Published: 06 September 2018
Summary
Technical professionals working on security operations may decide to centralize all or part of these activities into a SOC to increase the maturity of their security practices. This guidance presents a structured approach to plan, establish and efficiently operate a modern SOC.
Included in Full Research
- Boundaries of a Modern SOC
- Prework
- Validating Motivation and Drivers
- SOC Prerequisites
- Leveraging External Help
- Mix and Match to Win
- The SOC Business Case
- Plan
- Defining Your SOC Functions and Scope of Responsibility
- Organizational Structure of Your SOC
- Defining the SOC Hybrid Model
- Organizational Links of a SOC
- Implement the SOC
- Implement the SOC Process Framework
- Deploy or Integrate the SOC Tools
- Assemble the SOC Team
- The SOC Implementation Project
- Operate the SOC
- Running a 24/7 Operation
- Workforce Management
- Working With an MSSP
- Measuring the SOC Performance
- Improve the SOC
- Evolve and Expand the SOC
- Start Proactive Threat Hunting
- Shift Away From the Alerts-Only Model
- Implement Automation and Orchestration Tools
- Introduce Deception Techniques
- Evolve to Producing Your Own Threat Intelligence
- Expand the Utilization of Advanced Analytics Tools
- Keep Testing Your SOC
- Improving SOC Maturity