SlideShare a Scribd company logo
1 of 25
Can We REALLY 10X the SOC?
Dr Anton Chuvakin
Outline
● Reminder: SOC today
● Why change the SOC?
● Improve SOC 10% or 10X?
● Possible routes to 10X SOC
Outline
Reminder:
SOC today
A security operations center provides
centralized and consolidated
cybersecurity incident prevention,
detection and response capabilities.
– Gartner
What is a SOC?
SOC is first a TEAM. That follows PROCESSES. And uses
TECHNOLOGY.
Outline
Why change
the SOC?
Force 2: Security
talent shortage
More things to secure
than people...
Forces that Push SOC
Force 3: Too many
alerts from too
many tools
More things to secure
that all scream for
attention…
!
Force 1: Expanding
attack surface
More things to secure...
(source)
Also, There is This Cloud Thing...
● Uncommon log collection methods
● Telemetry data volumes may be high
● Alien licensing models for security tools
● Alien detection context (!)
● Lack of clarity on cloud detection use cases
● Governance sprawl
● SOC teams lacking cloud skills
● Ill-fitting tools
● Lack of input from SOCs into cloud decisions
Outline
Improve SOC 10%
or 10X?
Inspired by IT
helpdesk
philosophy
“Classic” SOC … Let’s Make It 10% Better ...
Focuses on
alert pipeline,
and pairs alerts
to analysts
Centered
on a SIEM
(SOC = SIEM
analyst team)
Has walls
between alert
handlers and
alert tuners
Shallow
metrics on
handling time
Threat
intelligence is
sometimes
consumed
Treats
incidents as
rare and
abnormal
+10% +10% +10% +10%
OLD SOC! NOW WITH +10% FASTER ALERT TRIAGE AND 10%
LOWER FALSE POSITIVES! :-)
Modern SOC
Process
structures
around threats,
not alerts
Deeper testing
and coverage
analysis
Teams are
organized
by skill, not
rigid level
Multiple
visibility
approaches,
not just logs
Detection
engineering
(analysts are
engineers)
Automation
via SOAR
works as a
force
multiplier
Threat
intelligence
is consumed
and created
Threat hunting
covers cases
where alerts
never appear
Highlights of Modern SOC: People
Highlights of Modern SOC: Process
Detection content versioning
1
2
3
4
5
Proper “QA” for detection content”
Content (code) reuse and modularity
Cross-vendor and cross-tool content
Metrics, coverage and improvement
P.S. This is not about programming as such
Highlights of Modern SOC: Technology
Usually unified by SOAR
P.S. Logs aren’t always #1 on the list
Security Operations
Visibility Triad
Logs (such as via SIEM)
Endpoint data (such as via EDR)
Network data
(such as via NDR)
Outline
Possible routes to
10X SOC
SOC Transformation Framework
Tactical Strategic Transformational
People
Process
Technology
Grow the analysts to develop
detections
Hire partners to augment your team
Optimize the alert triage process
Expand the use of threat intelligence
Evolve SIEM, expand to other visibility
approaches
Experiment with SOAR & automation
Rotate analysts and engineers
Start threat hunting
Refine threat intelligence
Adopt SaaS tools for SIEM, EDR,
etc
Deploy automation use cases
Federated workforce that operates
synergistically across org-wide risks
Analysts are engineers and develop
scalable solutions to security issues
Threat hunters and blue team drive
collaborative missions & objectives
Create threat intelligence
Leverage a cloud-native tech stack
Develop AI/ML use case engineering
Plan, advocate, evangelize, and drive a transformation of your SOC to a Security Operations Center of Excellence.
TRANSFORMATIONAL
STRATEGIC
TACTICAL
Grow the analysts to develop
detections
Hire partners to augment your team
Offer learning paths and certification
opportunities to your workforce
Define a clear boundary to manage a
healthy work-life balance for your
team
Rotate analysts and engineers
Provide comprehensive onboarding
and skills development programs
Offer stretch opportunities, career
alignment, and leadership training
Revamp your hiring program to seed
talent potential and skills-based
personnel
People Transformation
Federated workforce that operates
synergistically across org-wide risks
Analysts are engineers and develop
scalable solutions to security issues
Continual growth & development of
talent and a consistent promotion
pipeline
