Conspect Letsdefend
Conspect Letsdefend
Conspect Letsdefend
What is a SOC?
A Security Operation Center (SOC) is the facility where the information security team constantly
monitors and analyzes the security of an organization. The main purpose of the SOC team is to detect,
analyze and respond to cyber security incidents by using technology, people and processes.
In-house SOC
The enterprise builds its own cybersecurity team. Firms considering establishing an internal SOC should
have a budget to support continuity.
Virtual SOC
The security team does not have its own facility and often works remotely in different locations.
Co-Managed SOC
The Co-Managed SOC consists of internal SOC personnel working with an external Managed Security
Service Provider (MSSP). The coordination is really important for this type of model.
Command SOC
A senior group that oversees smaller SOCs in a large region. Organizations using this model include
major telecom providers and defense agencies.
Building a successful SOC requires serious coordination. In particular, there should be a strong
relationship between people, processes, and technologies.
In simple terms, we will talk about which people, processes and technologies are required for SOC.
People
We need highly trained personnel familiar with security alerts and attack scenarios. As attack types are
constantly changing, we need a teammate that can easily adapt to new attack types and is willing to
research.
Processes
To bring your SOC structure to good maturity, you need to align it with many different types of security
requirements such as NIST, PCI, HIPAA. Processes require extreme standardization of actions to ensure
nothing is skipped.
Technology
You need to have various products for many topics such as penetration test, detection, prevention,
analyze. You need to follow the market and technology closely to find the best solution for you.
Sometimes the best product on the market may not be the best for you. This may be due to your low
budget.
SOC Positions
SOC Analyst
It can be divided into groups as Level 1, 2 and 3 according to the SOC structure. A security analyst
classifies the alert, looks for the cause, and advises on remedial measures.
Incident Responder
The incident response officer is the person who will take part in threat detection. This person performs the
initial assessment of security breaches.
Threat Hunter
A team member whose purpose is to find vulnerabilities before the attacker can exploit them with an
attack.
Security Engineer
Security Engineers maintain the security infrastructure of SIEM (Security Information and Event
Management) solutions and SOC products. For example, this person prepares the connection between
SIEM and SOAR (Security orchestration, automation and response) product.
SOC Manager
A SOC analyst is the first person to analyze any threats against a system. When the situation requires it,
he/she escalates incidents to his seniors and thus makes catching threats possible. He/She plays an
important role in the SOC because he/she is the first person to investigate.
There are many various techniques of attack vectors and malicious software and they increase more and
more every day. As an analyst you will get greater enjoyment from investigating these varying types of
incidents. Even though the operating systems, security products…etc. that you use will be the same the
job will feel less monotonous because you will be analyzing different incidents. Also, you may not
encounter such techniques (not every week or every day).
General Routine
Throughout the day a SOC analyst will generally examine alerts on the SIEM and determine which ones
are real threats. To reach a conclusion he/she will utilize various security products such as EDR
(Endpoint Detection and Response), Log Management and SOAR. We will explain in detail why and how
these products are used later in the training program.
To be a successful SOC analyst who is not dependent on security products and can correctly analyze
SIEM alerts one needs to have the following competencies.
Operating Systems
To be able to detect what is abnormal in a system one must primarily know what is accepted as normal.
For example, there are multiple services within the Windows operating system and it is hard to detect
which of these are suspicious without knowing which are or could be normal Windows services. For this
reason, you should know the basic logic of how Windows/Linux operating systems work.
Network
First and foremost, we will be handling many malicious IPs and URL addresses. And we will have to
check if there are any devices on the network trying to connect to these addresses. If we can control this
then it will set the tone of our analysis.
As a more complicated step we might have to detect a potential data leak on the network. To be able to
carry out all these functions we need to know the basics of networking.
Malware Analysis
You will come across some kind of malicious software when dealing with most threats. In order to be
able to understand what the actual purpose of these malwares are (they sometimes display different
behaviors to mislead analysts) you need to have some skills in malware analysis.
It is important to at least determine what the malicious file’s command and control center is and whether
or not there is a device communicating with this address.
We have generally discussed what a SOC analyst is, what he/she does and what kind of skills he/she
needs to have. As we continue with the program we will address technical areas, we will start with the
SIEM.
Log Management
You will be doing a lot of log analysis as a SOC Analyst. For this reason, it is important to be familiar
with “Log Management” systems/solutions. What brand product you use is not important, rather what’s
important is knowing what to look for and where to look for it.
In the continuation of this article, we will discuss how “Log Management” solutions can be effectively
used by SOC Analysts.
As implied by its name, it is a log management solution. In short, it enables access to all the logs in an
environment (web logs, operating system logs, Firewall, Proxy, EDR, etc.) and it allows for the
management of these logs from one point. Thus, it improves usability and saves time.
If we can’t access the logs from one point, then the same query (for example I want to determine all users
at letsdefend.io) would need to be sent to various devices. This would increase our margin of error and
the amount of time we need to spend.
If you go to the “Log Management” page in LetsDefend, you will see various log sources such as Proxy,
Exchange, and Firewall listed as “Type”. This means that all these log sources have been collected in one
place and we can see log output from sources like Proxy, FW, etc. with just one query.
