How to build a SOC with limited resources

HOW TO BUILD A SOC WITH LIMITED RESOURCES Introduction Some organisations have formal security operations centres (SOCs). Formal 24x7 SOCs are tightly secured areas where teams of dedicated analysts carefully monitor for threats around the clock, every day of the year. The analysts are checking their organisation’s enterprise security controls to identify possible signs of intrusion and compromise that may require a response by the organisation’s incident responders. Unfortunately, most organisations cannot afford a 24x7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefit for almost every organisation. Instead, most organisations either make do with an informal SOC comprised of a small number of analysts who have many other duties to perform or have no SOC at all and rely on borrowing people from other roles when needed. Security events are not consistently monitored around the clock. This leads to major delays in responding to many incidents, while other incidents go completely unnoticed. It’s a dangerous situation that results in damaging cyber incidents. It is also highly unlikely that analysts will have any time to be proactive in looking for threats and attacks. And when an event does occur, many organisations are not able to efficiently and effectively respond, because they do not have formal incident response processes and capabilities in place. For organisations caught between the prohibitive cost of a formal SOC and the wholly inadequate protection from an informal SOC, there is a solution: building a SOC that automates as much of the SOC work as possible. Automation can help a team perform constant security event monitoring and analysis in order to detect possible intrusions. It can also provide incident response automation and orchestration capabilities to manage and expedite incident handling. A threat lifecycle management platform is the ideal foundation for building a SOC because it provides all of these automated capabilities in a single, fully integrated system. The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC. WWW.LOGRHYTHM.COM PAGE 3 HOW TO BUILD A SOC WITH LIMITED RESOURCES The Cyber Attack Lifecycle Understanding the Cyber Attack Lifecycle is a prerequisite to understanding the Threat Lifecycle Management (TLM) framework—the foundation of SOC operations. The Cyber Attack Lifecycle consists of six phases: Figure 1: The Cyber Attack Lifecycle Phase 1: Reconnaissance Phase 5: Target attainment This phase can involve a wide range of activities, but at its core, the attacker identifies a target and determines how to start the attack against that target. In the final system compromise, the attacker gains access to the target system. Phase 6: Exfiltration, corruption, and disruption Phase 2: Initial compromise In the next phase, the attacker attacks a system on the internal network and gains access to it. This system is usually not the ultimate target. Phase 3: Command and control The attacker installs tools on the compromised system in order to maintain access to it. Phase 4: Lateral movement Next, the attacker uses the compromised system and its user accounts to identify additional systems to access and compromise. This may be repeated several times so that the attacker can move throughout the enterprise. Finally, the attacker accomplishes the attack’s objective, such as exfiltrating the system’s sensitive data to an external location, or disrupting the organisation’s operations by corrupting the target system’s files or databases. The Cyber Attack Lifecycle indicates that organisations often have numerous opportunities to detect and respond to an attack in progress because a single attack involves many steps. The earlier in the lifecycle an organisation detects an attack, the more likely it is that the organisation can respond in time to prevent a serious data breach or other major compromise from occurring. The Cyber Attack Lifecycle indicates that organisations often have numerous opportunities to detect and respond to an attack in progress because a single attack involves many steps. WWW.LOGRHYTHM.COM PAGE 4
Please complete the form to gain access to this content