Engage your personnel to represent
your team in the industry - talks,
speaking opps, conferences, etc
People
5 Key Steps To Take
5
4
3
1 Remove walls in a SOC that separates analysts and engineers
Identify skills needed in your SOC, start to hire skills, not
levels
Boost productivity with automating routine tasks (via SOAR)
Take advantage of partners & 3rd parties
2
Create a culture of empowerment and innovation
Process Transformation
TRANSFORMATIONAL
STRATEGIC
TACTICAL
Improve alert triage
Consume threat intelligence
Basics of detection engineering
Triage and periodic hunts
Improve threat intelligence
Detection engineering is multi-
faceted and can leverage many
contexts for detectors
Automate the alert triage
process
A fusion of hunting, detection
and detection engineering
Create threat intelligence
Adapt an SRE-like approach to
automating workflows in SOC
Process
5 Key Steps To Take
5
4
3
1 Solidify the basics; don’t hunt before you can detect well
Focus on threat intelligence to boost other SOC work
Drive an “SRE” approach - 50% time towards automation
Add hunting, testing and analytics afterwards
2
More transparency will allow more creative problem solving
Technology Transformation
TRANSFORMATIONAL
STRATEGIC
TACTICAL
Improve usage of SIEM
Include cloud visibility into your
D&R use cases
Enrich your product signals with
context from assets
Add NDR, EDR to SIEM
Experiment with SOAR
Cover cloud environments
Align technology signals &
detection content to MITRE
Heavily automated fusion of
many sensors
Build data science & AI/ML
capabilities for detection
Leverage a cloud-native stack
Co-develop technology features
with your vendors and partners
Optimize technology TCO to
spare budget for people and
process improvements
5 Key Steps To Take
5
4
3
1 Don’t discard a SIEM / UEBA
Expand visibility: NDR, EDR (XDR?), cloud, etc
Be aware that SaaS tools will win in the end
Use SOAR to automate
2
Tech
Use ML, but don’t assume magic...
Prevent Detect Respond Secure
Tactical
Transformationa
l
Strategic
Migration to the cloud w/
best practices on security
architecture & patterns
DevOps / Automated
Deployment / Config-as-
Code. Effective vuln
management.
All changes fully controlled,
reviewed, and implemented.
Highly effective vuln
management.
Ingestion & centralization of
all critical data sources, likely
outsourcing key SOC roles
Integrated tooling, SOAR
implementation, IOC-
matching & strong TI
Predictive analytics,
detection engineering &
automation, threat hunting,
behavioral analytics
Ad-hoc investigative
capabilities, outsourcing all
response activities
Dedicated IR team & clearly
defined roles, playbooks,
and use case coverage
Adversarial deception,
response automation, chaos
engineering, full use case
coverage
Struggle to react to evolving
threats
Ability to react to new and
existing threats + hunt, but
still resource constrained
Fully proactive. Minimal
MTTD, MTTR, and RTO.
Without THIS you won’t be SECURE. So INFLUENCE!
Recommendations
● If SOC = detection team, than SOC lives on in the modern
world
● Modernize your SOC but preserve the mission: detection and
response
● Evolve SOC to more automation to catch up with modern IT
● “DevOps” or SRE your detection engineering (Dev = content
creator, Ops = analyst)
○ An idea with 10X SOC potential
● Learn new detection context for cloud and cloud-native tools
● Mercilessly discard tools that don’t fit the cloud practices or fail
to support cloud technology
Resources
● “Modernizing SOC ... Introducing Autonomic Security Operations”
● “New Paper: “Autonomic Security Operations — 10X Transformation
of the Security Operations Center””
● “SOC in a Large, Complex and Evolving Organization” (ep26)
● “The Mysteries of Detection Engineering: Revealed!”’ (ep27)
● “Kill SOC Toil, Do SOC Eng”
● “A SOC Tried To Detect Threats in the Cloud … You Won’t Believe
What Happened Next”
● “Role of Context in Threat Detection”
Why SOC Lives On … Transformed
SOC as a
CROWDED
ROOM may
be dead…
SOC as a
Detection &
Response team
is NOT dead.
The future SOC exists as a distributed
and autonomic Security Operations
Center of Excellence.

