SANS 2022 SOC Survey
SANS 2022 SOC Survey
SANS 2022 SOC Survey
Results from 2021 to 2022 show a decrease in both incidents and breaches from
incidents. This is a positive trend, but the question is, can it continue?
Hiring, retention, and turnover are key challenges. Consider comparing how
your organization lines up against the survey results.
6. Are the discrepancies noted by this report being taken into account
as we move forward?
Figure 3, noting that the second line (“Informal SOC, no Figure 2. Structure of SOC (Q3.5: n=454)
defined architecture”) doesn’t seem to be
an aspirational future state, because it Infrastructure Arrangement
represents low maturity. Current Next 12 months
129
Centralized into a single SOC
138
69
Cloud-based SOC services
107
Centralized and 66
distributed regionally 65
47
Full SOCs distributed regionally
40
23
Partial SOCs in regional locations
19
29
Other
24
0 20 40 60 80 100 120 140
1
If expressed as a growth percentage (future/current counts divided by current count), the growth in the cloud-based SOC services sector is 55%,
whereas the growth in the central SOC is 7%. All other arrangements indicate a decline in the next 12 months.
four barriers to account for 57% (135/235) of all Lack of management support 23
We wanted to hear the respondents’ challenges Silo mentality between security, IR, and operations 19
Small
Technology (Up to 1,000)
Medium
Cybersecurity (5,001–15,000)
Medium/Large
Government (15,001–50,000)
Ops: 74
Top 4 Roles Represented
HQ: 21 Ops: 67
HQ: 12 Security administrator/
Ops: 150 Security analyst
HQ: 92
SOC analyst
Security manager or
Ops: 246 Ops: 42
HQ: 3
director
HQ: 207
Ops: 42 IT manager or
Ops: 235
Ops: 32 HQ: 6 director
HQ: 10
HQ: 168
Each person represents 10 respondents.
• The respondents’ companies are primarily based in North America, Latin America, and
Europe. Previous years’ SOC surveys speculated the prevalence of North American
and European organizations as a feature of who participated, rather than a feature
of the actual prevalence of SOCs globally. This year’s report and survey targeted Latin
America, and this region took the second among headquarters for the first time. Our
mission for this survey going forward is to continue similar outreach globally.
2021 SOC Survey, 95 responses were collected to the Prefer not to answer 4
2
“A SANS 2021 Survey: Security Operations, Center,” October 2021,
www.sans.org/white-papers/sans-2021-survey-security-operations-center-soc/?socsurvey=1, p. 2. [Registration required.]
We didn’t have a follow-on question related to what enabled the detection and
removal of the intrusion prior to the breach. There are a multitude of other reports and
surveys documenting the details of breach and loss from the cybersecurity community.
But we will continue to assess if this trend of success we are seeing in reduced
incidents and subsequent breaches can be attributed to the presence of a SOC.
Track metrics to ensure your trends are moving in the right direction.
Compare how your organization lines up against the survey results in the section
“Staffing: Meeting the Key Challenges.”
3
Please note that this is not organizational size or sector adjusted.
Explore the section “Technology: What Is Getting a Passing Grade?” to see how to
assess your technologies as well as the part on tying the capabilities together.
14 14
14
12
10
10
8
7
66 6 6 6
6
5 5 5 5 5 5 5 5
4 4 4 4 4 4
4
3 3 3 3 3 3 3 3 33
2 2 2 2 2 2 2 22 2
2
1 1 1 1 1 1 1 1 1 1 1 1 1
0 0 0 0 0 0 0 0 00 0 0 0 00 0 00 00 0 00 0
0
Fewer than 100 101–500 501–1,000 1,001–2,000 2,001–5,000 5,001–10,000 10,001–15,000 15,001–50,000 50,001–100,000 More than 100,000
less than five years, with the most cited (n=84) 5–10 years 29
provide staff clear career progression (n=76), as Figure 11. Average Employment Duration (Q3.48: n=236)
shown in Figure 12. The authors see this as providing two benefits:
different company that has a plan in place for Figure 12 Retention Methods (Q3.49: n=239)
career growth.
Retention seems to be an important part of managing the SOC The short story of our guidance here is calculate the
team, implying likely negotiation between SOC and organizational costs involved in hiring new staff. Show the value
management to address key factors to keep staff: career plan proposition by comparing the hiring cost to the cost
assurance with additional training, monetary incentives, work-life of training and developing existing staff.
