SlideShare ist ein Scribd-Unternehmen logo
1 von 26
The Next Generation
Security Operations Centre
Graeme Parker
Managing Director, Parker Solutions Group
2
Graeme Parker
Managing Director - Parker Solutions Group
Extensive experience delivering Cyber Security, Business
Continuity and Risk Management solutions in multiple sectors
including Government, Financial Services, IT Service Providers,
Health Services, Electrical and Power to organizations across
the globe.
Graeme provides consulting at the strategic, tactical and
operational levels, conducts and leads audits and leads
numerous training events worldwide.
+44(0)1609 760293
graeme@parkersolutionsgroup.co.uk
www.parkersolutionsgroup.co.uk
3
Security Operations Centre?
What is a Security Operations Centre (SOC)?
• A facility to protect enterprise information systems such as applications,
network devices, servers, databases and data centres.
• Provides services which could include (not limited to):
• Security Administration
• System and Event Monitoring
• Management of Malware
• Incident Response
• Security Investigations
• Vulnerability Assessment and Penetration Testing
• Technology Configuration and Deployment
• Security Engineering
• Support Services
4
We have never had a security incident
A misconception
• Most of us are familiar with the concept of Preventative, Detective and
Corrective Controls.
• A professionally designed SOC with the right tools and skills can deal with
strengthen the detective aspects which is a vital pillar in your security
posture.
• The vast majority of preventative controls can be defeated much comes
down to the determination and skill set of the attackers.
5
Building a SOC
What is the Current Position?
Operate Extend
BuildNext Steps
Maybe an organisation has some
elements in place in that constitute a
SOC, potentially larger organisations
may have fairly mature operations
already established. The decision is
whether to:
6
Building a SOC
What is required?
There are several key steps and key considerations in building an
effective SOC and the next generation SOC.
The three key areas which are well known are:
• People
• Process
• Technology
7
Threat a key starting point
Firstly we know to understand the threat landscape
Threat Source Capability (0-5) Motivation (0-5) Total
Organised Crime 4 2 8
Internal Employees 5 1 5
Activist Groups 3 2 6
Competitors 3 1 3
Foreign Intelligence
Services
5 1 5
Media/Journalists 3 3 9
Hacking Groups 4 1 4
8
People - Traditional Viewpoint
SANS Building a World Class SOC Roadmap
Skilled people are key to a successful SOC. Whilst there are no
absolute set standards the typical roles to be fulfilled include:
Role Description Competence/Training
Tier 1 Alert Analyst Continuously monitors the alert
queue; triages security alerts;
monitors health of security
sensors and endpoints; collects
data and context necessary to
initiate Tier 2 work.
Through understanding of
internal processes. Strong
knowledge of SIEM tooling and
specific vendor tools used in the
SOC. Good general
understanding of incident
response.
Tier 2 Incident
Responder
Performs deep-dive incident
analysis by correlating data from various
sources; determines if a critical system or
data set has been impacted; advises on
remediation; provides support for new
analytic methods for
detecting threats.
Advanced forensics knowledge,
strong log review skills,
malware knowledge, expertise
in investigation techniques and
standards and procedures.
9
People - Traditional Viewpoint
SANS Building a World Class SOC Roadmap
Role Description Competence/Training
Tier 3 Subject Matter
Expert/Hunter
Possesses in-depth knowledge
on network, endpoint, threat
intelligence, forensics and
malware reverse engineering,
as well as the functioning of
specific applications or
underlying IT infrastructure; acts
as an incident “hunter,” not
waiting for escalated incidents;
closely involved in developing,
tuning and implementing threat
detection analytics.
Advanced knowledge of
anomaly detection, deep dive
investigations, malware reverse
engineering, in depth
penetration testing techniques.
A highly experienced technical
professional.
SOC Manager Manages resources to include
personnel, budget, shift
scheduling and technology
strategy to meet SLAs.
Security management skills,
understanding of risk,
architecture, security strategy.
10
Staffing models
SOC teams
Several options exist for staffing of the various models
Key questions:
 Should the organization use its own employees?
 Should staff be mixed and partially outsourced?
 Should the whole process be fully outsourced?
11
Employees
Staffing
Characteristics
• The organization performs all of its security incident work using its own
employees, with limited external support.
• Given the skills required in a next generation SOC this is extremely difficult
to achieve.
12
Partially outsourced
Staff
Characteristics:
• The organization outsources
portions of its incident response
work to an MSSP.
13
Fully outsourced
Staff
Characteristics:
• Complete outsourcing of incidents to an onsite contractor that is supervised
and overseen by own staff.
14
Selecting the appropriate model
Team model selection factors