More Related Content

What's hot

What's hot (20)

20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 

Similar to 10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
Asep Syihabuddin
 

Similar to 10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin (20)

Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
 
SOAR Platform
SOAR PlatformSOAR Platform
SOAR Platform
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Make Career As Security Operations Center (SOC) Analyst - IISecurity
Make Career As Security Operations Center (SOC) Analyst - IISecurity Make Career As Security Operations Center (SOC) Analyst - IISecurity
Make Career As Security Operations Center (SOC) Analyst - IISecurity
 
Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
 
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
Security Operations  Cloud vs On Prem ISC2 Bangalore SlideShare.pptxSecurity Operations  Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx
 
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself Secure
 

More from Anton Chuvakin

More from Anton Chuvakin (20)

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
On Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton ChuvakinOn Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
 
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS  by Dr. Anton ChuvakinPCI 2.0 What's Next for PCI DSS  by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
Navigating the Data Stream without Boiling the Ocean::  Case Studies in Effec...Navigating the Data Stream without Boiling the Ocean::  Case Studies in Effec...
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
 
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
 
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinWhat PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin

  • 1. Can We REALLY 10X the SOC? Dr Anton Chuvakin
  • 2. Outline ● Reminder: SOC today ● Why change the SOC? ● Improve SOC 10% or 10X? ● Possible routes to 10X SOC
  • 4. A security operations center provides centralized and consolidated cybersecurity incident prevention, detection and response capabilities. – Gartner What is a SOC? SOC is first a TEAM. That follows PROCESSES. And uses TECHNOLOGY.
  • 6. Force 2: Security talent shortage More things to secure than people... Forces that Push SOC Force 3: Too many alerts from too many tools More things to secure that all scream for attention… ! Force 1: Expanding attack surface More things to secure... (source)
  • 7. Also, There is This Cloud Thing... ● Uncommon log collection methods ● Telemetry data volumes may be high ● Alien licensing models for security tools ● Alien detection context (!) ● Lack of clarity on cloud detection use cases ● Governance sprawl ● SOC teams lacking cloud skills ● Ill-fitting tools ● Lack of input from SOCs into cloud decisions
  • 9. Inspired by IT helpdesk philosophy “Classic” SOC … Let’s Make It 10% Better ... Focuses on alert pipeline, and pairs alerts to analysts Centered on a SIEM (SOC = SIEM analyst team) Has walls between alert handlers and alert tuners Shallow metrics on handling time Threat intelligence is sometimes consumed Treats incidents as rare and abnormal +10% +10% +10% +10% OLD SOC! NOW WITH +10% FASTER ALERT TRIAGE AND 10% LOWER FALSE POSITIVES! :-)
  • 10. Modern SOC Process structures around threats, not alerts Deeper testing and coverage analysis Teams are organized by skill, not rigid level Multiple visibility approaches, not just logs Detection engineering (analysts are engineers) Automation via SOAR works as a force multiplier Threat intelligence is consumed and created Threat hunting covers cases where alerts never appear
  • 11. Highlights of Modern SOC: People
  • 12. Highlights of Modern SOC: Process Detection content versioning 1 2 3 4 5 Proper “QA” for detection content” Content (code) reuse and modularity Cross-vendor and cross-tool content Metrics, coverage and improvement P.S. This is not about programming as such
  • 13. Highlights of Modern SOC: Technology Usually unified by SOAR P.S. Logs aren’t always #1 on the list Security Operations Visibility Triad Logs (such as via SIEM) Endpoint data (such as via EDR) Network data (such as via NDR)
  • 15. SOC Transformation Framework Tactical Strategic Transformational People Process Technology Grow the analysts to develop detections Hire partners to augment your team Optimize the alert triage process Expand the use of threat intelligence Evolve SIEM, expand to other visibility approaches Experiment with SOAR & automation Rotate analysts and engineers Start threat hunting Refine threat intelligence Adopt SaaS tools for SIEM, EDR, etc Deploy automation use cases Federated workforce that operates synergistically across org-wide risks Analysts are engineers and develop scalable solutions to security issues Threat hunters and blue team drive collaborative missions & objectives Create threat intelligence Leverage a cloud-native tech stack Develop AI/ML use case engineering Plan, advocate, evangelize, and drive a transformation of your SOC to a Security Operations Center of Excellence.
