Captura de Tela 2024-07-20 À(s) 11.36.58
Captura de Tela 2024-07-20 À(s) 11.36.58
CYBERSECURITY
OPERATIONS
CENTER
HIGHLIGHTS
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
About MITRE
Protecting the digital enterprise against sophisticated cyber adversaries requires
strategy, timely information, and 24/7 vigilance. As a not-for-profit company pioneering
in the public interest, MITRE works in partnership with an innovation ecosystem of
government, private sector, and academia to secure cyber systems. In our 60+ years
of catalyzing change through partnership, we never lose sight of the human factor
behind every complex system and innovative solution. MITRE draws from a wealth
of deep technical expertise to address the ever-evolving challenges in cybersecurity.
We know that working in partnership to protect organizations is crucial to national
security, critical infrastructure, economic stability, and personal privacy. The guidance
we share with the cyber defender community continues to advance the field’s science
and practice. Operating without commercial conflicts of interest, we’re working to
arm a worldwide community of cyber defenders with vital information to thwart
network intruders.
As part of our cybersecurity research in the public interest, MITRE has a long history
of developing standards and tools used by the broad cybersecurity community, such
as STIX,™ TAXII,™ and CVE.® Our MITRE ATT&CK® framework, which provides a free
online knowledge base of cyber adversary behavior, is used worldwide.
Our expert staff continues to partner and collaborate on many cybersecurity resources
and innovations. The 11 Strategies of a World-Class Cybersecurity Operations Center is
a practical guide to enhancing digital defense for SOC operators—and an embodiment
of MITRE’s mission of solving problems for a safer world.
-2-
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
-3-
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
Table of Contents
SOC Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
STRATEGY 1: Know What You Are Protecting and Why . . . . . . . . . . . . . . 7
STRATEGY 2: Give the SOC the Authority to Do Its Job . . . . . . . . . . . . . . 8
STRATEGY 3: Build a SOC Structure to Match Your Organizational Needs . . . . . 9
STRATEGY 4: Hire and Grow Quality Staff . . . . . . . . . . . . . . . . . . . . 11
STRATEGY 5: Prioritize Incident Response . . . . . . . . . . . . . . . . . . . .12
STRATEGY 6: Illuminate Adversaries with Cyber Threat Intelligence . . . . . . . 13
STRATEGY 7: Select and Collect the Right Data . . . . . . . . . . . . . . . . .14
STRATEGY 8: Leverage Tools to Support Analyst Workflow . . . . . . . . . . . . 15
STRATEGY 9: Communicate Clearly, Collaborate Often, Share Generously . . . . .16
STRATEGY 10: Measure Performance to Improve Performance . . . . . . . . . . 17
STRATEGY 11: Turn up the Volume by Expanding SOC Functionality . . . . . . . .18
About the Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
-4-
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
SOC Fundamentals
The operational focal point for incident detection, analysis, and response is
the cybersecurity operations center (CSOC, or simply SOC). A SOC satisfies
the constituency’s cyber monitoring and defense needs by performing a set
of functions for its constituency.
• Vulnerability Management
- SOCs accomplish their mission in large part by being purveyors and curators
of copious amounts of security-relevant data.
- They must be able to collect and understand the right data at the right time
in the right context.
- Virtually every mature SOC employs several different technologies, along
with automation processes, to generate, collect, enrich, analyze, store, and
present tremendous amounts of security-relevant data to SOC members.
-5-
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
-6-
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
-7-
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
CHALLENGE: SOCs are on the front line in defending a constituency’s cyber assets.
Where they are in the organizational structure, and how they are funded, directly
impacts their ability to fulfill their mission.
-8-
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
CHALLENGE: There are thousands of SOCs around the world and no two are organized
exactly alike. What’s appropriate for one organization may not work for another; there
are many models to build from.
Different SOC organizational models help the SOC support consistencies of dramatically
different sizes and shapes. The primary SOC organizational models include:
- 10 -
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
CHALLENGE: People are the most important aspect of operating a world-class SOC.
Ensuring you have qualified staff—through training and recruitment—is key.
- 11 -
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
CHALLENGE: As long as there have been computers and networks, there have been cyber
incidents. Typically, a SOC’s effectiveness is determined by how and when it responds.
- 12 -
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
CHALLENGE: Most constituencies generate more digital data than an SOC can possibly
process and act upon.
- 14 -
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
CHALLENGE: SOCs bring vast amounts of disparate data together into an information
architecture. Analysts need to be able to quickly evaluate the data, turn the data into
information, and use the information to fulfill their mission.
- 16 -
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
CHALLENGE: SOCs succeed when they fulfil their mission and protect the
constituency’s cyber assets. As technology changes and new threats emerge, SOCs need
to understand what is working well and where improvements would be most beneficial.
- 17 -
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
Threat hunting is one of the best ways for a SOC to find adversaries
that elude ordinary, routine detections and alerting.
- 18 -
HIGHLIGHTS: 11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
Ingrid Parker
Ingrid has worked in cybersecurity roles spanning from
operational hands-on analysis through engaging with
CISOs of large federal departments and agencies.
She is currently the chief engineer for MITRE’s
Homeland Security Enterprise division.
Carson Zimmerman
Carson has been working in cybersecurity in the
commercial and not-for-profit sectors for nearly 20 years,
first at MITRE and now at Microsoft. He is a subject
matter expert on cybersecurity operations center
architectures, consulting, and engineering.
- 19 -
SCAN THE QR CODE ABOVE TO DOWNLOAD THE FULL E-BOOK VERSION OF
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTER
MITRE’s mission-driven teams are dedicated to solving problems for a safer world. Through our public-private partnerships and federally funded R&D centers, we work across
government and in partnership with industry to tackle challenges to the safety, stability, and well-being of our nation.
© 2022 The MITRE Corporation. All rights reserved. Approved for Public Release. Distribution unlimited. #21-3946.