Week 4 Day 3
Week 4 Day 3
Week 4 Day 3
The next step would be data processing, where this collected data is normalized
and aggregated for analysis.
After processing, the data is analyzed for potential security events. This analysis
can be performed by security analysts or using automated tools.
Workflows
If a potential security event is detected, the incident response process begins. This
involves triaging the incident to understand its nature and potential impact, followed by
containment, eradication, and recovery measures.
After the incident is handled, a post-incident analysis is usually performed. This helps the
SOC to learn from the incident and improve their processes.
Understanding and improving the working relationships and workflows in a SOC is crucial
to increasing efficiency and effectiveness. It ensures that the SOC team works
harmoniously and that incidents are detected and responded to in a timely manner.
SOP Workflows
A Standard Operating Procedure (SOP) for a Security Operations Center (SOC) is
a set of step-by-step instructions compiled by an organization to help its SOC staff
carry out complex routine operations. SOPs aim to achieve efficiency, quality
output, and uniformity of performance, while reducing miscommunication and
potential for human error.
Very often the SOP is ALWAYS the start of the process and the end of the process
but might call other processes/workflows/playbooks into play as needed.
Common SOP Procedures
Detection and Reporting:
Monitor security tools and dashboards for any alerts or anomalies. These may include IDS/IPS, firewall
logs, system logs, antivirus software, etc.
If an alert is identified, document the details of the alert in the incident response management system.
Initial Triage:
The senior SOC analyst investigates the alert to confirm if it is a genuine incident. False positives are
documented and resolved.
If a genuine incident is confirmed, the analyst assigns it an initial severity level based on factors such as
the potential impact and the type of data or systems affected.
Common SOP Procedures
Incident Analysis:
The incident handler begins detailed analysis to understand the nature of the incident and potential threat
actors or malware involved.
Gather additional data as needed. This may involve running additional tools, querying databases, or
checking threat intelligence feeds.
Once the incident has been analyzed, decide on a containment strategy to prevent further damage.
After containment, eradicate the threat. This may involve removing malware, patching software, or
changing compromised passwords.
Following eradication, recover affected systems or data. This may involve restoring from backups,
reinstalling software, etc.
Common SOP Procedures
Post-Incident Analysis and Reporting:
After the incident is resolved, perform a post-incident analysis. Identify lessons learned
and how to prevent similar incidents in the future.
Document all actions taken during the incident in a formal report. Include an overview of
the incident, its impact, the response actions taken, and recommendations for future
prevention.
The report should be submitted to the SOC manager and other relevant stakeholders.
This is a general SOP and may be customized according to an organization's specific
needs, systems, and tools. Please note that it is critical for organizations to regularly
review and update their SOPs to ensure that they remain effective and relevant.
Writing Introduction Emails & Asking for Help in SOC
Introduction Email:
Start with a professional greeting and introduction. Briefly introduce yourself,
including your name, position, and any relevant background or experience.
Mention your role in the SOC and your objectives within the team. Highlight your
enthusiasm for joining the SOC and your commitment to contributing to its
success.
Request an opportunity to connect or schedule a meeting to introduce yourself
further and learn more about the team. Provide your availability or ask for a
suitable time to discuss further.
Asking for Help
Clearly state the purpose of your email and the specific assistance you require. Be
specific about the problem or challenge you are facing.
Request a suitable time or method for further discussion or ask if they prefer any
specific format or information for a prompt resolution.
Review of Relationships, Workflows and Communication in
SOC
Example Workflows:
Incident Response Workflow: This workflow outlines the steps involved in detecting, analyzing, and responding to
security incidents, including incident triage, containment, evidence collection, and remediation.
Vulnerability Management Workflow: This workflow covers the process of identifying, assessing, and mitigating
vulnerabilities in systems, including vulnerability scanning, prioritization, patching, and verification.
Access Management Workflow: This workflow describes the procedures for granting and revoking access rights to
systems and applications, including user provisioning, access reviews, and privileged access management.
Change Management Workflow: This workflow outlines the process for evaluating and implementing changes to the
organization's IT infrastructure and applications while ensuring security and minimizing risks.
Build your SOC - Understanding Job Roles, Hierarchy and
Making Connections
Security Manager/Director: Responsible for overseeing the entire security function
within the organization, setting strategic objectives, and managing the team.
Incident Response Team: Dedicated team that handles and coordinates the
response to security incidents, including containment, investigation, and recovery.
Build your SOC - Understanding Job Roles, Hierarchy and
Making Connections
Threat Hunter: They proactively and iteratively search through networks to detect
and isolate advanced threats that evade existing security solutions.
Image source:
Group Work - Take a Role
In this exercise, you will be re-examining the emails that were written in the lecture
exercise Writing Welcome-Introduction Email and Asking for Help.
Assign roles to groups; the roles you assign will be either that of a client, an
analyst of the same level as the one that wrote the email, or an analyst one step
higher than the one that wrote the email.
Thoughts, Comments . . .
?
Today’s To Do . . .
Complete W4D2 and D3 scheduled activities as needed