SlideShare a Scribd company logo
1 of 11
NEXT-GEN SECURITY OPERATIONS CENTER
Group 12​
Simbarashe Musaka 12200300002074​
Hriday Shankar Nath 12200300002041​
Pranjal Goel 12200300002004​
Anvitha Muthabathula 12200300002026​
Hemil Ujawala 122003000020261
NEXT-GEN INTELLIGENT SOC
 Building Next-gen Intelligent SOC
 Before starting to build a Next-gen Intelligent SOC (Security Operations
Center)
 What is a SOC?
 SOC (Security Operations Center) is the central unit of an organization
and is responsible for monitoring and detecting the security posture of
the organization.
 Traditional SOC is where the organizations’ security posture detection is
based on analyst’s skills and time. Also, SOC is limited to traditional SIEM
(Security Information & Event Management) tools, threat feeds and
limited/critical assets in monitoring scope.
NEXT GEN INTELLIGENT SECURITY
OPERATIONS CENTRE CONT….
In a Next Gen Intelligent SOC, monitoring
extends beyond critical assets to
organization’s whole assets, including cloud
assets, mobile, end user machines, CCTV,
door access, WIFI etc. This is because
attackers are becoming more sophisticated
in their methods and the tools that are
used to attack.
NEXT GEN INTELLIGENT SOC
REQUIREMENTS
ADVANCED
SIEM TOOLS
AI/ML Analytics Solutions
Endpoint Detection and Response (EDR) Tools
DLP
Threat Intelligence (TI)
Incident Response solutions
Automated Security Event analysis
Proactive threat hunting
What does SOC really do?
Provides services which could include:
 Security Administration
 System and Event Monitoring
 Management of malware
 Incident Response
 Security investigations
 Vulnerability Assessment and
penetration Testing
 Security Engineering
 Support services
5 KEY ELEMENTS OF THE NEXT-GEN
SECURITY OPERATIONS CENTER
1. Cloud-based analytics and operations are essential
2. Managed services can take pressure off staff
3. Open architectures and layered analytics bring big picture to life
4. Automation and orchestration are key
5. Machine learning boosts threat hunting and investigations
1. CLOUD-
BASED
ANALYTICS
AND
OPERATIONS
ARE ESSENTIAL
According to ESG's survey, 82% of organizations are
committed to moving the bulk of their workloads and
applications to the cloud. On-premises security information and
event management (SIEM) and other analytic tools alone will
not be sufficient to monitor and analyze cloud workloads.
Increasingly, companies are going to need to supplement or
replace on-premises tools with cloud-based products and
services. The cloud offers massive processing capabilities and
storage scaled to meet enterprise requirements. The attractive
pricing models and the opportunity to eliminate operational
overhead associated with on-premises technology are two
other factors that make cloud-based security technologies
attractive, the report states.
Thirty-eight percent of SOCs already use public cloud analytics
and operations tools, and 44% don't mind using it in a hybrid
environment. Over the relatively short term, a high-percentage
of organizations will “lift and shift” on-premises tools to the
cloud, replace on-premises tools with cloud-based
alternatives, or combine on-premises SOC technologies with
additional cloud-based tools. One in three organizations are
currently using their on-premises SIEM to monitor and analyze
cloud workloads.
The primary use cases for cloud security analytics include real-
time threat detection and response, risk management
monitoring and analysis, and threat intelligence.
2. MANAGED
SERVICES CAN
TAKE PRESSURE
OFF STAFF
Managed security analytics and operations services
deliver a range of capabilities, including around-the-clock
threat monitoring of networks, endpoints, and
applications; incident detection and response; SIEM-to-
security orchestration, automation and response (SOAR)
integration; and compliance reporting.
According to research firm Markets and Markets, the
market for managed SOC services will grow from around
$372 million in 2019 to $1.1 billion by 2024. Banking,
financial services companies, and insurance firms will be
the biggest adopters of managed SOC services, according
to the research firm.
About 75% of the organizations in the ESG survey claimed
that their security operations capabilities are being
undermined by a lack of available personnel, and 70% said
it was either difficult or extremely difficult to find and hire
qualified SOC staff.
To address the gap, many organizations are using managed
SOC services providers. Nearly three-quarters
(74%) already use such services, and more than nine in 10
organizations (91%) plan on ramping up the use of
managed security analytics services over the next 18
months.
3. OPEN
ARCHITECTURES
AND LAYERED
ANALYTICS
BRING BIG
PICTURE TO LIFE
To improve operational and security efficiencies,
SOCs will require a next-generation SIEM or a
common security analytics and operations platform
architecture (SOAPA) to integrate data from multiple
security tools. SOCs will need an open architecture
and layered SIEM, user and entity behavior analytics
(UEBA), and SOAR capabilities. The data
management part, the analytics component, and the
data pipelining functions will all need to be
separate, said Jon Oltsik, an analyst at ESG and
author of the new report.
To be effective, next-gen SIEM platforms will require
a unified interface, or mission control, that will bring
together data from layered analytics tools so
analysts won't have to toggle from one interface to
another to see what the logs or the network is telling
them, Oltsik said. Thirty-six percent of organizations
in ESG's survey are actively working on enabling
such integration; another 48% are somewhat active
but don't consider it to be one of their top priorities
yet.
Enterprises that have automated security processes
have reported increased SOC workflow performance
because staff can spend more time addressing
problems, the report said.
ESG's survey showed that 27% of organizations have
already extensively automated key security analytics
and operations capabilities, while another 38% have
done so on a more limited basis. Eighteen percent are
currently piloting an SOC process automation and
orchestration project, 7% plan on doing so in the near
future, and 6% plan to to do so over a slightly longer-
term.
The top use case for process automation is the
integration of security and IT operations capabilities,
with 35% of survey respondents saying that was their
immediate priority. Other use cases include enabling
better collaboration between security and operations
teams (34%) and automation of incident remediation
tasks (29%).
4. AUTOMATION
AND
ORCHESTRATION
ARE KEY
As data volumes and security alerts increase, machine-
learning (ML) tools will become key to effective threat
detection and response.
ML-powered security tools are designed to help
organizations spot malicious activity by pinpointing
deviations from normal network or application behavior.
They come in two flavors—supervised and unsupervised ML.
A supervised tool uses existing datasets to "learn" what
normal behavior looks like so teams can detect and alert on
variations from the norm. Unsupervised tools use algorithms
to study network traffic and identify what normal behavior
looks like so it can spot deviations.
Many forward-leaning SOCs have already begun using ML-
based tools to bolster investigations and to improve their
ability to detect and respond to threats. ESG's survey showed
that more than half (52%) are already extensively using ML or
using it on a somewhat more limited basis. Twenty percent
are piloting ML projects, while another 18% are planning to
deploy or are interested in deploying ML for threat detection
and response.
According to the ESG survey, interest in ML primarily
stems from a desire to improve organizations' ability to
detect advanced threats (37%), to accelerate investigation
(34%), and to improve their ability to identify overall cyber
risk (34%).
5. MACHINE
LEARNING
BOOSTS THREAT
HUNTING AND
INVESTIGATIONS

