systems on what activities are suspicious and can be used to
adjust information that might register as false positives.
 Keeping activity logs enables SOC team members to backtrack or pinpoint
previous actions that may have resulted in a breach. All communications and
activity should be logged by the SOC.
RESPONSIBILITIES : SOC
SECURITY OPERATION CENTER
 Alert severity ranking helps teams ensure the most severe or pressing alerts
are handled first. Teams must regularly rank cyber security threats in terms of
potential damage.
 Defense development and evolution is important to help SOC teams stay up to
date. Teams should create an incident response plan(IRP) to defend systems
against new and old attacks. Teams must also adjust the plan as necessary
when new information is obtained.
 Incident recovery enables an organization to recover compromised data. This
includes reconfiguring, updating or backing up systems.
 Compliance maintenance is key to ensuring SOC team members and the
company follow regulatory and organizational standards when carrying out
business plans. Typically, one team member oversees educating and enforcing
compliance.
RESPONSIBILITIES : SOC
SIEM
SIEM
 SIEM is tool about looking at what’s happening on the network through a larger lens than
can be provided via any one security control or information source.
 Intrusion Detection only understands Packets, Protocols and IP Addresses
 Endpoint Security only sees files, usernames and hosts
 Service Logs show user logins, service activity and configuration changes.
 Asset Management system sees apps, business processes and owners.
 However, none of these equipment individually, can tell what is happening to the network
in terms of security - but together, they can…
 SIEM is essentially, a management layer above all existing systems and security
controls.
 It connects and unifies all the information contained in existing systems, allowing them
to be analyzed and cross-referenced from a single interface.
WHY IS SIEM NECESSARY?
 Rise in data breaches due to internal and external threats
 Attackers are smart and traditional security tools just don’t suffice
 Mitigate advance cyber-attacks
 Manage increasing volumes of logs from multiple sources
 Meet strict confirming requirements
 Facilitated by SIEM : -
 Malware Investigation
 Phishing Prevention & Detection
 HR Investigation
 Departed Employees Risk Mitigation
ATTRIBUTES OF SIEM & SIEM TOOLS
 Attributes of SIEM System : -
 Log Collection
 Normalization
 Event Correlation
 Alerting
 Data aggregation
 Top SIEM Tools : -
 SIEM Splunk
 SIEM IBM QRadar
 SIEM Logrhythm
CONCLUSION
 The benefit of having a security operations center is the improvement of security
incident detection through a continuously monitoring & analysis of data activity. SIEM is a
vital component of modern cyber security strategies, providing organization with the tool
and capabilities needed to monitor and respond to security threat effectively. Among the
benefits of SIEM solution, they can help you store the normalized data, organized it, & easily
retrieve it if necessary.
BY BY

More Related Content

Similar to LIBRARY RESEARCH PROJECT, SECURITY OPERATION CENTER.pptx

Security Orchestration Made Simple
Security Orchestration Made SimpleSecurity Orchestration Made Simple
Security Orchestration Made SimpleSiemplify
 
The Complete Security Operations Center Guide for 2023
The Complete Security Operations Center Guide for 2023The Complete Security Operations Center Guide for 2023
The Complete Security Operations Center Guide for 2023Skillmine Technology Pvt Ltd
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalOscar Williams
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoEMC
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...Asep Syihabuddin
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles LearningwithRayYT
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEMSiemplify
 
Learn about Security Orchestration
Learn about Security OrchestrationLearn about Security Orchestration
Learn about Security Orchestrationsecuraa
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
The Ultimate Security Operations Center Career Guide
The Ultimate Security Operations Center  Career GuideThe Ultimate Security Operations Center  Career Guide
The Ultimate Security Operations Center Career Guidepriyanshamadhwal2
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdfinfosec train
 
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!Infosec train
 
Unlock Your Ultimate SOC Career Guide - Infosectrain
Unlock Your  Ultimate SOC Career Guide - InfosectrainUnlock Your  Ultimate SOC Career Guide - Infosectrain
Unlock Your Ultimate SOC Career Guide - InfosectraininfosecTrain
 

Similar to LIBRARY RESEARCH PROJECT, SECURITY OPERATION CENTER.pptx (20)

SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Security Orchestration Made Simple
Security Orchestration Made SimpleSecurity Orchestration Made Simple
Security Orchestration Made Simple
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
The Complete Security Operations Center Guide for 2023
The Complete Security Operations Center Guide for 2023The Complete Security Operations Center Guide for 2023
The Complete Security Operations Center Guide for 2023
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEM
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
Learn about Security Orchestration
Learn about Security OrchestrationLearn about Security Orchestration
Learn about Security Orchestration
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
The Ultimate Security Operations Center Career Guide
The Ultimate Security Operations Center  Career GuideThe Ultimate Security Operations Center  Career Guide
The Ultimate Security Operations Center Career Guide
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
 
