Photo by Ksenia Kartasheva:
A Security Operations Center (SOC) is an essential security function for any large enterprise today. Acting as the command center for an organization’s cybersecurity operations, an effective SOC provides 24/7 monitoring to quickly detect and respond to security threats.
However, creating a SOC requires substantial investments in staffing, tools, and infrastructure. Organizations must weigh the costs and benefits of building an in-house SOC against partnering with a managed security service provider. Below we explore key SOC capabilities, components, and models to help inform this crucial decision.
Core SOC Capabilities and Key Responsibilities
While specific implementations vary, most SOCs share some common core capabilities and key responsibilities:
- 24/7 Threat Monitoring – Around-the-clock monitoring of endpoints, networks, cloud environments, databases, applications, and other potential threat surfaces for security events and indicators of compromise. This requires log collection, aggregation, and analysis technologies along with skilled analysts working shifts to provide continuous coverage.
- Alert Triage and Analysis – Reviewing the high volumes of alerts triggered by various security tools and filtering out false positives to identify actual security incidents requiring investigation and response. This is critical to avoid wasted resources responding to harmless events.
- Incident Response – Executing incident response plans to mitigate impacts of confirmed attacks and security incidents. This includes isolating compromised systems, resetting accounts, implementing workarounds, eradicating malware, and enacting other containment or remediation measures to minimize damage and restore normal operations.
- Threat Intelligence – Continuously researching new and emerging threats, adversaries, and attack tactics. Threat intel helps inform detection rules and models to improve monitoring capabilities and ensure analysts have current knowledge to combat the latest attacks.
- Security Device Management – Installing, configuring, optimizing, upgrading, and maintaining the various security tools and platforms that feed log data, alerts, and other telemetry to the SOC. Keeping tools current and tuned for optimal coverage and performance is essential.
- Compliance Support – Collecting, retaining, and reporting on auditable data required to demonstrate compliance with security regulations, standards, and frameworks like PCI DSS, HIPAA, NIST CSF, ISO 27001, and others.
- Executive and Internal Reporting – Keeping key organizational stakeholders updated on overall security risks and posture, threats detected, response activities undertaken, recommendations for risk reduction, and progress on security initiatives.
Staffing a SOC with Security Analysts
Staffing is one of the biggest and most costly factors for SOCs, as analysts’ salaries make up the bulk of operational expenses. Most estimates suggest a 24/7 SOC requires 8-12 security analysts working staggered shifts to provide continuous coverage.
SOC analysts are typically organized into different tiers based on their experience levels:
- Tier 1 analysts handle basic alert triage, escalating complex issues to senior tiers. They also manage more routine threat intel gathering, vulnerability scanning, and reporting. These are often entry-level positions suitable for recent graduates.
- Tier 2 analysts perform deeper investigation and analysis into suspicious events and have escalation authority for enacting critical incident response like isolating compromised systems. They take on more complex assignments and require solid hands-on experience.
- Tier 3 analysts are the senior security expert leads, making final decisions during high-priority incidents, reviewing analysis procedures, mentoring junior staff, and driving continual optimization of detection and response capabilities. Extensive experience across different threat categories is essential.
Larger in-house SOCs may also require dedicated management roles like a SOC manager, shift supervisors to monitor analyst productivity and escalations, compliance reporting coordinators, and threat intelligence research leads.
Ideally, the collective SOC staff should have diverse backgrounds across security domains like malware analysis, network forensics, host intrusion detection, vulnerability assessment, identity and access management, data protection, and more. Cross-training helps prevent knowledge gaps.
Must-Have SOC Technology Components
In addition to skilled staff, an effective SOC relies on specialized technology infrastructure and security platforms:
- Security Information and Event Management (SIEM) – Acts as the central nervous system of the SOC, collecting, normalizing, analyzing and correlating data from the full range of security tools. Leading SIEMs like Splunk offer powerful analytics and dashboards to help analysts detect anomalous behaviors.
- Security Orchestration, Automation and Response (SOAR) – Automates repetitive, low-level tasks like blocking known malicious IP addresses to free up analysts for higher value work. SOAR improves efficiency and response speed.
- Endpoint Detection and Response (EDR) – Monitors activity on endpoints like workstations, servers, and cloud instances for signs of compromise like suspicious process execution, file modification, registry changes, and memory injections.
- Intrusion Detection System (IDS) / Intrusion Prevention System (IPS) – Monitors network traffic for matches against known attacks and malicious traffic patterns, either generating alerts or directly blocking the suspicious packets.
- Next-Generation Firewalls – Filter incoming and outgoing network traffic based on rule sets and perform deep packet inspection to identify threats. Integrate with sandboxing technology for advanced malware detection.
- Web Application Firewall (WAF) – Monitors and filters malicious traffic targeting web apps and APIs based on rules for typical attacks like XSS, SQLi, or bot attacks.
- Virtual Private Network (VPN) – Securely connects remote analysts and infrastructure to the SOC network for controlled access and enhanced defenses.
The optimal configuration depends on the organization’s threat landscape and budget. But investing in continuous tool tuning and maintenance is critical to avoid excessive false positives and ensure maximum threat detection rates.
Comparing In-House SOCs vs. Outsourcing
Organizations have two primary options for establishing SOC capabilities: building an in-house team or outsourcing to a managed security services provider. Each has its own pros and cons.
In-House SOC
Constructing an internal SOC requires significant capital expenditures and ongoing overhead, but provides maximum control and customization for an organization’s specific needs.
Pros:
- Maintains complete control over staffing, tools, processes, and procedures based on an organization’s requirements
- Promotes deeper familiarity with the organization’s unique environment, risks, and threat landscape compared to a third-party
- Integrates and aligns tightly with in-house processes, workflows, and other security teams
Cons:
- Requires substantial upfront and ongoing hiring and training costs for skilled analysts, not to mention management overhead
- Necessitates significant capital expenditures on security infrastructure like SIEM, firewalls, and EDR platforms
- Complex and expensive to scale up staffing and expand tools as monitoring needs evolve
- Dilutes focus of existing security engineers from other priority objectives and strategic initiatives
Managed SOC Services
Partnering with a managed security service provider delivers ready-made SOC expertise, resources, and technology with much lower overhead. You can use this SOC savings calculator to determine how much your business could save.
Pros:
- Provides fast time-to-value without the startup costs of hiring staff and purchasing infrastructure
- Reduces staffing overhead by leveraging the provider’s security analysts rather than recruiting and training an internal team
- Easy to dynamically scale monitoring capacity up or down as needs change
- Takes advantage of provider’s threat intelligence capabilities and benchmarks across clients
- Allows reallocation of internal staff to focus on other security priorities rather than 24/7 monitoring
Cons:
- Surrenders control over tools, staffing, and certain processes to the provider
- More difficult integrating workflows with in-house staff compared to a unified internal team
- Still requires relationship management and governance of the provider through service agreements
For most organizations, the overhead and specialized expertise required for an in-house SOC makes outsourcing to an established provider the more optimal choice. But the decision depends heavily on budget, risk tolerance, existing infrastructure, and desired level of control.