Building a SOC
What does a
SOC really
mean?
Actual SOC
https://en.wikipedia.org/wiki/Securit
y_operations_center
What do they look like?
They come in different flavors too
Per Gartner here are some common models
● Virtual SOC
● Dedicated SOC
● Distributed/Co-managed SOC
● Command SOC
● Multifunction SOC / network operations center (NOC)
● Fusion SOC
Who am I
Old Prolexic Engineer
Spent some time building SOCs for/with Splunk
Co-Founded Zenedge
Here to share the best advice I have on building
a SOC
Funny pic here
At a 50k foot view
Building a SOC is about enlisting
talented people you can hire giving them
a analytics pipeline that powers a
process
Business Buy-in Required
Technology
Building a SOC -  hackmiami 2018
Building a SOC -  hackmiami 2018
Building a SOC -  hackmiami 2018
Build VS Buy
Grep/AWK/sed
Graylog
ELK
Sumo
...
Splunk
_New Wave_
JASK
Data sources are your Life force
● Endpoint OSquery/OSSEC
● Network Bro/DNS
● IDs Snort/Suricata
● Identity DHCP/LDAP
● Web WAF/Proxy logs
Analytics Pipeline Reference Architecture
Enrichments (Easy Mode)
Correlations (Medium Mode)
Anomaly Detection (Hard Mode)
http://enigmater.blogspot.com/2017/03/intrusion-detection-based-on-supervised.html
Process
Threat Modeling
● What threats does my organization care about?
● What does a threat look like?
● How does the SOC block/detect the threat?
Responding to Threats
1. Preparation
2. Detection and analysis
3. Containment, eradication, recovery
4. Post-incident Activity (Lessons learned)
Example of a Playbook - POST Flood
1. Detection and analysis request origin increase (bypass cache), notice POSTs
to / on logs, correlate with current threat landscape..UA’s
2. Contact customer
3. Containment, Eradication, Recovery another VCL rule
4. Share attack report
5. Post incident activity (Lessons learned) alerts when POST / , feed IPs to TIDB
for layer 7 attacker not spoofed
People
Tiers
SOC I eyes and ears of operations
output of the SOC I is to triage an event and decide the course of action to take
SOC II Mitigators
correlate and respond to triaged threats detected by SOC I
SOC III Specialists
optimize how a SOC I and SOC II operate, Subject Matter Experts
Feedback Loop
Triage
Investigation
Remediation
Communication
Post Review
Will treating each SIRT
as an production
incident first reduce our
time exposed?
Interview Customers to understand
what changes need to be made, or
hypothesis to test
Run A/B experiments to validate and
measure effectiveness of changes
A
B
SIRT
Be a Human
● Do not over work
● Measure Efforts not Productivity
● The leader reports to his team.. The team has to be the owner
Building a SOC -  hackmiami 2018
In Summary
Every SOC is different and none is perfect
Your customers gotta want it!
processes leads technology
Religiously Actionable Alerts
If all else fails get a pew pew map
Questions
Building a SOC -  hackmiami 2018
Appendix
Agenda
● What really is a SOC
● Intro
● 50k foot view of any SOC
● MSSP vs Internal
● Technology
● Process
● People
● Gotchas
● Questions

More Related Content

PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
Rothke secure360 building a security operations center (soc)
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
When and How to Set up a Security Operations Center
PDF
Building Security Operation Center
Security operations center-SOC Presentation-مرکز عملیات امنیت
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Rothke rsa 2012 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Security Operations Center (SOC) Essentials for the SME
When and How to Set up a Security Operations Center
Building Security Operation Center

What's hot (20)

