Building Maturing and Rocking A Security Operations Center Brandie Anderson
Building Maturing and Rocking A Security Operations Center Brandie Anderson
Rocking a Security
Operations Center
Brandie Anderson
Sr. Manager, Global Cyber Security Threat & Vulnerability Management
Hewlett-Packard
To be or Not to be
What is a SOC?
Use Case Creation
People
Agenda
Documentation
Workflow
Metrics
I dont want to grow up
Rocking a SOC
Questions
Organization size
Compliance factors
Reduce the impact of an incident
ROI
Proactive reaction
To be or
Not to be
What is a SOC?
ArcSight Correlation
Use Case
Creation
Large-Scale Water
Holing Attack
Campaigns Hitting
Key Targets
People
Staffing Models
Establishing coverage
Determining the right number of resources
8x5 = Min 2 Analyst w/ on-call
12x5/7 = Min 4-5 Analysts w/on-call
24x7 = Min 10-12 Analysts
Finding the right skills
Ensuring on-shift mentoring
Continuous improvement
Resource Planning
Training
Information security basics
On-the-job training
SEIM training
SANS GCIA and GCIH
Career development
Avoiding burnout
Providing challenges
Outlining career progression
Exactly how do I get from
level 1 to level 2 to lead, etc
Skill assessments
Certifications
Operational
Process &
Procedure
Call Out
Case Management
Event Handling
Monitoring
On-boarding
Shift Log
Shift Turn Over
Triage
Business &
Technology
Analytical
Event Analysis
Incident
Response
Reporting
Research
Threat
Intelligence
Access
Management
Architecture
Compliance
DR/BCP
Process
Improvement
Use Cases
10
Microsoft SharePoint
Pro
Documentation
Repository
Choices
Con
Approved by Policy
Already deployed, supported
both internal & by Microsoft
Integrates with Active
Directory & MS Office
Allows for Calendars, Task
Assignment, Notifications,
Document Revision Tracking
Wiki
Pro
Complicated to use
Typically hard to find information
(search)
Not very flexible
File Shares
No real revision
control
Pro
Everyone has MS Office
Everyone knows how to use a
file share
Does not require specific
technology knowledge
Con
Open Source
Open Source
Editor utilizes Markup
Not Vendor supported
Language (HTML-like)
Easy to Search
Malleable
Revision Control
Plugins allow extensive
customization
Con
Cluttered
Overlap of information
Nearly impossible to search
for information
Requires someone in charge
of upkeep
No revision control
11
12
Rule Fires
Queued
Event
Incident
Workflows
Case
SOC
Level 1 Triage
Level 2
Level 1 Triage
Investigating
Level 2
Investigating
Departmental
Organizational
Engineering
Filter/Tuning
Closed
Close Events
Incident Response
or Ticket
13
Metrics
Further defined
Per hour/day/week/month
Per analyst
Per hour of day/ per day of week
Incident / case category / severity
14
Maturing
15
According to the book Pragmatic Security Metrics Applying Metametrics to Information Security*, an
information security version of the Capability Maturity Model (CMM) looks loosely like this:
CMM Example
Recovery
Lessons
Learned
Eradication
Containment
Rocking It
Identification
Preparation
17
Questions
Thank you!