Cyber-attack volume and the cost of cybercrime continue to grow. Market uncertainty constrains budgets, including those for cybersecurity. Threats continue to evolve and step up their attack pace.
Your business pursues growth and innovation goals. It embraces more technology, moves more to the cloud, and hires more people working remotely. Your critical infrastructure expands, access points multiply, and you realize you must develop a more formalized security practice.
Your executive team is calling for assurances of resilience in the face of all this uncertainty. The business can’t afford an attack that might tarnish its reputation, cause financial damage, or halt the momentum for new product launches and entering three new markets this year.
You assess your current security conditions:
After considering what’s going on in the world externally, as well as within your business, you conclude that your organization needs a security operations center (SOC). It’s imperative to improve threat detection and decrease the likelihood of security breaches.
A security operations center is a physical or virtual facility designed to protect an organization from cybersecurity threats 24/7. The goal is relentless vigilance over a company’s IT infrastructure, including networks, servers, endpoints, databases, applications, and cloud environments. The outcome to achieve is to protect the company's information assets from unauthorized access, use, disclosure, alteration, or destruction.
The SOC team sets rules and continually monitors networks, servers, devices, operating systems, applications, and databases for signs of security anomalies and exceptions or new vulnerabilities. It collects threat data from firewalls, intrusion detection and prevention systems, endpoint detection and response (EDR) and security information and event management (SIEM) systems.
When a system detects suspicious activity or a breach, it triggers an alert to the SOC team, which investigates and responds to them as they occur.
Figure 1: Typical SOC Data and Tools
Here are 7 practical steps to building a SOC for your business:
The first step is to clarify your business objectives for building the SOC. Part of this exercise involves determining which systems and data are most critical to sustaining the company’s operations. Simply creating a SOC to improve your security posture without factoring in the overarching business goals could result in misalignment and even cause the SOC to miss a key threat that culminates in a devastating cyber incident.
The next step is to assess your company’s existing SOC capabilities in terms of people, processes, and technology. If you’re starting from scratch, limit your SOC’s initial scope to core functions (i.e., monitoring, detection, response, and recovery). Delay more advanced functions, such as vulnerability management, until your core functions have matured sufficiently.
When designing your solution, start by selecting a few business-critical use cases and define your initial SOC solution based on these, bearing in mind that it will need to scale to meet additional future needs. Keeping your initial solution’s design conservatively scoped in the early stages will reduce the time it takes you to implement it and see results.
Follow these steps to complete the design process:
If you’re building a partially outsourced solution, it’s vital to work with your managed security services provider (MSSP) to ensure mutual agreement for processes, procedures, and training.
Before you deploy your SOC, check that all components are fit-for-purpose and guarantee a secure environment. This should include protecting your SOC staff’s devices, and that robust access management and authentication mechanisms are in place.
Follow these steps for your initial SOC deployment:
Now that you’ve deployed your SOC’s core capabilities, you can start implementing use cases across analytics, security automation, and orchestration tiers. This might include detecting compromised credentials or successful spear phishing campaigns.
Once your SOC is in production, it will need ongoing maintenance, such as updates to configuration settings and adjustments to improve detection accuracy. In time, you can consider adding other systems, either as inputs or outputs to advance your security maturity.
There are many moving parts to building a Security Operations Center but thinking of them in steps makes the challenge achievable.