Are You Building an Effective SOC?
Today, businesses spend heavily on cybersecurity. But to get value for their money, they need an overarching strategy. The state-of-the-art approach is to build an effective security operations center (SOC).
An SOC is commonly referred to as the central command center for cybersecurity operations. A team of security analysts uses advanced detection tools to identify, record and repel cyberattacks. The analysts work with a playbook of processes laying out the steps they need to take to keep their organization secure.
Many large businesses have implemented successful SOCs, especially those dealing with sensitive data such as personally identifiable information (PII). Typically, these include financial and retail companies but also those working with governments and organizations looking to digitize services and use big data.
More mid-sized businesses are following suit, though the majority prefer to outsource their SOC to reduce costs. Companies that offer outsourced cyber protection are known as managed security services providers (MSSP).
Organizations often build an SOC when they have dozens of security tools operating across their network but struggle to make sense of all the data they produce. Large organizations typically have products from 40 to 60 security vendors, ranging from endpoint-protection and intrusion-detection systems to firewalls and scanning tools. Each security tool can generate large volumes of data about network activity and any suspicious exploits.
For organizations about to embark on the SOC journey, there are five important questions that boards and chief information security officers should ask before they start building an SOC that is both customized and effective.
- Why build it? Be clear about what you plan to achieve with an SOC. The aim is to reduce cybersecurity threats, defend the organization’s data, and protect its reputation. What will be the key performance indicators (KPIs)? These could include incident response times. There should also be agreements between the CISO and the board that set out the level of risk management services the SOC will offer. These can be listed in service level agreements (SLAs) which specify areas such as the speed of response and processes for reporting critical threats.
- When to deliver? With over 30 possible SOC services, a common pressure is to try and launch everything from day one. Instead, the services should be introduced in logical stages. This could follow a capability maturity model, a methodology for laying out the evolution of software processes, typically in five stages. The SOC would complete the first phase, then the CISO and board would check and assess this before moving on to the following stage. This means each stage is fully implemented and functional before going to the next.
- How do you deliver? Decide on the processes you need to follow to make the SOC efficient. Playbooks and process diagrams are a key discussion point.
- Who is responsible? Outside of the security division in an organization, who else has a say to make the SOC effective? Departments such as human resources, compliance, and public relations are some common examples.
- What is the technology set up? A key decision is which SOC tools should be used. This will depend on the objectives, budgets and preferences of the security analysts and the CISO. Tools usually include a security information and event management system (SIEM). This is a dashboard which analyses all security events—possible threats—which affect an organization’s computer network. It is important to remember that a SIEM is not a replacement for an SOC, but just one tool in the SOC’s armory. There must also be a ticketing system, so when a threat is identified, a ticket or record is created. This allows teams to seamlessly hand over their workload to other shifts. There could also be a security orchestration and response tool (SOAR), which automates the collection and analysis of low-level threat intelligence.
What is so powerful about an SOC is that it goes further than simply identifying and dealing with security incidents. Threat hunting is a vital part of the risk management work of security analysts. They will work with cybersecurity vendors to list possible threats. And they may work with computer emergency response teams (CERTS), which are industry-wide groups that analyse security incidents. The goal is to gather data on so-called indicators of compromise—as cyber threats are known—and allow analysts to compare the threats they receive with other companies in their field.
Building an effective SOC requires clear thinking and strong vision. Done well, an SOC is not a cost but an investment in data protection and corporate reputation. As you plan the cybersecurity strategy for your organization—and consider the essential tools—here are some key takeaways:
- Organizations create a security operations center when they have dozens of cybersecurity tools operating across their network and need visibility and context to identify threats and reduce risk.
- An SOC not only identifies and responds to security threats, it also hunts and predicts possible sources of attack.
- The what, when, how, and who questions can only be answered when we can clearly articulate why we are building an SOC.
- An SOC helps organizations move from reactive to proactive threat management.
Now, what if want to take your SOC to the next level? Stay tuned, as I’ll address this question in the second article of this two-part series on creating an effective security operations center.