SOP of SOC
SOP of SOC
Of
Mission
A SOC is a team primarily composed of security analysts organized to detect, analyze, respond to, report
on, and prevent cyber-security incidents. A SOC provides services to a set of customers referred to as
a constituency—a bounded set of users, sites, IT assets, networks, and organizations. Combining
definitions from and, a constituency can be established according to organizational, geographical,
political, technical, or contractual demarcations. In order for an organization to be considered a SOC, it
must:
2. Monitoring, detection, and analysis of potential intrusions in real time and through historical trending
on security-relevant data sources
3. Response to confirmed incidents, by coordinating resources and directing use of timely and
appropriate countermeasures
4. Providing situational awareness and reporting on cybersecurity status, incidents, and trends in
adversary behavior to appropriate organizations
Overall, the objectives of the SOC are to protect the organization's IT infrastructure from
potential security threats, minimize the impact of security incidents, and ensure the
organization is compliant with relevant regulations and requirements.
Organizational Structure and Hierarchy of SOC Team
Security analyst
Security engineer
SOC manager
Event classification and triage are critical components of a Security Operations Center (SOC) team's
incident response process. Here's an overview of how SOC teams classify and triage events:
Event Classification: SOC analysts (Tier 1) use a classification scheme to determine the severity of each
event or alert. This allows them to prioritize their response efforts based on the potential impact to the
organization.
At present in our SOC we Analysis About our Host . Tier 1 classify the hosts in 4 category according to
the Risk level
1. Critical User : The user Whose Risk point 100 we categories them as a Critical user. We observe
their Installed Software and also their files
2. High Risk Level User (Risk point 70-99) These events represent a critical threat to the
organization and require immediate attention, such as a data breach or ransomware attack.
3. Medium Risk level User ( Risk point 30-69) These events are significant but not as critical as high-
severity events. Examples might include a phishing attempt or an attempted exploit of a known
vulnerability.
4. Low Risk level User ( risk point 0-29) : These events represent a potential threat to the
organization, but are not as urgent as high or medium severity events. Examples might include a
failed login attempt or a low-level network scan.
Overall, the SOC prioritization and analysis stage is critical in ensuring that the security team can
effectively manage and respond to potential threats. By prioritizing incidents based on their severity and
impact, the team can focus their resources on the most critical issues and respond in a timely and
effective manner.
Re-configure network access (e.g. ACL and firewall rules, VPN access etc
Validate patching procedures and other security controls by running network vulnerability
scans
Running network vulnerability assessments and generating compliance reports are some of the most
common audit activities for SOC team members. Additionally, SOC team members may also review their
SOC processes with audit teams (internal and external) to verify policy compliance as well as determine
how to improve SOC team performance and efficiency.
Tools and Technologies used by SOC Team
1. SIEM
2. EDR/XDR
3. IDS/IPS
4. Firewalls
5. Vulnerability scanners
6. Investigation tools
7. Vulnerabilities Feeds and DB
8. Ticketing solutions
EDR/XDR
An Endpoint Detection and Response (EDR) is a tool that gets installed into each endpoint to collect
information about its behavior. Here is a list of some behavioral information that an EDR can get from an
endpoint:
ARP
DNS
Sockets
Registry
Memory dumps
System calls
IP addresses
Hardware types
Firewalls
Firewalls are one of the most important components of the security chain, it is the first line of security in
the network. The main job of a firewall is to protect the network from external and internal networks
attacks by monitoring incoming and outgoing packets to whether allow or block the traffic.
The next-generation firewalls, perform much more actions to protect the network, like going deeper in
analyzing the packets it receives by monitoring the traffic at the level of applications. In addition, they
also include intrusion detection and prevention systems, Antivirus, URL filtering system, and a Sandbox
to analyze unknown suspicious files.
Vulnerability scanners
a) Nmap
b) Zenmap
c) OpenVAS
d) Burp Suite
e) Nessus
Investigation tools
Vulnerabilities Feeds