Security Operations Center:
A Security operations center (SOC) is that facility or multiple
facilities of an organization or an organization’s service provider having
qualified people using string set of technology solution and a strong set of
process. The operation conducted by a SOC is of continuous monitoring,
analyzing and responding to security posture and the threat to an organization.
The Three tenant of a Security Operating Center are People, Process
and System. The harmonic synchronization of the three provides the organization
with Visibility, Analysis, and Action.
- People: Includes trained people with certification, knowledge and
vendor specific experience and skills.
- Process: Includes preparation, analysis, recovery, identification,
containment, learning and knowledge retentions & transfer.
- System: Includes the End Point Protection, Perimeter Security,
Data Center Security, Forensics and Incident Detection Management.
This allows for Data Aggregation, Data Analysis and 360 degree real time
dashboard for the organization to detect, prevent and respond to any threat at
the same time to do Forensics.
https://youtu.be/uj8PuaXyygU
https://youtu.be/uj8PuaXyygU
The SOC operation typically can be broken up into Monitoring,
Analyzing and Responding to Insider threat and that too of outsider threat.
- The insider threat would
typically be from employees or value chain partner like supplier and buyers.
And organization would want the SOC to monitor Identity & Access Manager
(IAM), Privileged Access Manager (PAM), Active Directory, Data Leakage
Prevention(DLP), Compliance tools, etc.
- The Outsider Threat is
monitoring of Network Security – Firewall, Network IPS, Network Security
Appliance for Email, The Web, etc., End Point Security, Data Center Security,
NAC, Network Access Control.
A typical SOC would have some form of SIEM – Security Incident Event
Monitoring and a Log collector to collect log from various security tools at
various sites and some for security intelligence.
An organization should look at the tool and solution that address
these new challenges to security in their Security Operating Center. All this
requires to look into various facets of security, and this would involve data
monitoring inside and outside of organization which is structured and
unstructured at the same time would be in high volumes, varsity, and velocity
hence organization or their service provider would need Artificial Intelligence
(AI) to help them.
Future looking SOC would not just monitor IT, but also OT (Operational Technology /Industrial) asset
should have various advance treat analytics solution embedded along with threat
intelligence, Integrated real-time dash board along with Forensic capabilities
to allows access to the SOC provider customer in case organization use a third
party SOC. Most importantly the SOC should be global and be having redundancy.
It is imminent that Artificial intelligence is plugged to the SOC and the
organization ties up with the external academics research center to get updates
on research being carried out in the Security landscape.
No comments:
Post a Comment