#SACON
Building the NextGen SOC
Shomiron DAS GUPTA (GCIA)
Founder, CEO
NETMONASTERY Inc.
#SACON
Agenda
■ Why are APTs difficult to detect
■ Revisit the cyber kill chain
■ Process orient detection
■ NextGen SOC process
■ Building your threat mind map
■ Implement and measure your SOC
#SACON
Why are we failing to pick them
■ Made to order
■ Exploit trust relationships
■ Multi stage deployments
#SACON
The Cyber Kill Chain
■ Reconnaissance
■ Weaponize
■ Delivery
■ Exploitation
■ Installation
■ Command and Control
■ Actions on objectives
So which are the phases you
should track to detect
Advanced Persistent Threats?
#SACON
The Cyber Kill Chain
■ Reconnaissance
■ Weaponize
■ Delivery
■ Exploitation
■ Installation
■ Command and Control
■ Actions on objectives
So, what are you looking for?
Indicators Of Compromise
or
Attempt To Compromise
Tackle Detection
with Process
#SACON
Process Orient Detection
■ Visualize your engagement with threats
■ Identify detection phases
■ Build a list of primary issues
■ Create use cases
■ Connect use cases for multi phase threats
■ Burn the context layer in to your SIEM for detection
#SACON
Concerns from the Old SOC
■ Lack of focus on detection
■ Push required to build new rules
■ Rules get out dated before you go production
■ Continuous improvement doesn’t exist
■ Lack of active pursuit
#SACON
ASOC One such option
Hunter
• Looking for threats
• Multiple toolkits
• No boundaries - laterals
• Finding loopholes
• Building content
• Writing process
• Handover and review
Process SOC Ops
• Understand threats
• React - FP Filtering
• Respond
• Resolve
• Metrics & Improvement
• Case retirement
#SACON
THREAT MAP
PLAY BOOK
USE CASES
#SACON
Building your Threat Mind Map
#SACON
What does it take?
■ Approach

IOC or ATC
■ Anticipation

High Probability Threats
■ Active Playbook

Build - Review - Improve
#SACON
Pre-breach Symptoms
#SACON
Post-breach Symptoms
#SACON
Bad Policy Symptoms
#SACON
WORKSHOP
BUILDING YOUR OWN PLAYBOOK
RandomHIT
Lateral
Exfil
InfectDriveBy
PWN
1
2 3
4
#SACON
Alerts v/s Incidents
■ Alerts are instant and descriptive
■ Incidents are usually delayed and vague
■ Alerts can be remediated
■ Incidents need handling
What would you work towards - Alerts or Incidents
#SACON
Watching the AfterLife
■ Sold in the underground unless a sponsored activity
■ Stolen data is segregated
■ Sometimes published
■ Mostly used quickly for monetary gain
How would you track your data in the AfterLife?
#SACON
Implement and Measure
■ Watch for primary issues not events
■ Connect multi phase threats automatically with tools
■ Selectively implement incident management
■ Look out for threat trends
■ Cyclically iterate and improve every week
#SACON
Shomiron DAS GUPTA
shomiron@netmonastery.com
+91 9820336050
Thank You!

SACON16 - SOC Architecture