Organizations now need to balance the ease of hiring and retaining No
staff who expect to work remotely versus the increased difficulty in Unknown
296
training, developing, and onboarding staff working from home.
those with a lesser work ethic are motivated to be more Individually negotiated 68
effective by the oversight provided on-premises.) Other 32
0 40 80 120 160
(112), then the range is 348–376 from 383 Threat Intelligence (feed consumption)
149 89 121
respondents. There were only 20 other text Red-teaming
142 138 76
responses, and 14 of these were none or
Purple-teaming
N/A. A couple were comments about the 162 116 70
question. There were three relevant other Other
56 22 48
responses: business review, research, and 0 100 200 300 400
NIST framework management. The research
we’d put with “threat research” and the Figure 16. Capabilities Ranked on Total Reporting (Q3.10: n=383)
NIST framework we would expect to group
with “compliance support.”
this work as the work tends to stay internal 0 100 200 300 400
(also, the perceived need of of data control Figure 17. Capability Ranked
Greatest to Lowest for
and privacy for these capabilities and the data handled therein). Defensible or
Outsourcing (Q3.10: n=383)
not, this is the stance that many organizations use to keep the activity internal
rather than outsourced.
Figure 19. Technology in Use and Deployment Status, Sorted by Percentage “All Systems” (Q3.26: n=150)
The highest-ranking tools score at the top because they do something well and the tools
are likely in the enlightenment or productivity phase of the hype cycle.4 In this continued
speculation, the lowest scorers are relatively new or fail to do the task for which they were
purchased. That may be no fault of the technology (full-PCAP not allowed to capture due
to legal restrictions) or failure of the technology to adapt (full-PCAP being outmaneuvered
by advancing encryption protocols).
Finally, the middle of the pack looks like the technology that works well only when
you’ve applied the appropriate customization and tailoring for your environment. This
takes time, dedicated staff, and cooperation with the protected systems’ owners and IT
administrators. Cooperation and time are often an unnecessarily scarce commodity in the
cybersecurity space.
Figure 20 (shown on the next page) represents the GPA for each technology based on the
grades respondents assigned to that technology. The GPA is calculated on a 4-point scale,
where A is 4 and F is 0, divided by the number of responses per technology.
To be fair, the GPA is based on the respondent’s opinion, and we do not have a fully
developed assessment rubric for this. Take this respondent’s opinion-based GPA scoring
as anecdotal opinions on a product category, not specific products.
4
“Gartner Hype Cycle,” www.gartner.com/en/research/methodologies/gartner-hype-cycle
Figure 21. Deployment State and GPA Rating (Q3.26 and Q3.27: n=142,132)
improvement the authors think warrants Figure 22. Security Monitoring Details (Q3.11: n=368)
focus: better integration between monitoring and
incident handling. See Figure 22. Does your SOC operate 24/7?
indicated that the SOC doesn’t operate 24 hours per es, mixed internal/
Y
outsourced
day. The “Yes” contingent answered that a purely in- 89 No
house (144, 38%) 24-hour operation is the most popular
approach to this, trailed substantially by mixed (89, 66 Unknown
(36, 11%), XDR (35, 11%), and MDR (24, 7%) Don’t know. It all happens in the cloud. 14
Other 5
0 25 50 75 100 125 150
Most respondents (158, 48%) indicated that they either partially or fully
support smart devices.
When asking what is being used for this, the MDM is What are you using to monitor your mobile devices, extranet, and
clearly ahead, but not by enough to call it a certain choice cloud partner (AWS, Azure, etc.) resources? Select all that apply.
but the same staff for monitoring, and if these two groups Other 8
are considered together (because physical separation of the 0 25 50 75 100
visibility and protection instrumentation is consistent for Figure 27. OT Monitoring Strategy
both groups), then that grouping (127, 39%) exceeds the “together” responses (see Figure (Q3.17: n=326 but n=88 excluded
from chart because there’s no OT)
27). This is important because there appears to be a strong urge for compartmentalization
of these resources onto their own network, and the conceptual boundary appears to
be extended to the defensive monitoring systems as well. This compartmentalization
approach has strong advocates on both sides of the subject in the OT cybersecurity
community. From this survey, it’s about evenly split in terms of how the SOCs monitor OT.
