- What is a SOC?
- SOC Activities vs. CSIRT activities
- What is a SIEM? What for?
- SOC mission and context
- SOC/CERT processes and workflow
- What is purple/red/blue team?
- Attack lifecycle
- Most common infection vectors
As per MITRE paper (SOC strategies, see below):
Data, tools, and capabilities:
Some people may consider SOC has evolved in time, as the following drawing shows (from this article):
I do believe it mostly depends on the context (environment t o the monitored), and the cyber maturity. And on top of that, AI (meaning Artificial Intelligence) still does not exist per say....
As per ENISA's whitepaper, a minimal set of services for SOCs usually includes those in bold below in accordance with the FIRST services framework:
As per ENISA's whitepaper, a minimal set of services for CSIRTs usually includes those in bold below in accordance with the FIRST services framework:
As per Gartner's glossary:
Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards and reporting).
And as per this article (in French):
As per MITRE paper (SOC strategies, see below):
As per NIST SP800-61 rev2 paper (see below):
As an IT security teacher used to tell his students, like a SOC motto: "Without response, detection is useless" (Freely inspired from Bruce Schneier, Secrets and Lies: Digital Security in a Networked World book).
As per ENISA paper see below:
- Write and maintain in time alerts/incident handling procedures.
- My recommendation: take those from CERT-SG, IRM, as an example.
Quoting Lutessa (article in French):
As per Mandiant article:
Based on experience, and on numerous malware statistics, the following ones should be considered as priority:
- emails;
- web browsing;
- USB sticks / removable storage;
- exposed (internet facing) services/apps and equipments (e.g.: appliances)
Go to main page.