PPT
SOC presentation- Building a Security Operations Center
PPTX
An introduction to SOC (Security Operation Center)
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PDF
The real cost of a cheap security operations center
PPTX
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
PDF
Strategy considerations for building a security operations center
PPT
Ca world 2007 SOC integration
PPTX
SOC: Use cases and are we asking the right questions?
PPSX
Next-Gen security operation center
PPTX
WHY SOC Services needed?
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PDF
State of Security Operations 2016 report of capabilities and maturity of cybe...
PPTX
Top 10 tips for effective SOC/NOC collaboration or integration
PPTX
Effective Security Operation Center - present by Reza Adineh
PPTX
Security Operation Center Fundamental
PPTX
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
PPTX
SOC Architecture Workshop - Part 1
PPTX
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
PPTX
Security operation center
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
SOC presentation- Building a Security Operations Center
An introduction to SOC (Security Operation Center)
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
The real cost of a cheap security operations center
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Strategy considerations for building a security operations center
Ca world 2007 SOC integration
SOC: Use cases and are we asking the right questions?
Next-Gen security operation center
WHY SOC Services needed?
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
State of Security Operations 2016 report of capabilities and maturity of cybe...
Top 10 tips for effective SOC/NOC collaboration or integration
Effective Security Operation Center - present by Reza Adineh
Security Operation Center Fundamental
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
SOC Architecture Workshop - Part 1
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Security operation center
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration

Similar to Building a SOC - hackmiami 2018 (20)

PPTX
Meet the Ghost of SecOps Future by Anton Chuvakin
PPTX
Security Opeations Center- SOC
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PPTX
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
PPTX
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
PPTX
A SOC: Building Blocks of Digital Defense
PDF
Alienvault how to build a security operations center (on a budget) (2017, a...
PPTX
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
PPTX
Introduction-to-Security-Operations-Center (SOC)
PPTX
Security Operation Center Presentat.pptx
PDF
Security Operations Center (SOC) by aadit technologies
PDF
Building a Security Operations Center (SOC).pdf
PPTX
Is the SOC working as a viable business model (or security model)?
PDF
DTS Solution - Building a SOC (Security Operations Center)
PPTX
A Deeper Dive into SOC Operations and Roles
PPTX
Security Operation Center - Design & Build
PDF
31779261-NOC-and-SOC.pdf
PDF
What is a Security Operation Center(SOC)?
PDF
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
PPTX
7 Steps to Build a SOC with Limited Resources
Meet the Ghost of SecOps Future by Anton Chuvakin
Security Opeations Center- SOC
Building a Cyber Security Operations Center for SCADA/ICS Environments
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
A SOC: Building Blocks of Digital Defense
Alienvault how to build a security operations center (on a budget) (2017, a...
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Introduction-to-Security-Operations-Center (SOC)
Security Operation Center Presentat.pptx
Security Operations Center (SOC) by aadit technologies
Building a Security Operations Center (SOC).pdf
Is the SOC working as a viable business model (or security model)?
DTS Solution - Building a SOC (Security Operations Center)
A Deeper Dive into SOC Operations and Roles
Security Operation Center - Design & Build
31779261-NOC-and-SOC.pdf
What is a Security Operation Center(SOC)?
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
7 Steps to Build a SOC with Limited Resources

Recently uploaded (20)

PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPT
Geologic Time for studying geology for geologist
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Five Habits of High-Impact Board Members
PPT
What is a Computer? Input Devices /output devices
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Getting started with AI Agents and Multi-Agent Systems
DOCX
search engine optimization ppt fir known well about this
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Geologic Time for studying geology for geologist
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Module 1.ppt Iot fundamentals and Architecture
Custom Battery Pack Design Considerations for Performance and Safety
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
Chapter 5: Probability Theory and Statistics
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Hindi spoken digit analysis for native and non-native speakers
Zenith AI: Advanced Artificial Intelligence
The influence of sentiment analysis in enhancing early warning system model f...
Five Habits of High-Impact Board Members
What is a Computer? Input Devices /output devices
Abstractive summarization using multilingual text-to-text transfer transforme...
Consumable AI The What, Why & How for Small Teams.pdf
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Getting started with AI Agents and Multi-Agent Systems
search engine optimization ppt fir known well about this

