Reader small image

You're reading from  Information Security Handbook

Product typeBook
Published inDec 2017
Publisher
ISBN-139781788478830
Edition1st Edition
Right arrow
Author (1)
Darren Death
Darren Death
author image
Darren Death

Darren Death is ASRC Federal's Chief Information Security Officer. He is responsible for managing the enterprise cybersecurity program across a 3 billion-dollar portfolio of business sectors, including financial services, government contracting, and construction. A proven technology leader with over 20 years of experience deploying enterprise systems for large private and public organizations, Darren Death has led, designed, and implemented large-scale, organizational-wide enterprise IT systems with far-reaching impact. Before joining ASRC Federal, while at the Department of Justice, he was responsible for creating a nationwide enterprise processing capability across the US Attorney, Marshalls Service, and the Bureau of Alcohol, Tobacco, and Firearms divisions. At the Library of Congress, Darren was responsible for all emerging technologies related to information security. He holds a doctoral degree in information technology, specializing in information assurance and cybersecurity.
Read more about Darren Death

Right arrow

Chapter 9. Developing a Security Operations Center

The security operations center (SOC) serves as your centralized view into your overall enterprise organization infrastructure and individual information systems. The security operations center's goal is to ensure that this view is as real time as possible so that your organization can identify and respond to internal and external threats as quickly as possible, helping to ensure the continued confidentiality, integrity, and availability of your organization's information systems.

Think of the SOC as the technological equivariant of the physical security controls implemented by your organization.

In this chapter, we will be discussing:

  • The responsibilities of the security operations center
  • Security operations center tool management
  • Security operations center tool design
  • Security operations center roles
  • Security operations center processes and procedures
  • Internal versus outsourced security operations center

From the physical security world, you have...

Responsibilities of the SOC


The SOC is responsible for the continuous identification and remediation of threats that occur on your enterprise network. If this seems familiar, it should be, as this comes from the previous chapter on incident response. Typically, it is your SOC team that will be charged with executing substantial portions of the incident response plan. Therefore, most well planned SOCs mirror much of the process that is defined in an organization's incident response plan.

Regardless of the size of your organization, the necessity to develop an effective security operations center is essential. A security operations center is an incredibly important part of your overall information security program investment and is a key component in ensuring that your organization is being properly protected from internal and external threats.

The SOC capabilities that you can implement are directly tied to your organization's personnel resources, funding, and so on. This means that a startup...

Management of security operations center tools


The SOC team must ensure that the tools used to monitor the enterprise information systems are properly secured and maintained. It will be very difficult, if not impossible to properly secure modern, complex, interconnected information systems without the aid of well-maintained and properly functioning information security tools. The SOC team must have a toolset capability at their disposal that allows them to have visibility throughout the information systems that they are responsible for monitoring.

Note

Visibility into your organizational information systems is one of the most important aspects of a well-developed information security program. The reality is that even with a suite of well-developed security controls and a strong risk management program, intrusions will occur. How your organization responds to a future intrusion will determine whether you have a costly data exposure that could ultimately lead your organization to an untimely...

Security operation center toolset design


Care must be taken when developing the overall design of your organization's SOC toolset, drawing upon the maturity developed during the implementation of your overall information security program. The development of your SOC toolset should center on what is important to your organization's missions, and ultimately being able to ensure that your organization continues to be able to exercise that mission.

You must ensure that you work with your stakeholders to determine key information such as:

  • Sensitive organizational data
  • Sensitive information technology assets
  • Your organization's risk appetite
  • Allowable business process disruption
  • How information systems are interconnected and communicate with each other

Work with your organizational leaders and users to develop an understanding of important technical information such as:

  • How your business applications and databases interact with each other
  • How different business applications share information
  • How the servers...

Security operations center roles


To have an effective security operation center, it is critical that you implement the necessary personnel roles to properly operate and maintain the environment. In the following list, you will find the personnel roles needed to fully implement a security operations center. Do not get hung up on the names of the roles if they do not match those in your organization. Each organization will have its own naming convention derived from the organization's culture:

  • Security operations center analysts:
    • Tier one: More junior information security analyst with a couple of years' experience in the information security field. Possesses a basic knowledge of networking, systems, and applications:
      1. Conducts information security tool monitoring
      2. Conducts basic investigations and mitigations
      3. Opens tickets
    • Tier two: Poses a stronger knowledge of the information security tools used by the SOC as well as a deeper understanding of networking, systems, and applications:
      1. Deeper investigative...

Processes and procedures


The key component to an effectively-run SOC is well-thought-out processes and procedures. An SOC must be able to implement effective identification and remediation activities the same way all the time. Effective processes and procedures ensure that this is carried out in a repeatable and reliable fashion.

Key process and procedure categories are needed to ensure an effectively managed and operating SOC mirror the incident response life cycle and include:

  • Identification:
    • Detection
    • Analysis
  • Remediation:
    • Containment
    • Eradication
    • Recovery

The following is a sample process that identifies the parties and their duties if confronted with cross-site scripting vulnerability being identified on an organizational web application:

Security operations center tools


The security operations center utilizes the tools defined in the incident response chapter of this book, and those tools should be used as a reference to build out the technical capability of a SOC.

Key tools to highlight for SOC use include:

  • Security information and event management (SIEM): Provides deep visibility into your network, systems, and applications. The SIEM is really where the magic happens for the SOC. The SIEM is the tool that ties your other security tools such as malware analysis and intrusion prevention tools into a unified system that can produce very intricate events and alerts. In turn, this capability can serve to provide the necessary ingredients to conduct identification and remediation activities.
  • Host and network-based intrusion prevention and intrusion detection systems (IPS/IDS): Perform real-time monitoring of your network and server/workstation activity.
  • Vulnerability scanners: Identify vulnerable systems on your enterprise network...

Summary


In this chapter, we learned that the security operations center (SOC) serves as your centralized view into your overall enterprise organizational infrastructure.

In this chapter, we discussed:

  • What the responsibilities of the security operations center include
  • Management of security operations center tools
  • Design considerations for security operations center tools
  • Personnel roles in the security operations center
  • Processes and procedures required to run a security operations center
  • Internal versus outsourced security operations center

In the next chapter, we will discuss information security architecture concepts and implementation steps towards implementing an effective, well-integrated information security architecture program.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Information Security Handbook
Published in: Dec 2017Publisher: ISBN-13: 9781788478830
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Darren Death

Darren Death is ASRC Federal's Chief Information Security Officer. He is responsible for managing the enterprise cybersecurity program across a 3 billion-dollar portfolio of business sectors, including financial services, government contracting, and construction. A proven technology leader with over 20 years of experience deploying enterprise systems for large private and public organizations, Darren Death has led, designed, and implemented large-scale, organizational-wide enterprise IT systems with far-reaching impact. Before joining ASRC Federal, while at the Department of Justice, he was responsible for creating a nationwide enterprise processing capability across the US Attorney, Marshalls Service, and the Bureau of Alcohol, Tobacco, and Firearms divisions. At the Library of Congress, Darren was responsible for all emerging technologies related to information security. He holds a doctoral degree in information technology, specializing in information assurance and cybersecurity.
Read more about Darren Death

Process steps

Role

  1. Identifies or receives a report of an XSS vulnerability

SOC analyst

  1. Documents the identification/report as an incident:
    • XSS vulnerability identified and includes the following information in the tracking form:
      • Vulnerable site/script (URL)
      • Source...