# SOC/SOAR

Security Operations Center Operations

&#x20;Wazuh

\- HIDS

\- OSSEC

&#x20;

&#x20;

MISP

\- Threat Intellegence

&#x20;

Zeek/Suricata/Snort

\- IDS/IPS

&#x20;

PFSense

\- Firewall

Building blocks SOC

* People
* * SOC Analyst
  * Incident Responders
  * Threat Hunters
  * SOC Managers
  * IT Security/ Compliance/Auditor
  * Security Architects
* Process
* * Robust
  * Repeatable playbooks
  * Guidance with consistency
  * Periodical updates of Rules/TTP's
* Technology
* * Data Collection
  * * Log Sources
  * Data Management
  * Threat Detection
  * Threat Analytics

&#x20;

&#x20;

Types of SOC's

* Proactive SOC
* Reactive SOC

&#x20;

SOC Operations

* Log Sources
* * Access Logs
  * * System Activity logs
    * FTP server logs
    * Program execution error logs
    * Database query logs
    * Webserver access logs
    * Examples
    * * AD, DC, Azure, Apache, Database logs
* Log Management
* * NIST SP 800-92 guidelines
  * System Logs
  * Network Logs
  * Log Generation, Transmitting, Storing, Analyzing and Disposing

&#x20;

&#x20;

* Alert Management
* * Prioritize True Positives
  * Discard False Positives
  * Triage the alert
  * Resolve

&#x20;

* Prevention
* * Implementing preventive approach
* Detection
* * Unusual traffic
* Incident Management
* * Threat Analysis
  * How it disrupt organization operations
* Incident Response
* * Resolving the issue
  * Creating the new detection Rules
* Compliance Management
* * Industry and Government compliance and regulations
  * Application standards
  * Protocol Usage

&#x20;

SOC Functions

* Threat Detection
* Threat Mitigation
* Threat Monitoring
* Threat Hunting
* Troubleshooting the configuration and operational issues
* Incident Investigation
* Incident Forensics
* Industry and government compliance auditing

&#x20;

&#x20;

Few queriers

* HTTP status codes
* User login country
* Application used to login
* Request data file
* Most clicked links
* Most downloaded files
* HTTP GET requests
* Long tail analysis
* * Source IP
  * Destination IP
  * Destination Port
  * geolocations
  * Protocol
  * Username
  * Resource
  * HTTP methods
  * Status codes
  * URI query
  * HTTP request header parse all the parameters useful for analysis