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
 
Unlock Your Ultimate SOC Career Guide - Infosectrain
Unlock Your  Ultimate SOC Career Guide - InfosectrainUnlock Your  Ultimate SOC Career Guide - Infosectrain
Unlock Your Ultimate SOC Career Guide - Infosectrain
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

LIBRARY RESEARCH PROJECT, SECURITY OPERATION CENTER.pptx

  • 1. LIBRARYRESEARCH PROJECT SOC & SIEM SUBMITTEDBY Sonukumarsingh
  • 2.
  • 3. PREVIEW  INTRO  SECURITY OPERATIONS CENTER (SOC)  COMPONENTS : SOC  RESPONSIBILITIES : SOC  SIEM  WHY SIEM IS NECESSARY?  DIFFERENT SIEM TOOLS  CONCLUSION
  • 6.  Security Operations Center is a team consists of cybersecurity experts and trained engineers.  It is different than other IT departments because SOC is dedicated to performing advanced IT security operations.  Security operations centre services are aimed at preventing any threats to cybersecurity by early detection and response to any incident of hacking or data breach.  It is a centralized and the most significant unit of a company that is responsible for handling its security operations.  The SOC team of an organization protects significant and confidential company data, along with the brand integrity and business systems of the company. SECURITY OPRATIONS CENTER (SOC)
  • 7. COMPONENTS : SOC  People.Organizations have the tendency to often give security a big budget for procurement of a lot of tools & equipment, but will not give required importance to people that implement the solution  Processes.Timely detection and controlling the damage requires gaining greater visibility into an environment with continuous monitoring capabilities.  Technology. Security Information and Event Management (SIEM) technologies have been at the heart of Security Operations Centers.
  • 9. OPERATIONS : SOC  Log Collection  Log Retention & Archival  Log Analysis  Monitoring of security Environment for security events  Event Correlation  Incident Mgt  Threat Identification & Reaction  Reporting
  • 10. • The basic responsibilities of a SOC team include the following:-  Asset discovery and management involves obtaining a high awareness of all tools, software, hardware and technologies used within the organization. These also focus on ensuring all assets are working properly and regularly patched and updated.  Continuous behavioral monitoring includes examining all systems 24/7 year- round. This enables SOCs to place equal weight on reactive and proactive measures as any irregularity in activity is instantly detected. Behavioral models train data collection systems on what activities are suspicious and can be used to adjust information that might register as false positives.  Keeping activity logs enables SOC team members to backtrack or pinpoint previous actions that may have resulted in a breach. All communications and activity should be logged by the SOC. RESPONSIBILITIES : SOC
  • 11. SECURITY OPERATION CENTER  Alert severity ranking helps teams ensure the most severe or pressing alerts are handled first. Teams must regularly rank cyber security threats in terms of potential damage.  Defense development and evolution is important to help SOC teams stay up to date. Teams should create an incident response plan(IRP) to defend systems against new and old attacks. Teams must also adjust the plan as necessary when new information is obtained.  Incident recovery enables an organization to recover compromised data. This includes reconfiguring, updating or backing up systems.  Compliance maintenance is key to ensuring SOC team members and the company follow regulatory and organizational standards when carrying out business plans. Typically, one team member oversees educating and enforcing compliance. RESPONSIBILITIES : SOC
  • 12. SIEM
  • 13. SIEM  SIEM is tool about looking at what’s happening on the network through a larger lens than can be provided via any one security control or information source.  Intrusion Detection only understands Packets, Protocols and IP Addresses  Endpoint Security only sees files, usernames and hosts  Service Logs show user logins, service activity and configuration changes.  Asset Management system sees apps, business processes and owners.  However, none of these equipment individually, can tell what is happening to the network in terms of security - but together, they can…  SIEM is essentially, a management layer above all existing systems and security controls.  It connects and unifies all the information contained in existing systems, allowing them to be analyzed and cross-referenced from a single interface.
  • 14. WHY IS SIEM NECESSARY?  Rise in data breaches due to internal and external threats  Attackers are smart and traditional security tools just don’t suffice  Mitigate advance cyber-attacks  Manage increasing volumes of logs from multiple sources  Meet strict confirming requirements  Facilitated by SIEM : -  Malware Investigation  Phishing Prevention & Detection  HR Investigation  Departed Employees Risk Mitigation
  • 15.
  • 16. ATTRIBUTES OF SIEM & SIEM TOOLS  Attributes of SIEM System : -  Log Collection  Normalization  Event Correlation  Alerting  Data aggregation  Top SIEM Tools : -  SIEM Splunk  SIEM IBM QRadar  SIEM Logrhythm
  • 17. CONCLUSION  The benefit of having a security operations center is the improvement of security incident detection through a continuously monitoring & analysis of data activity. SIEM is a vital component of modern cyber security strategies, providing organization with the tool and capabilities needed to monitor and respond to security threat effectively. Among the benefits of SIEM solution, they can help you store the normalized data, organized it, & easily retrieve it if necessary.
  • 18. BY BY