Major Roles Of The Security Operation Centre

Major roles of the security operation centre

Major Roles Of The Security Operation Centre

 

 

 

Defending against today’s threats requires a formalized, structured, and disciplined approach. Organizations typically use the services of professionals in a Security Operations Center (SOC). SOCs provide a broad range of services, from monitoring and management to comprehensive threat solutions and hosted security that can be customized to meet customer needs. SOCs can be wholly in-house, owned and operated by a business, or elements of a SOC can be contracted out to security vendors, such as Cisco’s Managed Security Services. This article talks about the major roles of the Security Operation Centre. 

 

Roles In Security Operation Centre

Job roles in a SOC are rapidly evolving. Traditionally, SOCs assign job roles by tiers, according to the expertise and responsibilities required for each. First tier jobs are more entry level, while third tier jobs require extensive expertise.

 

  • Tier 1 Alert Analyst – These professionals monitor incoming alerts, verify that a true incident has occurred, and forward tickets to Tier 2, if necessary.
  • Tier 2 Incident Responder– These professionals are responsible for deep investigation of incidents and advise remediation or action to be taken.
  • Tier 3 Threat Hunter – These professionals have expert-level skill in network, endpoint, threat intelligence, and malware reverse engineering. They are experts at tracing the processes of the malware to determine its impact and how it can be removed. They are also deeply involved in hunting for potential threats and implementing threat detection tools. Threat hunters search for cyber threats that are present in the network but have not yet been detected.
  • SOC Manager – This professional manages all the resources of the SOC and serves as the point of contact for the larger organization or customer.

 

Processes in the SOC

The day of a Cybersecurity Analyst typically begins with monitoring security alert queues. A ticketing system is frequently used to assign alerts to a queue for an analyst to investigate. Because the software that generates alerts can trigger false alarms, one job of the Cybersecurity Analyst might be to verify that an alert represents a true security incident. When verification is established, the incident can be forwarded to investigators or other security personnel to be acted upon. Otherwise, the alert may be dismissed as a false alarm.

 

If a ticket cannot be resolved, the Cybersecurity Analyst will forward the ticket to a Tier 2 Incident Responder for deeper investigation and remediation. If the Incident Responder cannot resolve the ticket, it will be forwarded it to Tier 3 personnel with in-depth knowledge and threat hunting skills.

 

SIEM Technology

As shown in the figure, a SOC needs a security information and event management system (SIEM), or its equivalent. SIEM makes sense of all the data that firewalls, network appliances, intrusion detection systems, and other devices generate.

 

SIEM systems are used for collecting and filtering data, detecting and classifying threats, and analyzing and investigating threats. SIEM systems may also and manage resources to implement preventive measures and address future threats. SOC technologies include one or more of the following:

 

  • Event collection, correlation, and analysis
  • Security monitoring
  • Security control
  • Log management
  • Vulnerability assessment
  • Vulnerability tracking
  • Threat intelligence

SOAR System

SIEM and security orchestration, automation and response (SOAR) are often paired together as they have capabilities that complement each other.

Large security operations (SecOps) teams use both technologies to optimize their SOC. It is estimated that 15% of organizations with a security team of larger than five people will utilize SOAR by the end of 2020.

SOAR platforms are similar to SIEMs in that they aggregate, correlate, and analyze alerts. However, SOAR technology goes a step further by integrating threat intelligence and automating incident investigation and response workflows based on playbooks developed by the security team.

 

Some of the attributes include:

#1 Orchestration

This creates a customised platform that integrates and coordinates numerous security tools and resources.

 

#2 Automation

This executes security processes with a minimum amount of human intervention. It help address the shortage i cybersecurity analyst talent and increases efficiency. 

 

#3 Response 

This prescribes and execute security procedures to be followed in response to security events. It can be in the form of a security runbooks that consists of rule-based automated responses that were created to address specific type of events. 

 

SOC Metrics

A SOC is critically important to the security of an organization. Whether the SOC is internal to an organization, or providing services to multiple organizations, it is important to understand how well the SOC is functioning in order so that improvements can be made to the people, processes, and technologies that comprise the SOC.

Many metrics, or key performance indicators (KPI) can be devised to measure different specific aspects of SOC performance. However, five metrics are commonly used as SOC metrics. Note however, that metrics that describe blanket performance frequently do not paint an accurate picture of SOC operation due to the diversity of cybersecurity threats. Several common metrics compiled by SOC managers are:

  • Dwell Time – the length of time that threat actors have access to a network before they are detected, and their access is stopped.
  • Mean Time to Detect (MTTD) – the average time that it takes for the SOC personnel to identify valid security incidents have occurred in the network.
  • Mean Time to Respond (MTTR) – the average time that it takes to stop and remediate a security incident.
  • Mean Time to Contain (MTTC) – the time required to stop the incident from causing further damage to systems or data.
  • Time to Control – the time required to stop the spread of malware in the network.

 

Enterprise And Managed Security

For medium and large networks, the organization will benefit from implementing an enterprise-level SOC. The SOC can be a complete in-house solution. However, many larger organizations will outsource at least part of the SOC operations to a security solutions provider.

Cisco has a team of experts who help ensure timely and accurate incident resolution. Cisco offers a wide range of incident response, preparedness, and management capabilities including:

  • Cisco Smart Net Total Care Service for Rapid Problem Resolution
  • Cisco Product Security Incident Response Team (PSIRT)
  • Cisco Computer Security Incident Response Team (CSIRT)
  • Cisco Managed Services
  • Cisco Tactical Operations (TacOps)
  • Cisco’s Safety and Physical Security Program

 

Security and Availability

Most enterprise networks must be up and running at all times. Security personnel understand that for the organization to accomplish its priorities, network availability must be preserved.

Each business or industry has a limited tolerance for network downtime. That tolerance is usually based upon a comparison of the cost of the downtime in relation to the cost of ensuring against downtime. For example, in a small retail business with only one location, it may be tolerable to have a router as a single point of failure. However, if a large portion of that business’s sales is from online shoppers, then the owner may decide to provide a level of redundancy to ensure that a connection is always available.

Preferred uptime is often measured in the number of down minutes in a year, as shown in the table. For example, a “five nines” uptime means that the network is up 99.999% of the time or down for no more than 5 minutes a year. “Four nines” would be a downtime of 53 minutes a year.

Availability % Downtime
99.8% 17.52 hours
99.9% (“three nines”) 8.76 hours
99.99% (“ four nines” ) 52.56 minutes
99.999% (“five nines”) 5.256 minutes
99.9999% (“six nines“ ) 31.56 seconds
99.99999% (“seven nines“ ) 3.16 seconds

However, security cannot be so strong that it interferes with the needs of employees or business functions. It is always a tradeoff between strong security and permitting efficient business functioning.

Action Point

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.

Download Our App.

         

CEHNigeria On Google Playstore

Download Our Blog App On Google Playstore.

 

         

GET SEOPOZ. OUTSMART YOUR BLOG COMPETITORS

Have a deeper understanding of Google Search Console. Join SEOPOZ for free.

Join Our Whatsapp Group Here

         

Join Our Whatsapp Group

Follow Us On Twitter and I will Follow Back

         

Follow Us On Twitter

Kindly follow me on Twitter and I promise I will follow back. Aside you will get updated when we post new articles.

About Adeniyi Salau 884 Articles
I am an IT enthusiast and a man of many parts. I am a Certified Digital Marketer, Project Manager and a Real Estate Consultant. I love writing because that's what keeps me going. I am running this blog to share what I know with others. I am also a Superlife Stem Cell Distributor. Our Stem Cell Products can cure many ailments.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


CommentLuv badge