Building a SOC - hackmiami 2018

  • 2. What does a SOC really mean? Actual SOC https://en.wikipedia.org/wiki/Securit y_operations_center
  • 3. What do they look like?
  • 4. They come in different flavors too Per Gartner here are some common models ● Virtual SOC ● Dedicated SOC ● Distributed/Co-managed SOC ● Command SOC ● Multifunction SOC / network operations center (NOC) ● Fusion SOC
  • 5. Who am I Old Prolexic Engineer Spent some time building SOCs for/with Splunk Co-Founded Zenedge Here to share the best advice I have on building a SOC Funny pic here
  • 6. At a 50k foot view
  • 7. Building a SOC is about enlisting talented people you can hire giving them a analytics pipeline that powers a process
  • 14. Data sources are your Life force ● Endpoint OSquery/OSSEC ● Network Bro/DNS ● IDs Snort/Suricata ● Identity DHCP/LDAP ● Web WAF/Proxy logs
  • 18. Anomaly Detection (Hard Mode) http://enigmater.blogspot.com/2017/03/intrusion-detection-based-on-supervised.html
  • 20. Threat Modeling ● What threats does my organization care about? ● What does a threat look like? ● How does the SOC block/detect the threat?
  • 21. Responding to Threats 1. Preparation 2. Detection and analysis 3. Containment, eradication, recovery 4. Post-incident Activity (Lessons learned)
  • 22. Example of a Playbook - POST Flood 1. Detection and analysis request origin increase (bypass cache), notice POSTs to / on logs, correlate with current threat landscape..UA’s 2. Contact customer 3. Containment, Eradication, Recovery another VCL rule 4. Share attack report 5. Post incident activity (Lessons learned) alerts when POST / , feed IPs to TIDB for layer 7 attacker not spoofed
  • 24. Tiers SOC I eyes and ears of operations output of the SOC I is to triage an event and decide the course of action to take SOC II Mitigators correlate and respond to triaged threats detected by SOC I SOC III Specialists optimize how a SOC I and SOC II operate, Subject Matter Experts
  • 26. Triage Investigation Remediation Communication Post Review Will treating each SIRT as an production incident first reduce our time exposed? Interview Customers to understand what changes need to be made, or hypothesis to test Run A/B experiments to validate and measure effectiveness of changes A B SIRT
  • 27. Be a Human ● Do not over work ● Measure Efforts not Productivity ● The leader reports to his team.. The team has to be the owner
  • 29. In Summary Every SOC is different and none is perfect Your customers gotta want it! processes leads technology Religiously Actionable Alerts
  • 30. If all else fails get a pew pew map
  • 34. Agenda ● What really is a SOC ● Intro ● 50k foot view of any SOC ● MSSP vs Internal ● Technology ● Process ● People ● Gotchas ● Questions

Editor's Notes

  • #3: Definition is lose and it means alot of things to alot of people, for example let’s explore wikipedia
  • #5: https://www.gartner.com/newsroom/id/3815169 Just like mario world there are different games with slightly different changes but at the core very similar in mechanics
  • #6: Know many you from Prolexic Knitting a SOC at Fastly
  • #7: At a really high level the process of running any operations boils down to 3 different components that are interconnected https://www.sans.org/reading-room/whitepapers/analyst/building-world-class-security-operations-center-roadmap-35907
  • #8: Here is my believe
  • #9: This is a given but without business buy in no project is going anywhere, I have seen this used in every SOC presentation I have seen, although a bit commonsensical, though I would share.
  • #10: Mega
  • #11: Picture this your a team leader with a budget and you
  • #14: So how can we pivot to the last chart? Lets talk about build versus buy
  • #15: At the end of the day any platform you go with the truth is that
  • #16: Lets walk through it
  • #22: (NIST) Incident Handling guide
  • #23: At Fastly, one of the most common threats we help our customers mitigate is DDoS attacks — specifically pesky Layer 7 floods (GET/POST) which bypass a customer’s cache and affect the origin server directly.
  • #26: http://theleanstartup.com/
  • #30: https://blog.rapid7.com/2016/05/03/6-lessons-i-learned-from-working-in-a-soc/ Every SOC is different and none is perfect - they are all different and it is an evolving concept as leader you must understand this and embrace change but also test it rigorously Your customers gotta want it! - goes back to business buy-in, your customers need to want it, otherwise no matter the value produced processes leads technology - a hunting process will determine what tools you need for it, but a tool will never lead you to a better hunting process, take sandboxing for example, what good is a shiny new sandbox gear if there is no investigation that the SOC performs that requires it. Religiously Actionable Alerts Document investigation knowledge