Relationships
What is your SOC’s relationship to your IT operations?
In discussing OT/IT convergence, it’s apropos Note: This question refers to IT operations in whatever form,
to also highlight the SOC to IT operational such as general IT or a network operations center (NOC).
monitoring. It is the opinion of the author Our IT/NOC team is an integral part
of our detection and response,
(Crowley) that there are opportunities for tool although our SOC and IT/NOC activities 119
are not technically integrated.
reuse, converged visibility, collaboration, and
Our SOC and IT/NOC teams work together
only when there are emergencies. 101
coordinated hunting activities if these teams
Our IT/NOC team and SOC team are
are empowered to share data and ideas. kept well-informed through integrative
77
dashboards with shared information,
APIs, and workflow, where needed.
In Figure 28, it looks like a lot of the SOCs
Our SOC and IT/NOC teams have
54
agree. The strongly segmented responses very little direct communication.
“very little direct communication” (54) and We don’t have an IT/NOC team. 37
(119) and “…integrative dashboards…” (77) are Figure 28. SOC to IT Relationship
45% of the responses (196). This is a call to action to leverage your scarce resources to (Q3.8: n=432)
further the collaboration or integration of two core operational capabilities: SOC and IT.
The only likely counter-indication the authors see in this situation would be that the
SOC might lose some oversight capability of potentially malicious or negligent system
administrators; the IT admin could also see what the SOC sees about his or her (insider/
malicious) activity and adjust to avoid detections. The value of the visibility as a deterrent
likely outweighs the risk of a crafty insider threat intentionally evading monitoring.
Our advice? Monitor IT admin access by using a behavioral monitoring strategy to identify
patterns that could be attributable to malicious insider activity. This would cover the other
common fear of sharing the security visibility data with IT peers, if an attacker seizes
credentials and is using your tools to see what you see about the attacks. This scenario of
loss of control and use would likely represent a behavioral change from the normal baseline
of that account, giving you a potential alert late in the phase of an attacker intrusion.
Looking at SOC budgets reveals some interesting Less than $100,000 USD 39
5
5
3 3
Measuring for Success 2 2
1
0
Yes No Unknown
Metrics are a critical component of the SOC’s interaction with Figure 32. Budget Method and Metrics (Q3.35 and Q.56: n=240)
the organization, in the authors’ opinion. Yet, most of the metrics
used fail to effectively characterize the value the SOC provides to
the business. Admittedly, we’re taking the optimistic view that the Does your SOC provide metrics that can be used in your
reports and dashboards to gauge the ongoing status
SOC does provide value and could calculate it.
of and effectiveness of your SOC’s capabilities?
Among respondents, 70% (193/274) indicated that they provide
metrics to accomplish this communication. See Figure 33.
30
We asked about satisfaction with these metrics, and of those who
answered, 78% (136/187) are either satisfied (92) or very satisfied Yes
51
(54) with the metrics. See Figure 34. No
Very satisfied
40
54 Satisfied
ot satisfied/Need
N
serious improvement
92 Unknown
16
16
Where they have been calculated, the numbers
14 14 14
are all over the map, with no clear consensus, 14
0
$25+ $10–$25 $5–$10 $1–$5 < $1 Unknown
You can see where this is going. If the respondent is calculating it, we 74 Yes
wanted to know. So, the next question asked is what help the SOC is No
(if it is, in fact, helping). Only a small number said the SOC’s existence
140 Unknown
made the handling effort more costly than without the SOC (n=7), and
the impact more costly (n=4). But many more saw 10% handling (n=19)
and impact (n=24) reduction. The most popular response for handling
reduction was 50% reduction (n=22), with the incident impact reduction
Figure 38. Estimated or Calculated Value
of 50% for (n=18) respondents (see Figure 39). This provides a
Provided by the SOC (Q3.43: n=244)
compelling story to show value to management when
you go into that formal budget to try to assure the Estimated Relative Handling Cost with SOC
organization management works closely with you to Incident cost Handling cost
For SOCs with lesser maturity, adding missing capabilities is the next step. Doing so
through outsourcing often provides speed and high-value proposition without the
accompanying tailoring and customization. The next step would be assuring performance
of metrics. For more mature SOCs, delivering calculations related to data protected and
loss prevention provided is the step to take.
Sponsor