Chapter 4
Chapter 4
The main purpose is to protect the organization’s assets such as information, hardware,
and software from malicious activities, ensuring confidentiality, integrity, and availability
(CIA) of these assets and services.
Compliance and Validation: Governance risk and compliance programs (e.g., ISO 27001
Readiness Assessment) to ensure business continuity without risks.
A SOC is a centralized unit that continuously monitors, manages and analyzes activities
on an organization’s information systems (networks, servers, endpoints, databases,
applications, and websites).
Network-flow Monitoring: Detecting and analyzing packet flows (inflow and outflow),
generating alerts for suspicious activities.
SOC Responsibilities:
SOC Capabilities:
1. Preventing Capability:
Directing Incident Response Teams to perform security monitoring, detecting risks, and
designing solutions.
2. Detection Capability:
3. Responding Capability:
4. Reporting Capability:
Providing reports and dashboards on security events, compliance levels, and alarms
generated.
Staying Current: Keeping up with the latest security solutions, technologies, and threat
intelligence.
Log Management: Collecting and analyzing log data to establish normal activity and
reveal anomalies.
Threat Detection: Sorting through data to identify and triage threats by severity.
Recovery and Remediation: Eradicating threats and recovering impacted assets to their
pre-incident state.
Post-Mortem and Refinement: Using incident insights to update processes, policies, and
tools. (using any new intelligence gained from the incident to better address
vulnerabilities)
Components of SOC:
1. People: Security talent responsible for executing functions, including security operators,
analysts, pen testers, internal or outsourced. Their roles include responding to incidents
immediately and communicating with security teams.
3. Technology: Tools that facilitate automatic incident analysis, threat detection and prevention,
event triage, and more. Examples include SIEM solutions, IDS, IPS, firewalls, database activity
monitoring, and automated assessment tools.
Component 1: People
Component 2: Technology:
SOC Models:
1. Internal SOC:
Description: Organization maintains its own SOC with a dedicated security team.
se to invest in an internal SOC to maintain complete control over its security posture
3. Co-Managed SOC:
4. Global SOC:
Example: A small startup with limited IT resources might choose an outsourced external
SOC to gain access to essential security monitoring and response capabilities without
the overhead of building their own SOC.
4. Reviewing and Reporting: Identifying areas for improvement and ensuring proper operation.
SOC Key Performance Indicators (KPI):
KPIs are a series of measurements that are used to analyze the performance of an activity. It should be
SMART: Specific, Measurable, Actionable, Relevant, Timely.
o Specific means it should evaluate the attribute of the system directly; it should not depend upon
the measurements of other systems as well as the integration of different systems.
o Measurable means, KPI's should provide accurate and complete information.
o Actionable means it should provide information which is easy to review on which appropriate
action can be taken.
o Relevant means it should be able to provide relevant data from the collected information.
o Timely means it should provide information at the requirement.
NOC Responsibilities:
SOC Responsibilities:
Differences:
o Different team Skillsets: The skillsets required for NOC and SOC personnel differ. NOC
technicians need expertise in network troubleshooting and performance optimization,
while SOC analysts need a strong understanding of cybersecurity threats and incident
response procedures.
o Different objective and Attention: Each function requires a dedicated focus. Merging
them could dilute the effectiveness of both teams in managing their core
responsibilities.
Collaboration:
o Indicate potential issues, not necessarily faults; Separately, transaction logs or firewall
logs or intrusion prevention system (IPS)/intrusion detection system (IDS) logs do not
represent any fault.
1. Security logging: Records security-related activities like threats, viruses, data loss, user login,
and unauthorized access.
3. Compliance logging: Ensures security regulations are followed, part of security logging.
4. Application debug logging: Records debugging logs for developers to detect issues, beneficial
for application/system developers.
Events
Event: An observed change in the system, network, process, workflow, or person, , includes
potential security risk (day-to-day).
o Event examples include: user signed into the system, router Access Control Lists were
updated, firewall policy was pushed, CPU utilization exceeded 99%, updating a
database, etc. that may affect system security, indicating potential security risks
Security events: Events that may affect the security of the system or network and indicate that
there may be a violation of security policy or failing of any security safeguard.
These events are stored as logs and analyzed by the Security Operations Center (SOC).
Events Example
o Description: Generated when the system restarts or shuts down unexpectedly. It means
that the system cannot predict when the system is going to shut down.
Incident
Log Advantages
Log Content
User identification, date and time, event type, success or failure, event origination point,
description, severity, service name, protocol, and user information.
Logging Approaches
Local Logging
Definition: Logs user activities in the host machine, writing logs into files on local disks.
Challenges: Managing and analyzing logs across multiple hosts can be difficult.
Solution: Centralized logging can address the difficulty of managing logs from multiple hosts.
o Failed and successful modification of user credentials and access rights (e.g., account
updates, creation, deletion).
Centralized Logging
Definition: Collecting and aggregating logs generated by network devices in a central server.
Process: Involves four parts – logs collection, transport, storage, and analysis.
o Failed and successful user access to the network initiated to/from the computer.
Linux Logs
Linux logs: Records of activities or events in Linux OS, including messages about the system,
kernel, package managers, boot processes, Xorg, Apache, and MySQL.
Location: Most logs are in the /var/log directory in plain ASCII text format.
Production: Logs are generated by the system log daemon (syslogd) on behalf of the system and
application, whereas some applications produce logs directly into /var/log directory.
Categories: Linux logs, Application logs, event logs, service logs, and system logs.
Directory Examples
1. /var/log/messages or /var/log/syslog
o Stores all informational and non-critical messages like error messages, startups,
shutdowns, and network configuration changes.(global system)
2. /var/log/auth.log or /var/log/secure
3. /var/log/kern.log
o Kernel-related information, useful for solving kernel errors and warnings, as well as
hardware and connectivity issues.
4. /var/log/cron.log
5. /var/log/qmail/
6. /var/log/httpd/
7. /var/log/boot.log
8. /var/log/mysqld.log
o Debug, failure, and success messages about [mysqld] and [mysqld_safe] daemon.
9. /var/log/yum.log
o Information on package installations using the yum command, useful for verifying
package installations and troubleshooting software issues.
Linux Log Samples from /var/log
o Example: Failed password for invalid user root from 10.0.0.1 port 53555 ssh2
o Description:
✓ sshd[54321]: Failed password for invalid user root from 10.0.0.1 port 53555 ssh2: This
records a failed login attempt for a non-existent user "root" from the IP address
10.0.0.1. The port used was 53555, which is not the standard SSH port (22), suggesting a
potential port scanning attempt.
o Example: Accepted public key for user alice from 172.16.0.2 port 22 ssh2
o Description:
✓ sshd[7890]: Accepted public key for user alice from 172.16.0.2 port 22 ssh2: This
indicates a successful SSH login for user "alice" using a public key for authentication. The
login originated from IP address 172.16.0.2, and the standard SSH port (22) was used.
✓ CRON : (pam_unix:session): session opened for user root by (uid=0): This log entry is
related to a cron job execution. The specific user who owns the cron job is mentioned,
followed by details similar to a user login, indicating the system created a temporary
session to run the cron job with root privileges.