SOC/SOAR
Security Operations Center Operations
Wazuh
- HIDS
- OSSEC
MISP
- Threat Intellegence
Zeek/Suricata/Snort
- IDS/IPS
PFSense
- Firewall
Building blocks SOC
People
SOC Analyst
Incident Responders
Threat Hunters
SOC Managers
IT Security/ Compliance/Auditor
Security Architects
Process
Robust
Repeatable playbooks
Guidance with consistency
Periodical updates of Rules/TTP's
Technology
Data Collection
Log Sources
Data Management
Threat Detection
Threat Analytics
Types of SOC's
Proactive SOC
Reactive SOC
SOC Operations
Log Sources
Access Logs
System Activity logs
FTP server logs
Program execution error logs
Database query logs
Webserver access logs
Examples
AD, DC, Azure, Apache, Database logs
Log Management
NIST SP 800-92 guidelines
System Logs
Network Logs
Log Generation, Transmitting, Storing, Analyzing and Disposing
Alert Management
Prioritize True Positives
Discard False Positives
Triage the alert
Resolve
Prevention
Implementing preventive approach
Detection
Unusual traffic
Incident Management
Threat Analysis
How it disrupt organization operations
Incident Response
Resolving the issue
Creating the new detection Rules
Compliance Management
Industry and Government compliance and regulations
Application standards
Protocol Usage
SOC Functions
Threat Detection
Threat Mitigation
Threat Monitoring
Threat Hunting
Troubleshooting the configuration and operational issues
Incident Investigation
Incident Forensics
Industry and government compliance auditing
Few queriers
HTTP status codes
User login country
Application used to login
Request data file
Most clicked links
Most downloaded files
HTTP GET requests
Long tail analysis
Source IP
Destination IP
Destination Port
geolocations
Protocol
Username
Resource
HTTP methods
Status codes
URI query
HTTP request header parse all the parameters useful for analysis
Last updated
Was this helpful?