Factors to be considered
• The need for 24/7 availability
• Full time or part-time members
• Cost
• Expertise
• Outsourcing
• Technical Resources
15
Process
Process Maturity and the Human Factor is key
• Clear defined processes are fundamental to the success of a SOC. Such
process need to be repeatable and clearly defined and understood.
• NIST SP800-61 R2 Computer Security Incident Handling Guide and ISO
27035 can provide some clear guidance in this area.
• However our aim is not to define rigid inflexible processes. Our analysts
need to be able to use their own expertise and skills to provide an effective
service.
16
Red and Blue Teams
Processes which require rules of engagement
• Blue teams usually defend information systems (main part of a SOC).
• Red teams are employed to test the defences and launch attacks to test not
only defences but the organisations ability to detect and respond.
• These teams are at the cutting edge of any mature SOC but clear rules of
engagement must be defined.
17
Technologies
A blend of technology
Security Monitoring –
Beyond SIEM
Vulnerability
scanners,
firewalls,
WAFs,
IDS/IPS
Asset data,
threat
intelligence.
System logs,
FIM Solutions
Network
traffic,
endpoint data,
security events
18
Context
Data requires clear context
• Alerting tools can provide many individual pieces of information.
• Individual pieces of information such as ip address of an endpoint does not
however tell the whole story.
• Rich data from multiple sources as such asset type, time, known/detected
vulnerabilities, user action, file types and threat intelligence can mean the
difference when deciding on key actions.
19
The next generation SOC
Where are things heading?
Many technologies, processes and skills are required but what does a next
generation SOC look like? First we need to understand the various
generations:
Image from HP Arcsight 5G SOC Business Whitepaper
20
Next Generation
• Automated solutions which can analyse large data sets can more effectively
identify threats and attacks using machine learning.
• Automation does not replace the analyst but allows analysts to be more
focussed on the human aspects of attacks and intelligence
• Whilst attacks maybe automated ultimately attacks are driven based on
human behaviour. Our analysts need therefore to be more than technical
experts. They need to understand topics like counter intelligence,
surveillance and criminal psychology.
Analytics, Big Data and Human Behaviour
21
Next Generation
“It takes constant monitoring and maximum use of data to find attacks and
abnormal behaviour before damage is done. But the world produces over 2.5
quintillion bytes of data every day, and 80 per cent of it is unstructured. This
means it’s expressed in natural language — spoken, written or visual — that a
human can easily understand but traditional security systems can’t.” 
— IBM Cognitive Security
Analytics, Big Data and Human Behaviour –
a quote from IBM
22
Next Generation
• With this considered the ability to analyse large data sets of threat and
business intelligence to detect patterns is a key skills of an equipped SOC.
This means mathematicians, statisticians, and data scientists play a role as
the next SOC analyst.
• Threat intelligence is a crucial input but does not come from one source.
SOC leaders need to be identifying data from multiple sources.
• Red and Blue teams roles increase in importance for instant readiness
along with hunt teams freed from day to day processes.
Analytics, Big Data and Human Behaviour
23
Next Generation
• All of the traditional areas of focus for a SOC still apply though
new areas exist:
 IoT devices
 API’s
 Remote Access Solutions
 Cloud services
 Converged networks
 Web based applications
 Endpoints and devices
 Federated identity management systems
Focus Areas
24
Next Generation
• A next generation SOC has at its heart:
• Collection of raw logs and live data from all parts of the environment
• Ability to use predictive analysis based on vast data sets including
human intelligence
• Threat detection from multiple sources
• Multi skilled dynamic teams
• A business focus and delivery of a holistic service
• The ability leverage non security tools to analyse data
• The environment to share and receive knowledge and expertise
across industry
What sets a next generation SOC apart?
25
Key Messages
• A SOC is at the heart of any organisation’s security posture.
• It needs to be dynamic constantly learning and adapting.
• Skilled and motivated people are crucial to success. Learning and
experience is constant.
• Tasks can be shared with third parties but internal ownership is of
paramount importance.
• Preventative controls will only take you so far.
• Automation to interrogate large data sets to add context to provide
intelligence will support the right decisions.
• A SOC should cover all aspects of an organisations architecture and should
be aligned to real business processes.
Key Messages
26
THANK YOU
+44 01609 760293
graeme@parkersolutionsgroup.co.uk
www.parkersolutionsgroup.co.uk
https://www.linkedin.com/in/graemeparker/
twitter.com/parkerinfosol
fb.com/Parker-Solutions-Group-113377915344272/

