Whether defending against common malware or some determined Nation State, being able to proactively detect attacks and changes in the organization are required. The past year I spent a large amount of time helping several organizations setup and put in place the right people, processes, and technology to help defend against increasing security threats. Although many organizations spend millions of dollars on technology and hire staff to monitor security 24/7 the organizations were still lacking two fundamental items.
- The people although good at monitoring lacked the attack and threat mind set. The staff was not able to figure out when an actual attack was happening.
- Second the organizations lacked the basic security operations processes required to keep track and make appropriate use of the vast amounts of data.
As a result I spent the past few months developing a whitepaper that specifically addresses the primary components of a SOC, which can be used to help organizations setup a centralized core and embark on developing the correct operational processes. Although I don’t address item number one above, this paper explains in detail the following.
- Defining the SOC
- Determining the Processes
- Understanding the Environment that needs protected
- Identifying the SOC Customers
- Staffing the SOC
- Managing the Events
- Leveraging ITIL compliance
If your organization is under attack and you have invested in more people and technology be sure to implement the right processes and build a foundation for future defense.