Spiresecurity Soc Noc Convergence Itsm
Spiresecurity Soc Noc Convergence Itsm
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
__________________________________________________________
SOC/NOC
Convergence
Executive Summary
Every few years, two functional IT areas start to look and sound alike.
The processes begin to mirror each other and the products espouse
features that are beneficial to multiple areas. More importantly, the
analysts and engineers start to act a lot alike as well. This is normal, as
the dynamic nature of information technology management creates
many pathways for development of day-to-day operations and the
growth of the various functional areas.
Inevitably, functional similarities give rise to the notion of consolidation
in the minds of decision makers. In hard economic times, the idea
quickly gathers steam and becomes a full-fledged trend adopted by a
number of organizations. That trend is happening with network
operations centers (NOCs) and security operations centers (SOCs)
today.
While the convergence of NOCs and SOCs is not a new concept,
another development in strategic management makes it more likely.
Fundamentally, IT Service Management changes the way IT is aligned
with the business.
This report will review SOC/NOC convergence trends, reasoning,
challenges and implementation considerations. It will also examine
how advancements in datacenter monitoring and security information
management solutions, such as AccelOps, supports SOC/NOC
convergence and service-oriented management.
This white paper was commissioned by AccelOps, Inc.. All content and assertions are the
independent work and opinions of Spire Security, reflecting its history of research in security
audit, design, and risk management activities.
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
i
__________________________________________________________
SOC/NOC
Convergence
SOC/NOC CONVERGENCE
Table of Contents
Optimize resources 3
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
ii
__________________________________________________________
SOC/NOC
Convergence
This customer-centric approach meshes quite well with the technical benefits of
service-oriented management. No customer, end user or executive wants to be mired
in technical details; they are concerned about completing their sales order, getting
work accomplished, or achieving competitive advantage. However, every IT
member recognizes the need for the technical details (the infrastructure details and
operational status that equates to an IT service) behind the application or business
initiative. ITSM is about assuring service reliability, optimizing resources and
continually improving service delivery.
There are three important aspects of ITSM that describe the value proposition:
But all of this flexibility also creates new complexity and drives the need to recognize
where these components are and how to manage them. Most importantly, as we put
together our management scheme, we have to start thinking about the way our IT
organization is structured and how we can tie things together to support the needs
of the organization.
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
1
__________________________________________________________
SOC/NOC
Convergence
Functionally speaking, users care about the services that are being provided to them
and they care about applications they can use on the business side and they care
about the success of their particular line of business. We end up with a lot of details
and lots more opportunity for levels of abstraction that provide you with more
flexibility.
Domain Name Services (DNS) is an obvious example of this from the network
world. Rather than naming a specific IP address to access a Web or email server, a
user or application (by proxy) dynamically looks up the IP address using the domain
name. Clearly, this provides the user with an easier way to navigate and the IT
engineer with flexibility in managing network resources. However, it creates a new
table that requires management.
Given that executives and business owners care about service reliability, IT
organizations must be able to assess, manage and monitor their enterprises from a
service delivery perspective rather than an infrastructure, application and functional
domain perspective. This would require the means to understand component-to-
service dependencies, service-level requirements and available controls.
These three aspects of ITSM – the adoption of SOA and cloud computing,
incorporation of more integrated controls and administration, and leveraging
standards – provide a strategic blueprint for the move towards ITSM in an
organization.
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
2
__________________________________________________________
SOC/NOC
Convergence
Optimize resources
Hard economic times provide the rationale to consider ways to increase efficiency
and effectiveness. Rather than paring down in certain areas, enterprise executives
seek out similarities in function and consolidate. The clear benefit is optimized
resources – lower costs and higher productivity from personnel and software
solutions while performing at the same functional level.
With the anticipated benefits of ITSM more clearly defined, it is easier to apply the
concepts to network and security operations.
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
3
__________________________________________________________
SOC/NOC
Convergence
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
4
__________________________________________________________
SOC/NOC
Convergence
Perhaps more importantly than policy is business value, as it is often overlooked and
key to having all players work well within the mandates set up for the organization.
Business value should drive all policies, processes, and controls.
This includes determining where common processes that support policies can be
leveraged and where requirements and operational oversight may require
adjustment. For example, how an operational problem or security violation is
identified, managed and resolved which may have different documentation and
operational data retention and analysis requirements.
Both network operations and security operations functions must be evaluated for
appropriate controls. From the collection of traffic information through its analysis,
identification of problems, initial investigation, and forensic follow-up, each step in
the process must have controls for the inputs and the handoff to the next step.
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
5
__________________________________________________________
SOC/NOC
Convergence
The product itself combines an automated means to continuously monitor and apply
analytics to discovered network devices, hosts, applications, and users. Beyond
supporting top-tier vendor devices, it ships with built-in correlation rules,
dashboards and reports. The web-based interface is intuitive and its functionality is
well integrated (see Figure 1). AccelOps has a level of built-in event correlation and
usability to benefit each IT domain within network and security operations. This
functionality serves to tackle alerting and incident response, root-cause analysis and
investigations, as well as operational reporting and compliance.
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
6
__________________________________________________________
SOC/NOC
Convergence
AccelOps feature set should satisfy those security inclined. As with SIM solutions, it
captures network flow, events, logs and configuration data to identify attack, threats,
anomalies and violations. In addition, AccelOps keeps track of identity and location
for all subsequent user and system activity. For compliance and governance,
operators can ascertain who did what and when, even if using shared credentials (as
is often the case with administrators managing systems).
Network operators can take advantage of monitoring network and system resource
use, performance and availability metrics, and network topology maps and
inventory. By incorporating a Change Management Database (CMDB), both the
SOC and NOC staff will have access to all pertinent infrastructure details including
virtualized devices. All captured configuration, event and log detail are stored for
subsequent search and reporting employing flat file and embedded relational
database technologies.
With the technical solutions covered, convergence efforts are primed with the right
tools so the integration can take place. Both the SOC and NOC must have their
processes reviewed for change management, network traffic monitoring and
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
7
__________________________________________________________
SOC/NOC
Convergence
For ITSM, AccelOps uses the infrastructure details and relationships derived from
the CMDB, network flow and log data to facilitate the means for users to step
through mapping and defining services. This enables dashboards, problem
identification, SLA trending and reports from a service point of view. As a result,
AccelOps offers a product that not only supports the aforementioned SOC/NOC
convergence, but also advances service-oriented management.
©
2009‐2010
Spire
Security,
LLC.
All
rights
reserved.
8
Contact Spire Security
To comment about this white paper or contact Spire Security, LLC about other security topics,
please visit our website at www.spiresecurity.com.
This white paper was commissioned by AccelOps, Inc.. All content and assertions are the
independent work and opinions of Spire Security, reflecting its history of research in security
audit, design, and consulting activities.
Spire
Security,
LLC
I
P.O.
Box
152
I
Malvern,
PA
19355
www.spiresecurity.com