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Soc
SocSoc
Soc
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 

Ähnlich wie The Next Generation of Security Operations Centre (SOC)

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
Info-Tech Research Group
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 

Ähnlich wie The Next Generation of Security Operations Centre (SOC) (20)

Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 

Mehr von PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

Mehr von PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

The Next Generation of Security Operations Centre (SOC)

  • 1. The Next Generation Security Operations Centre Graeme Parker Managing Director, Parker Solutions Group
  • 2. 2 Graeme Parker Managing Director - Parker Solutions Group Extensive experience delivering Cyber Security, Business Continuity and Risk Management solutions in multiple sectors including Government, Financial Services, IT Service Providers, Health Services, Electrical and Power to organizations across the globe. Graeme provides consulting at the strategic, tactical and operational levels, conducts and leads audits and leads numerous training events worldwide. +44(0)1609 760293 graeme@parkersolutionsgroup.co.uk www.parkersolutionsgroup.co.uk
  • 3. 3 Security Operations Centre? What is a Security Operations Centre (SOC)? • A facility to protect enterprise information systems such as applications, network devices, servers, databases and data centres. • Provides services which could include (not limited to): • Security Administration • System and Event Monitoring • Management of Malware • Incident Response • Security Investigations • Vulnerability Assessment and Penetration Testing • Technology Configuration and Deployment • Security Engineering • Support Services
  • 4. 4 We have never had a security incident A misconception • Most of us are familiar with the concept of Preventative, Detective and Corrective Controls. • A professionally designed SOC with the right tools and skills can deal with strengthen the detective aspects which is a vital pillar in your security posture. • The vast majority of preventative controls can be defeated much comes down to the determination and skill set of the attackers.
  • 5. 5 Building a SOC What is the Current Position? Operate Extend BuildNext Steps Maybe an organisation has some elements in place in that constitute a SOC, potentially larger organisations may have fairly mature operations already established. The decision is whether to:
  • 6. 6 Building a SOC What is required? There are several key steps and key considerations in building an effective SOC and the next generation SOC. The three key areas which are well known are: • People • Process • Technology
  • 7. 7 Threat a key starting point Firstly we know to understand the threat landscape Threat Source Capability (0-5) Motivation (0-5) Total Organised Crime 4 2 8 Internal Employees 5 1 5 Activist Groups 3 2 6 Competitors 3 1 3 Foreign Intelligence Services 5 1 5 Media/Journalists 3 3 9 Hacking Groups 4 1 4
  • 8. 8 People - Traditional Viewpoint SANS Building a World Class SOC Roadmap Skilled people are key to a successful SOC. Whilst there are no absolute set standards the typical roles to be fulfilled include: Role Description Competence/Training Tier 1 Alert Analyst Continuously monitors the alert queue; triages security alerts; monitors health of security sensors and endpoints; collects data and context necessary to initiate Tier 2 work. Through understanding of internal processes. Strong knowledge of SIEM tooling and specific vendor tools used in the SOC. Good general understanding of incident response. Tier 2 Incident Responder Performs deep-dive incident analysis by correlating data from various sources; determines if a critical system or data set has been impacted; advises on remediation; provides support for new analytic methods for detecting threats. Advanced forensics knowledge, strong log review skills, malware knowledge, expertise in investigation techniques and standards and procedures.
  • 9. 9 People - Traditional Viewpoint SANS Building a World Class SOC Roadmap Role Description Competence/Training Tier 3 Subject Matter Expert/Hunter Possesses in-depth knowledge on network, endpoint, threat intelligence, forensics and malware reverse engineering, as well as the functioning of specific applications or underlying IT infrastructure; acts as an incident “hunter,” not waiting for escalated incidents; closely involved in developing, tuning and implementing threat detection analytics. Advanced knowledge of anomaly detection, deep dive investigations, malware reverse engineering, in depth penetration testing techniques. A highly experienced technical professional. SOC Manager Manages resources to include personnel, budget, shift scheduling and technology strategy to meet SLAs. Security management skills, understanding of risk, architecture, security strategy.
  • 10. 10 Staffing models SOC teams Several options exist for staffing of the various models Key questions:  Should the organization use its own employees?  Should staff be mixed and partially outsourced?  Should the whole process be fully outsourced?
  • 11. 11 Employees Staffing Characteristics • The organization performs all of its security incident work using its own employees, with limited external support. • Given the skills required in a next generation SOC this is extremely difficult to achieve.
