What does a Security Operations Center do and why is it important?
- Monitor and analyze events from the different sources to detect possible malicious behavior.
- Identify security risks, global trends, sector trends and company trends that could affect the company.
- Prevent the materialization of a security risk using a proactive security analysis of information assets of the company. As a result you will have a risk mitigation plan.
- Manage security incidents in order to reduce the Impact of the materialized risk in the company
- Support company areas that need it in security crisis.
Technology, Process and People
Some options that you can find in the market are:
- SIEMonster
- ELK + some plugins
- OSSIM
- LogRhythm
- Qradar
- Splunk
- ArcSight
- Perimeter security solutions: Firewall, VPN, Proxy
- Network security solutions: NAC, IDS/IPS, vulnerability scanner
- Endpoint security solutions : Antivirus, DLP, EDR
- Infrastructure monitoring tools
- Applications and OS logs
- Vulnerability scanner
- Application log analyzer
- Forensic tools
Some of the technologies of this category are:
- Ticketing
- Reporting
- Inventory
- Crown jewel: Which are the critical information assets? Where are them? How are them protected? How you plan to protect them?
- Risk management: How to identify, classify and manage risks in the company? Who is the responsible of an information asset and who is responsible of its protection?
- Incident response: Which are the parameters for classify an incident as low, medium, high or critical priority? Who must be informed? Who is responsible of the mitigation?
- Security awareness: Is the CEO aware of the importance of security information in the company? Are the employees aware of their responsibility in the company security? Does the budget of the company includes investment on cybersecurity?
- Continuous evolution: Does the SOC direct communication with cybersecurity community? Does the SOC direct communication with another SOCs in order to share IoCs, troubleshooting, etc? Are there documentation processes to ensure that the well-known problems database keep updated?
- Information segmentation: Who has view access to a specific information asset? Who has edition access to a specific information asset?
- Defensive and offensive security
- Networking
- System administration
- Forensics
- Communication
- Client management
- Project management
- Problem solving
- Teamwork