More Related Content

Similar to SOC Analysis

Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Roy Ramkrishna
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
SOAR Platform
SOAR PlatformSOAR Platform
SOAR PlatformSecuraa
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixPrachi Joshi
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxanhlodge
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoEMC
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...IJECEIAES
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?Adlan Hussain
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Intelligent security operations a staffing guide
Intelligent security operations   a staffing guideIntelligent security operations   a staffing guide
Intelligent security operations a staffing guideColleen Johnson
 

Similar to SOC Analysis (20)

Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
SOAR Platform
SOAR PlatformSOAR Platform
SOAR Platform
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrix
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Cybersecurity automation
Cybersecurity automationCybersecurity automation
Cybersecurity automation
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?PSIM: Why Should I Be Interested?
PSIM: Why Should I Be Interested?
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
SIEM vs EDR
SIEM vs EDRSIEM vs EDR
SIEM vs EDR
 
Intelligent security operations a staffing guide
Intelligent security operations   a staffing guideIntelligent security operations   a staffing guide
Intelligent security operations a staffing guide
 

Recently uploaded

Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 

Recently uploaded (20)

Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 

SOC Analysis

  • 1. NEXT-GEN SECURITY OPERATIONS CENTER Group 12​ Simbarashe Musaka 12200300002074​ Hriday Shankar Nath 12200300002041​ Pranjal Goel 12200300002004​ Anvitha Muthabathula 12200300002026​ Hemil Ujawala 122003000020261
  • 2. NEXT-GEN INTELLIGENT SOC  Building Next-gen Intelligent SOC  Before starting to build a Next-gen Intelligent SOC (Security Operations Center)  What is a SOC?  SOC (Security Operations Center) is the central unit of an organization and is responsible for monitoring and detecting the security posture of the organization.  Traditional SOC is where the organizations’ security posture detection is based on analyst’s skills and time. Also, SOC is limited to traditional SIEM (Security Information & Event Management) tools, threat feeds and limited/critical assets in monitoring scope.
  • 3. NEXT GEN INTELLIGENT SECURITY OPERATIONS CENTRE CONT…. In a Next Gen Intelligent SOC, monitoring extends beyond critical assets to organization’s whole assets, including cloud assets, mobile, end user machines, CCTV, door access, WIFI etc. This is because attackers are becoming more sophisticated in their methods and the tools that are used to attack.
  • 4. NEXT GEN INTELLIGENT SOC REQUIREMENTS ADVANCED SIEM TOOLS AI/ML Analytics Solutions Endpoint Detection and Response (EDR) Tools DLP Threat Intelligence (TI) Incident Response solutions Automated Security Event analysis Proactive threat hunting
  • 5. What does SOC really do? Provides services which could include:  Security Administration  System and Event Monitoring  Management of malware  Incident Response  Security investigations  Vulnerability Assessment and penetration Testing  Security Engineering  Support services
  • 6. 5 KEY ELEMENTS OF THE NEXT-GEN SECURITY OPERATIONS CENTER 1. Cloud-based analytics and operations are essential 2. Managed services can take pressure off staff 3. Open architectures and layered analytics bring big picture to life 4. Automation and orchestration are key 5. Machine learning boosts threat hunting and investigations
  • 7. 1. CLOUD- BASED ANALYTICS AND OPERATIONS ARE ESSENTIAL According to ESG's survey, 82% of organizations are committed to moving the bulk of their workloads and applications to the cloud. On-premises security information and event management (SIEM) and other analytic tools alone will not be sufficient to monitor and analyze cloud workloads. Increasingly, companies are going to need to supplement or replace on-premises tools with cloud-based products and services. The cloud offers massive processing capabilities and storage scaled to meet enterprise requirements. The attractive pricing models and the opportunity to eliminate operational overhead associated with on-premises technology are two other factors that make cloud-based security technologies attractive, the report states. Thirty-eight percent of SOCs already use public cloud analytics and operations tools, and 44% don't mind using it in a hybrid environment. Over the relatively short term, a high-percentage of organizations will “lift and shift” on-premises tools to the cloud, replace on-premises tools with cloud-based alternatives, or combine on-premises SOC technologies with additional cloud-based tools. One in three organizations are currently using their on-premises SIEM to monitor and analyze cloud workloads. The primary use cases for cloud security analytics include real- time threat detection and response, risk management monitoring and analysis, and threat intelligence.