  • 12. 12 Partially outsourced Staff Characteristics: • The organization outsources portions of its incident response work to an MSSP.
  • 13. 13 Fully outsourced Staff Characteristics: • Complete outsourcing of incidents to an onsite contractor that is supervised and overseen by own staff.
  • 14. 14 Selecting the appropriate model Team model selection factors Factors to be considered • The need for 24/7 availability • Full time or part-time members • Cost • Expertise • Outsourcing • Technical Resources
  • 15. 15 Process Process Maturity and the Human Factor is key • Clear defined processes are fundamental to the success of a SOC. Such process need to be repeatable and clearly defined and understood. • NIST SP800-61 R2 Computer Security Incident Handling Guide and ISO 27035 can provide some clear guidance in this area. • However our aim is not to define rigid inflexible processes. Our analysts need to be able to use their own expertise and skills to provide an effective service.
  • 16. 16 Red and Blue Teams Processes which require rules of engagement • Blue teams usually defend information systems (main part of a SOC). • Red teams are employed to test the defences and launch attacks to test not only defences but the organisations ability to detect and respond. • These teams are at the cutting edge of any mature SOC but clear rules of engagement must be defined.
  • 17. 17 Technologies A blend of technology Security Monitoring – Beyond SIEM Vulnerability scanners, firewalls, WAFs, IDS/IPS Asset data, threat intelligence. System logs, FIM Solutions Network traffic, endpoint data, security events
  • 18. 18 Context Data requires clear context • Alerting tools can provide many individual pieces of information. • Individual pieces of information such as ip address of an endpoint does not however tell the whole story. • Rich data from multiple sources as such asset type, time, known/detected vulnerabilities, user action, file types and threat intelligence can mean the difference when deciding on key actions.
  • 19. 19 The next generation SOC Where are things heading? Many technologies, processes and skills are required but what does a next generation SOC look like? First we need to understand the various generations: Image from HP Arcsight 5G SOC Business Whitepaper
  • 20. 20 Next Generation • Automated solutions which can analyse large data sets can more effectively identify threats and attacks using machine learning. • Automation does not replace the analyst but allows analysts to be more focussed on the human aspects of attacks and intelligence • Whilst attacks maybe automated ultimately attacks are driven based on human behaviour. Our analysts need therefore to be more than technical experts. They need to understand topics like counter intelligence, surveillance and criminal psychology. Analytics, Big Data and Human Behaviour
  • 21. 21 Next Generation “It takes constant monitoring and maximum use of data to find attacks and abnormal behaviour before damage is done. But the world produces over 2.5 quintillion bytes of data every day, and 80 per cent of it is unstructured. This means it’s expressed in natural language — spoken, written or visual — that a human can easily understand but traditional security systems can’t.”  — IBM Cognitive Security Analytics, Big Data and Human Behaviour – a quote from IBM
  • 22. 22 Next Generation • With this considered the ability to analyse large data sets of threat and business intelligence to detect patterns is a key skills of an equipped SOC. This means mathematicians, statisticians, and data scientists play a role as the next SOC analyst. • Threat intelligence is a crucial input but does not come from one source. SOC leaders need to be identifying data from multiple sources. • Red and Blue teams roles increase in importance for instant readiness along with hunt teams freed from day to day processes. Analytics, Big Data and Human Behaviour
  • 23. 23 Next Generation • All of the traditional areas of focus for a SOC still apply though new areas exist:  IoT devices  API’s  Remote Access Solutions  Cloud services  Converged networks  Web based applications  Endpoints and devices  Federated identity management systems Focus Areas
  • 24. 24 Next Generation • A next generation SOC has at its heart: • Collection of raw logs and live data from all parts of the environment • Ability to use predictive analysis based on vast data sets including human intelligence • Threat detection from multiple sources • Multi skilled dynamic teams • A business focus and delivery of a holistic service • The ability leverage non security tools to analyse data • The environment to share and receive knowledge and expertise across industry What sets a next generation SOC apart?
  • 25. 25 Key Messages • A SOC is at the heart of any organisation’s security posture. • It needs to be dynamic constantly learning and adapting. • Skilled and motivated people are crucial to success. Learning and experience is constant. • Tasks can be shared with third parties but internal ownership is of paramount importance. • Preventative controls will only take you so far. • Automation to interrogate large data sets to add context to provide intelligence will support the right decisions. • A SOC should cover all aspects of an organisations architecture and should be aligned to real business processes. Key Messages
  • 26. 26 THANK YOU +44 01609 760293 graeme@parkersolutionsgroup.co.uk www.parkersolutionsgroup.co.uk https://www.linkedin.com/in/graemeparker/ twitter.com/parkerinfosol fb.com/Parker-Solutions-Group-113377915344272/