How To Build A SOC in A Budget
How To Build A SOC in A Budget
Introduction 3
How to build a SOC with limited resources
People
No matter how well automated a SOC is, people are an absolute necessity. The
two most fundamental roles in a SOC are the security analyst and the incident
responder. Security analysts work primarily in the monitoring and detection
phases of a SOC. Typical tasks include monitoring alarms from an all-in-one
platform and performing triage to determine which alarms require intervention
from the incident responders. Incident responder tasks may include:
Processes
Every SOC, no matter what staffing model an organisation uses, relies on
processes. Technology brings people and processes together — such as an
all-in-one SIEM platform that notifies a security analyst of something that needs
immediate attention, or an incident responder commanding a SIEM platform
to do something on the incident responder’s behalf. But processes also help
people to work with each other. For example, a security analyst may mark a
set of events in the SIEM platform that an incident responder needs to further
investigate. The SIEM platform provides workflow capability that transfers
responsibility for the work from the security analyst to the incident responder.
Technology
An all-in-one platform is ideal for building a • Use workflow capabilities to alert each
SOC because it includes and integrates all person/role when it is their turn to do
the needed forms of security automation and something for the SOC, such as reviewing
incident response orchestration into a single an event it has flagged as high risk.
display. Here are some examples of what a • Interface with asset management,
SIEM platform can do: vulnerability management, trouble
ticketing, intrusion prevention, and other
• Centralise all forensic data supporting
existing systems to automatically integrate
effective machine analytics and enabling
SOC processes with business processes.
rapid investigations, so it can be
This greatly expedites workflow and
monitored at all times and analytics can
reduces workload for staff in numerous
be utilised to identify events of particular
departments.
interest, this eliminates the need to have
people looking at the raw security event • Enable automated responses that are
data on monitors 24 hours a day. automatically associated with specific
alarms. Actions that can be initiated
• Provide context for security events and
without human interaction, or that
incidents by integrating critical threat
require single-click approval, can greatly
intelligence sources and vulnerability data,
benefit your team’s time to respond to
as well as information from integrated
an incident. An all-encompassing SIEM
systems in human resources, finance,
platform should recognise common
contracting, etc. regarding business
situations, such as a basic malware
systems and assets. This context enables
compromise, and automatically respond
security analysts to better determine what
so the team can focus on more complex
an attacker may be attempting to do and
and impactful events and incidents.
why.
• Prioritise events of interest based on their
relative risk to the organisation so that
SOC staff can pay attention to the most
concerning events first.
• Pull evidence together in one location
and safely and securely share it with
authorised individuals, such as remote
staff and outsourcers involved in an
incident response effort.
Security analysts 2 FTEs @ $120K each 8 FTEs @ $120K each 20 FTEs @ $120K each
Incident responders 1 FTE @ $145K each 4 FTEs @ $145K each 8 FTEs @ $145K each
Specialists (malware 0 FTEs; outsource and 2 FTEs @ $150K each 5 FTEs @ $150K each
reverse engineers, pay when needed (est.
forensic analysts, etc.) $50K/year)
Security analysts 1 FTE @ $120K each 4 FTEs @ $120K each 8 FTEs @ $120K each
Incident responders 1 FTE @ $145K each 2 FTEs @ $145K each 4 FTEs @ $145K each
Specialists (malware 0 FTEs; outsource and 1 FTE @ $150K each 2 FTEs @ $150K each
reverse engineers, pay when needed (est.
forensic analysts, etc.) $25K/year)
Expert note
The key to implementing the solution itself is to focus on taking full advantage of
the
18 technology
| Chapter Title to minimise the workload on people.
CONCLUSION
Having an all-in-one SIEM platform capabilities that transfer responsibility
has become an absolute necessity for for specific tasks from person to
implementing a SOC to achieve greater person or role whenever needed. This
efficiency. A hybrid SOC is the just-right keeps things moving and minimises
solution for organisations that cannot justify miscommunications that could
inadvertently delay action or cause
the overwhelming expenses of a formal
duplicated efforts.
SOC and cannot tolerate the inadequate
protection provided by an informal SOC. • Automates incident response
orchestration so that all people involved
The LogRhythm NextGen SIEM Platform in incident response have immediate
is the ideal technology for building a SOC. access to necessary information
Organisations that adopt this strategy can
LogRhythm’s security automation and
achieve immediate and ongoing cost savings
orchestration capabilities significantly
as compared to adopting any other SOC
improve the efficiency and effectiveness of
model. This strategy also leads to a material
incident response.
reduction in risk for the organisation. Specific
ways in which the LogRhythm platform
benefits organisations include the following:
Conclusion | 19