  • 8. 2. MANAGED SERVICES CAN TAKE PRESSURE OFF STAFF Managed security analytics and operations services deliver a range of capabilities, including around-the-clock threat monitoring of networks, endpoints, and applications; incident detection and response; SIEM-to- security orchestration, automation and response (SOAR) integration; and compliance reporting. According to research firm Markets and Markets, the market for managed SOC services will grow from around $372 million in 2019 to $1.1 billion by 2024. Banking, financial services companies, and insurance firms will be the biggest adopters of managed SOC services, according to the research firm. About 75% of the organizations in the ESG survey claimed that their security operations capabilities are being undermined by a lack of available personnel, and 70% said it was either difficult or extremely difficult to find and hire qualified SOC staff. To address the gap, many organizations are using managed SOC services providers. Nearly three-quarters (74%) already use such services, and more than nine in 10 organizations (91%) plan on ramping up the use of managed security analytics services over the next 18 months.
  • 9. 3. OPEN ARCHITECTURES AND LAYERED ANALYTICS BRING BIG PICTURE TO LIFE To improve operational and security efficiencies, SOCs will require a next-generation SIEM or a common security analytics and operations platform architecture (SOAPA) to integrate data from multiple security tools. SOCs will need an open architecture and layered SIEM, user and entity behavior analytics (UEBA), and SOAR capabilities. The data management part, the analytics component, and the data pipelining functions will all need to be separate, said Jon Oltsik, an analyst at ESG and author of the new report. To be effective, next-gen SIEM platforms will require a unified interface, or mission control, that will bring together data from layered analytics tools so analysts won't have to toggle from one interface to another to see what the logs or the network is telling them, Oltsik said. Thirty-six percent of organizations in ESG's survey are actively working on enabling such integration; another 48% are somewhat active but don't consider it to be one of their top priorities yet.
  • 10. Enterprises that have automated security processes have reported increased SOC workflow performance because staff can spend more time addressing problems, the report said. ESG's survey showed that 27% of organizations have already extensively automated key security analytics and operations capabilities, while another 38% have done so on a more limited basis. Eighteen percent are currently piloting an SOC process automation and orchestration project, 7% plan on doing so in the near future, and 6% plan to to do so over a slightly longer- term. The top use case for process automation is the integration of security and IT operations capabilities, with 35% of survey respondents saying that was their immediate priority. Other use cases include enabling better collaboration between security and operations teams (34%) and automation of incident remediation tasks (29%). 4. AUTOMATION AND ORCHESTRATION ARE KEY
  • 11. As data volumes and security alerts increase, machine- learning (ML) tools will become key to effective threat detection and response. ML-powered security tools are designed to help organizations spot malicious activity by pinpointing deviations from normal network or application behavior. They come in two flavors—supervised and unsupervised ML. A supervised tool uses existing datasets to "learn" what normal behavior looks like so teams can detect and alert on variations from the norm. Unsupervised tools use algorithms to study network traffic and identify what normal behavior looks like so it can spot deviations. Many forward-leaning SOCs have already begun using ML- based tools to bolster investigations and to improve their ability to detect and respond to threats. ESG's survey showed that more than half (52%) are already extensively using ML or using it on a somewhat more limited basis. Twenty percent are piloting ML projects, while another 18% are planning to deploy or are interested in deploying ML for threat detection and response. According to the ESG survey, interest in ML primarily stems from a desire to improve organizations' ability to detect advanced threats (37%), to accelerate investigation (34%), and to improve their ability to identify overall cyber risk (34%). 5. MACHINE LEARNING BOOSTS THREAT HUNTING AND INVESTIGATIONS