  • 16. TRANSFORMATIONAL STRATEGIC TACTICAL Grow the analysts to develop detections Hire partners to augment your team Offer learning paths and certification opportunities to your workforce Define a clear boundary to manage a healthy work-life balance for your team Rotate analysts and engineers Provide comprehensive onboarding and skills development programs Offer stretch opportunities, career alignment, and leadership training Revamp your hiring program to seed talent potential and skills-based personnel People Transformation Federated workforce that operates synergistically across org-wide risks Analysts are engineers and develop scalable solutions to security issues Continual growth & development of talent and a consistent promotion pipeline Engage your personnel to represent your team in the industry - talks, speaking opps, conferences, etc
  • 17. People 5 Key Steps To Take 5 4 3 1 Remove walls in a SOC that separates analysts and engineers Identify skills needed in your SOC, start to hire skills, not levels Boost productivity with automating routine tasks (via SOAR) Take advantage of partners & 3rd parties 2 Create a culture of empowerment and innovation
  • 18. Process Transformation TRANSFORMATIONAL STRATEGIC TACTICAL Improve alert triage Consume threat intelligence Basics of detection engineering Triage and periodic hunts Improve threat intelligence Detection engineering is multi- faceted and can leverage many contexts for detectors Automate the alert triage process A fusion of hunting, detection and detection engineering Create threat intelligence Adapt an SRE-like approach to automating workflows in SOC
  • 19. Process 5 Key Steps To Take 5 4 3 1 Solidify the basics; don’t hunt before you can detect well Focus on threat intelligence to boost other SOC work Drive an “SRE” approach - 50% time towards automation Add hunting, testing and analytics afterwards 2 More transparency will allow more creative problem solving
  • 20. Technology Transformation TRANSFORMATIONAL STRATEGIC TACTICAL Improve usage of SIEM Include cloud visibility into your D&R use cases Enrich your product signals with context from assets Add NDR, EDR to SIEM Experiment with SOAR Cover cloud environments Align technology signals & detection content to MITRE Heavily automated fusion of many sensors Build data science & AI/ML capabilities for detection Leverage a cloud-native stack Co-develop technology features with your vendors and partners Optimize technology TCO to spare budget for people and process improvements
  • 21. 5 Key Steps To Take 5 4 3 1 Don’t discard a SIEM / UEBA Expand visibility: NDR, EDR (XDR?), cloud, etc Be aware that SaaS tools will win in the end Use SOAR to automate 2 Tech Use ML, but don’t assume magic...
  • 22. Prevent Detect Respond Secure Tactical Transformationa l Strategic Migration to the cloud w/ best practices on security architecture & patterns DevOps / Automated Deployment / Config-as- Code. Effective vuln management. All changes fully controlled, reviewed, and implemented. Highly effective vuln management. Ingestion & centralization of all critical data sources, likely outsourcing key SOC roles Integrated tooling, SOAR implementation, IOC- matching & strong TI Predictive analytics, detection engineering & automation, threat hunting, behavioral analytics Ad-hoc investigative capabilities, outsourcing all response activities Dedicated IR team & clearly defined roles, playbooks, and use case coverage Adversarial deception, response automation, chaos engineering, full use case coverage Struggle to react to evolving threats Ability to react to new and existing threats + hunt, but still resource constrained Fully proactive. Minimal MTTD, MTTR, and RTO. Without THIS you won’t be SECURE. So INFLUENCE!
  • 23. Recommendations ● If SOC = detection team, than SOC lives on in the modern world ● Modernize your SOC but preserve the mission: detection and response ● Evolve SOC to more automation to catch up with modern IT ● “DevOps” or SRE your detection engineering (Dev = content creator, Ops = analyst) ○ An idea with 10X SOC potential ● Learn new detection context for cloud and cloud-native tools ● Mercilessly discard tools that don’t fit the cloud practices or fail to support cloud technology
  • 24. Resources ● “Modernizing SOC ... Introducing Autonomic Security Operations” ● “New Paper: “Autonomic Security Operations — 10X Transformation of the Security Operations Center”” ● “SOC in a Large, Complex and Evolving Organization” (ep26) ● “The Mysteries of Detection Engineering: Revealed!”’ (ep27) ● “Kill SOC Toil, Do SOC Eng” ● “A SOC Tried To Detect Threats in the Cloud … You Won’t Believe What Happened Next” ● “Role of Context in Threat Detection”
  • 25. Why SOC Lives On … Transformed SOC as a CROWDED ROOM may be dead… SOC as a Detection & Response team is NOT dead. The future SOC exists as a distributed and autonomic Security Operations Center of Excellence.