Most security operations centers (SOCs) today use security information and event management (SIEM) tools — but security is not solely about products and technologies. When designing a SOC, security leaders must consider other factors too. These include business requirements, the skills of the analysts working in the SOC, the team’s scope and responsibilities and the organization’s security budget.

Classifying SOC Investments and Defining Roles

The budget largely depends on the delivery model. For example, while an on-premises SOC requires a substantial initial investment, it can be classified as a capital expenditure. Therefore, it is only subject to depreciation for tax purposes. A software-as-a-service (SaaS) model reduces the initial investment, but it can only be capitalized as an operational expense.

Whether the SOC is delivered on-premises or as a SaaS, it needs to be managed. While the general IT staff can manage the SOC platform, security administrators and analysts must handle security incidents. These two roles require vastly different sets of skills and expertise. The security leaders overseeing the SOC must also have a thorough understanding of who is responsible for what. Administrative tasks include resetting passwords and managing the SIEM, while maintenance tasks include installing patches and ensuring that security controls are properly configured.

Maximizing Incident Response Capabilities

The interaction with the computer security incident response team (CSIRT) process is also very important. By performing an immediate analysis of the security incident at hand (and using a predefined response runbook), the SOC team can be as proactive as possible. During the security incident analysis phase, the use of cognitive technologies can help analysts quickly build the attack pattern and break the kill chain. Integration with a patch management system is also crucial, as this can help analysts block attacks before they cause any damage, saving both money and invaluable time.

While a security administrator can analyze offenses, manage security incidents and install patches, these tasks are particularly time-intensive. During the time it takes to examine a security event, attackers can generate new threats and infiltrate other areas of the network. For this reason, a CSIRT is more capable of managing threats to the entire system. Some individuals on the team might have multiple responsibilities, but it’s important to clearly define those roles.

It’s equally important for service providers to understand their clients. Thus, the SOC platform should support multitenancy to guarantee segregation of data. As a general requirement, the SIEM should fully integrate with other security controls and CSIRT processes.

The fusion SOC — a kind of mega-SOC used to manage multiple security environments — is becoming increasingly popular. In some cases, the fusion-SOC is used to manage security controls within individual organizations. In other cases, it manages different types of SOCs altogether, such as traditional IT, operational technology and more.

Security leaders must also consider the Internet of Things (IoT) when designing an SOC. When a new connected device is introduced into the environment, analysts must ensure that users and manufacturers are held accountable for their security.

Defending the Perimeter

Finally, one of the primary directives of an SOC team is to identify and defend the perimeter. Let’s imagine that an SOC team implemented a physical segmentation, which usually focuses on prevention — as opposed to logical segmentation, which focuses on detection. What information do the analysts need to collect? Where is the information located?

The SOC team should consider:

  • Network information, such as hashes, URLs, connection details, etc.
  • Vulnerability information reported by vulnerability scanners
  • Security intelligence feeds
  • Topology information
  • Web proxy URL
  • External-facing firewall
  • Antivirus
  • Virtual private networks (VPNs)
  • Radius/Lightweight Directory Access Protocol (LDAP)
  • Endpoint monitoring
  • Domain name system (DNS)
  • Dynamic Host Configuration Protocol (DHCP)
  • Intrusion prevention (IPS) and detection (IDS) systems
  • Operating systems (OSs)
  • Other syslogs

The more data and context the SOC collects, the more events per second and flows per interval analysts must manage. This impacts the costs associated with the SIEM and its administration. In general, the security administrator can focus on the most critical incidents by optimizing and tuning SIEM rules.

It goes without saying that reducing the amount of data collected negatively impacts analysts’ ability to detect incidents and minimize false positives. Furthermore, more sophisticated attacks usually require more context to successfully detect. This is why it’s crucial to implement both physical and logical segmentation. The same goes for configuration management — if not properly optimized, some data sources might induce management difficulties. While using fewer sources can simplify the management of this data, it also reduces the SOC’s detection capabilities.

First Line of Defense: The Security Operations Center

Designing a SOC is not as simple as installing an SIEM and watching the gears turn. In addition to investing in the right technology, security leaders must ensure that their strategy aligns with human factors and business needs. They must also make sure their analysts are focusing on collecting the right data.

In today’s volatile cybersecurity landscape, the SOC team is the first line of defense against rapidly evolving threats. The better-equipped analysts are to efficiently manage these threats — and the more security leaders are able to demonstrate the value of the SOC to business leaders — the safer corporate data will be from sophisticated cybercriminals looking to exploit it.

Watch the on-demand Webinar: 5 Building Blocks for a SOC That Rocks

More from Intelligence & Analytics

2022 Industry Threat Recap: Finance and Insurance

The finance and insurance sector proved a top target for cybersecurity threats in 2022. The IBM Security X-Force Threat Intelligence Index 2023 found this sector ranked as the second most attacked, with 18.9% of X-Force incident response cases. If, as Shakespeare tells us, past is prologue, this sector will likely remain a target in 2023. Finance and insurance ranked as the most attacked sector from 2016 to 2020, with the manufacturing sector the most attacked in 2021 and 2022. What…

And Stay Out! Blocking Backdoor Break-Ins

Backdoor access was the most common threat vector in 2022. According to the 2023 IBM Security X-Force Threat Intelligence Index, 21% of incidents saw the use of backdoors, outpacing perennial compromise favorite ransomware, which came in at just 17%. The good news? In 67% of backdoor attacks, defenders were able to disrupt attacker efforts and lock digital doorways before ransomware payloads were deployed. The not-so-great news? With backdoor access now available at a bargain price on the dark web, businesses…

Cyber Storm Predicted at the 2023 World Economic Forum

According to the Global Cybersecurity Outlook 2023, 93% of cybersecurity leaders and 86% of business leaders think a far-reaching, catastrophic cyber event is at least somewhat likely in the next two years. Additionally, 43% of organizational leaders think it is likely that a cyberattack will affect their organization severely in the next two years. With cybersecurity concerns on everyone’s mind, the topic received top billing at the recent World Economic Forum’s Annual Meeting 2023 in Davos, Switzerland. At the meeting, Matthew…

2022 Industry Threat Recap: Manufacturing

It seems like yesterday that industries were fumbling to understand the threats posed by post-pandemic economic and technological changes. While every disruption provides opportunities for positive change, it's hard to ignore the impact that global supply chains, rising labor costs, digital currency and environmental regulations have had on commerce worldwide. Many sectors are starting to see the light at the end of the tunnel. But 2022 has shown us that manufacturing still faces some dark clouds ahead when combatting persistent…