The document outlines the evolution and future of Security Operations Centers (SOCs), emphasizing the importance of adapting to next-gen technologies like Security Orchestration, Automation, and Response (SOAR) alongside big data and AI. It highlights that while SOCs traditionally emphasized human monitoring, the next-gen approach integrates automation to enhance efficiency and response times to cybersecurity threats. The ultimate goal is to improve operational effectiveness while acknowledging the critical role of human analysts in managing complex threats.
– Gartner
“A securityoperations center (SOC) can be defined
both as a team, often operating in shifts around the
clock, and a facility dedicated to and organized to
prevent, detect, assess and respond to cybersecurity
threats and incidents, and to fulfill and assess
regulatory compliance.”
What is SOC?
People-Centric SOC
Define visionfor the
team. Evaluate budgetary
/ resource concerns
First line of monitoring.
Eys-on-Glass monitoring.
Basic analysis, following
SOPs / playbooks
Actively look for loop
holes in network / system
/ configuration
Actively looking for threat
information and correlate
it with assets belong to
the organisation
Look deeper in to security
incidents. Assist in
investigating cyber
crimes
Remediate security
incidents ASAP based on
analysis performed by
security analyst
Actively dive-in to SIEM
data to look for
suspicipous activities
especially unknown
threat / zeroday
Configure, fine-
tune and maintain
SIEM solution
Second line of
monitoring.
Having more
experienced on
security analysis
Coordinate with all
team members.
Define and
document
process. Run the
operations
11.
People-Centric SOC
“People-Centric SOC
introducepainful issue
to organisation”
“Don’t you think it is
inhuman to let people
watch the screen for 8
hours especially in the
middle-of night”?
“It is industry 4.0 era”
Use Case: ImprovingMTTD-
MTTR
Define vision for the
team. Evaluate budgetary
/ resource concerns
First line of monitoring.
Eys-on-Glass monitoring.
Basic analysis, following
SOPs / playbooks
Actively look for loop
holes in network / system
/ configuration
Actively looking for threat
information and correlate
it with assets belong to
the organisation
Look deeper in to security
incidents. Assist in
investigating cyber
crimes
Remediate security
incidents ASAP based on
analysis performed by
security analyst
Actively dive-in to SIEM
data to look for
suspicipous activities
especially unknown
threat / zeroday
Configure, fine-
tune and maintain
SIEM solution
Second line of
monitoring.
Having more
experienced on
security analysis
Coordinate with all
team members.
Define and
document
process. Run the
operations
SOAR
Next-Gen SOC utiliseSOAR (Security Orchestration Automation and Response)
to perform actionable insights and interaction with another component in the
network
16.
Use Case: Vulnerability
ManagementSystem
Define vision for the
team. Evaluate budgetary
/ resource concerns
First line of monitoring.
Eys-on-Glass monitoring.
Basic analysis, following
SOPs / playbooks
Actively look for loop
holes in network / system
/ configuration
Actively looking for threat
information and correlate
it with assets belong to
the organisation
Look deeper in to security
incidents. Assist in
investigating cyber
crimes
Remediate security
incidents ASAP based on
analysis performed by
security analyst
Actively dive-in to SIEM
data to look for
suspicipous activities
especially unknown
threat / zeroday
Configure, fine-
tune and maintain
SIEM solution
Second line of
monitoring.
Having more
experienced on
security analysis
Coordinate with all
team members.
Define and
document
process. Run the
operations
17.
Solution: Bigdata andAI
Next-Gen SOC pushes forward the
limits of a tri-dimensional
paradigm. It needs to increase the
detection surface and decision
velocity, decrease reaction time
by utilising bigdata analytics
combined with AI technology
“Potensi serangan DDoS terhadap website
IDNIC (Indonesia Network Information
Center) dengan URL
https://www.idnic.id (203.119.13.145) pada
tanggal 29 November 2018”.
18.
Analytics in Next-GenSecurity Operation
Center
Next-Gen SOC preventing breaches from happening,
by leveraging big data and supercomputing capabilities
19.
Summary
• No, Next-GenSOC doesn’t intend to replace Human with
Machine
• Rarity of Human in IT Security forces us to be more creative
within Industry 4.0 era
• People role “improved” i.e Trainer for the Machine, Analysing
only high classified unknown-complex threat, Data scientist, …
• Convert your facility from Traditional to Next-Gen need proper
plan: Map according to your organisation requirement, focus
on what is the most pain point, improve them with machine
#5 Cyber kill chain merupakan model yang dipopulerkan oleh lockheed martin dan menunjukan bagaimana fase real targeted cyber attack terjadi. Apabila satu dari fase tersebut terputus maka targeted attack dapat digagalkan. Ini adalah salah satu objektivitas kebutuhan SOC.
#6 Berikan story kenapa suatu organisasi butuh SOC. Ceritakan sedikit mengenai konsep cyber killchain lockheed martin.