EDR
A SOC Analyst needs to spend a large amount of time using EDR while conducting analyses on an
endpoint device. In the following sections we will discuss why EDR is beneficial for us as SOC Analysts
and how we can use it effectively.
What is EDR?
Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is
an integrated endpoint security solution that combines real-time continuous monitoring and collection of
endpoint data with rules-based automated response and analysis capabilities. (Definition source:
mcafee.com)
Analysis with EDR
Some popular EDR solutions used in the workplace: CarbonBlack, SentinelOne, FireEye HX.
As seen in the image, accessible endpoint devices are listed on the left. We can search for endpoints in the
search bar or if we have an IOC (-Indicator of Compromise- an IP address, file hash, process name, etc.)
we can conduct a search among all the hosts.
On the right side we can find general information about the device and displayable sections such as
“Browser History”, “Network Connections” and “Process List”.
Live Investigation
In addition, we can click on the “Connect” button and access the machine itself in order to continue our
analysis there.
Containment
We must isolate a hacked machine from the network. There are important reasons behind this: to be able
to stop the attacker’s connection to the inner network and to prevent his movement throughout the inner
network.
Therefore the device should be cut off from inner and outer networks until the security gaps are fixed and
the device is usable again. We can ensure that isolation happens using the “Containment” feature of EDR
solutions. This feature allows the selected device to communicate only with the EDR center. This means
that even though the device is isolated from the network we can still continue our analysis.
Quick Tip
If you have any kind of IOC such as a file hash, file name, etc. you can perform a search in EDR among
all hosts and see if there is a match. For example, let’s say you are sure that a device has been hacked and
you have obtained a file with an MD5 hash of “ac596d282e2f9b1501d66fce5a451f00”. You can search
for this hash value in EDR and determine whether this file is present or executed on other devices.
Therefore you can understand who was affected by this attack.
Splunk Phantom
IBM Resilient
Logsign
Demisto
Saves Time
SOAR saves time through workflows that automate processes. Some frequently used workflows are:
Centralization
It enables the operation of various security tools in your environment (Sandbox, log managements, 3rd
party tools, etc) from one point. These tools are integrated into the SOAR solution and can be used on the
same platform.
Playbook
We can easily investigate SIEM alerts using playbooks created for various scenarios within SOAR. These
playbooks help us conduct an analysis because we can follow the instructions even though we don’t know
or remember all the steps of the analysis.
Additionally, these playbooks help the whole SOC team to conduct their analyses on the same plane. For
example, if one team member is not checking IP reputation and the others are, then this is an undesirable
situation, we want all team members to check IP reputation. We can prevent this situation by adding this
step to the playbook.
Here are some free and popular sources you could use:
https://www.virustotal.com/
https://talosintelligence.com/
Data that we run through feeds that does not show up
Let’s say we ran a hash that belonged to an .exe in VirusTotal and could not find anything suspicious
about it in the past. We should not suppose that the file is clean, this would be a mistake. Still, we should
be diligent about performing the required file analyses (static/dynamic).
For example, let’s say an attacker created a server over AWS (Amazon Web Services) and used it as a
command and control center. Then various threat intelligence feeds recorded this IP address on their lists
as a malicious address.
After 2 months had passed the attacker closed the server and someone else moved their personal blog to
this server. This doesn’t mean that people who visited the blog were exposed to malicious content. The
fact that this IP address had been used for malicious reasons in the past does not mean that it contains
malicious content.
We advise that you review this section after completing the other sections of this training.
Sometimes we can rely on the result displayed on VirusTotal’s green screen after analyzing a file’s URL
and seeing that the address is harmless. But there is a new malicious software developed using an AV
(AntiVirus) Bypass technique that may not be detected by VT (VirusTotal). For this reason we should
accept VirusTotal as a supportive tool and conduct our analyses with this in mind.
Here’s a detailed blog post related to the subject for further reading:
https://medium.com/maverislabs/virustotal-is-not-an-incident-responder-80a6bb687eb9
A 3 to 4 minute analysis in a sandbox environment may not always produce accurate results. Here are the
reasons:
Malware that detects a sandbox environment and does not activate itself
Malware that do not activate until 10-15 minutes after the operation
For this reason, the duration of analysis should be kept as long as possible and it should take place in a
real environment if possible.
From time to time we see that log analyses are not performed correctly. For example, let’s say that a piece
of malware has detected a device with the hostname “LetsDefend” and this malware is secretly sending
data to the address “letsdefend.io”. As a SOC analyst we should utilize “Log Management” solutions to
determine whether any other device is trying to connect to this address.
If I were an attacker I could search for a clean URL address in VirusTotal and then replace the content
with malicious content. This is why we should not just look at the search cache, we should start a new
search.
What is an EDR?
Software not only monitors endpoints, but also emails, servers and the cloud.
Software that provides network-wide visibility to SOC teams to detect the behavior of
potentially hidden attackers targeting physical, virtual and cloud infrastructures.
Software that combines managed solutions (managed by a cybersecurity vendor) and incident
detection and response service.
A software that monitor the terminals (computers, servers, tablets, phones...) and not the
information system network.
What is the goal of a SIEM?