WTH is Modern SOC, Part 1

Back in 2016 when I was a Gartner analyst, I was obsessed with the same question.
As I said in my now-dead Gartner blog, a lot of security operation centers looked like they were built on a blueprint of a classic paper written by somebody from ArcSight around 2003.
However the conversations I mention above imply that we collectively still lack clarity on the modern SOC concept.
Note that there is another element to this discussion.
Those who read the original Netflix 2018 SOCless paper would be very familiar with an engineering-led model for D&R operations.
2018 is half a decade away and it pains me to say that the elements of this model are not widely adopted by many organizations, outside of the cream of the cream of the crop of tech companies.
That model, while extremely effective, seems to be living exclusively in these ultra-elite companies.
Some elements from our 2016 paper still look modern, but can be done a) in a non-modern manner or b) in a manner decoupled from a SOC. For example, you can have a SOAR tool that you either cannot handle, or only use for phishing playbooks.
Another example: you can hunt, but then not flow the findings into detections powering your SOC. Expansion beyond SIEM/logs was modern circa 2015, but now everybody has EDR. Everybody sane moved or is moving to SaaS SIEM. Threat intel use gradually expanded, but there is no revolution happening here - just improvements.
We treated selective use of outsourcing and MDRs as a sign of modernity in a SOC, but as an auxiliary one at that.
Automating L1 and L2 jobs is a goal, not a characteristic.
Redoing the team structure away from the L1/L2/L3 funnel is a byproduct of a SOC transformation, not a goal.
AI does not transform anything on its own, humans do.
I think the center of gravity for a modern SOC is automation.
It is the relentless drive to D&R automation powered by a rapid and thus effective feedback loop and engineering - led mentality.
To put it mildly, automation in a SOC is commonly misunderstood.
Modern SOC, as I hypothesize here, is about a relentless drive to automate yourself out of a SOC job, something that SRE people did before us.
We have a bit of a road ahead I am thinking of another blog that examines other dimensions that describe a modern SOC circa 2024.
WTH is Modern SOC, Part 1 was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.
This is a Security Bloggers Network syndicated blog from Stories by Anton Chuvakin on Medium authored by Anton Chuvakin.


This Cyber News was published on securityboulevard.com. Publication date: Sat, 09 Dec 2023 05:13:06 +0000


Cyber News related to WTH is Modern SOC, Part 1

The Importance of SOC 2 Templates - Between navigating the SOC 2 landscape and implementing the proper controls and security systems, the to-do list quickly becomes overwhelming. Many tasks required for successful SOC 2 compliance don't come with a 'how-to' manual. In this piece, we're ...
1 year ago Securityboulevard.com
WTH is Modern SOC, Part 1 - Back in 2016 when I was a Gartner analyst, I was obsessed with the same question. As I said in my now-dead Gartner blog, a lot of security operation centers looked like they were built on a blueprint of a classic paper written by somebody from ...
1 year ago Securityboulevard.com
Unlocking Security Excellence: The Power of SOC-as-a-Service - In today's interconnected digital landscape, organizations face a constant barrage of cyberthreats. The increasing complexity and sophistication of these attacks require robust security measures to safeguard sensitive data and ensure business ...
1 year ago Securityboulevard.com
SOC Evolution Is About More Than Automation - Among the most critical concerns in the cybersecurity community is the apparent scarcity of a workforce with the requisite skills and training to keep pace with the expanding attack surface. According to recent research from ISC2, the global industry ...
1 year ago Cybersecurity-insiders.com
A Comprehensive Guide To Achieving SOC 2 Compliance - Obtaining SOC 2 compliance demonstrates an organization's commitment to data security and privacy, which can enhance trust and confidence among customers and partners. SOC 2 is a framework developed by the AICPA to assess the various trust service ...
1 year ago Feeds.dzone.com
Pathfinder AI - Hunters Announces New AI Capabilities with for Smarter SOC Automation - “Hunters has already made a significant impact on our security operations by reducing manual investigations, streamlining data ingestion, and improving threat visibility. Unlike static rule-based automation, Agentic AI dynamically adapts, ...
1 month ago Cybersecuritynews.com Hunters
New Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defenses - Unlike traditional thread hijacking, which requires suspending and resuming threads using easily monitored APIs like SuspendThread and ResumeThread, WTH targets threads already in a waiting state, eliminating the need for suspicious thread ...
1 week ago Cybersecuritynews.com
How To Prioritize Threat Intelligence Alerts In A High-Volume SOC - This article explores practical strategies and frameworks for prioritizing threat intelligence alerts in high-volume SOC environments, helping security teams focus on what matters most while reducing alert fatigue and improving overall security ...
4 days ago Cybersecuritynews.com
CVE-2024-56787 - In the Linux kernel, the following vulnerability has been resolved: soc: imx8m: Probe the SoC driver as platform driver With driver_async_probe=* on kernel command line, the following trace is produced because on i.MX8M Plus hardware because the ...
3 months ago Tenable.com
SOC Webinar: Better SOC with Interactive Malware Sandbox - Register for Free - During this real-time session, you will see how interactive malware analysis helps SOC analysts detect threats in seconds, speed up triage, and respond to incidents before damage is done. To help SOC teams solve this problem, ANY.RUN is hosting a ...
2 months ago Cybersecuritynews.com
Cisco XDR: SLEDs "SOC in a Box" - For State, Local, and Education entities the Security Operations Center is a required tool in the toolbox and a necessity for Cyber Insurance. Threats to data and information are ever evolving, and better safeguarding the security of SLED entities is ...
1 year ago Feedpress.me BlackTech Volt Typhoon
Elevate Your Security: Meet Modern Attacks With Advanced CSPM - Recent surges in cloud attacks and breaches have given attention to how teams should efficiently protect and run applications in the cloud. This is especially true as misconfigurations top the list of security threats in cloud environments and are ...
1 year ago Securityboulevard.com
Shining a Light on Modern Cyber Battlefield Attacks - It's safe to say that the sophistication of today's criminals is far outpacing the evolution of the defenses they are attacking. A great example of this mismatch is the explosion of malware executing modern battlefield attacks. These attacks first ...
1 year ago Cybersecurity-insiders.com
IT consultant in Germany fined for exposing shoddy security The Register - A security researcher in Germany has been fined €3,000 for finding and reporting an e-commerce database vulnerability that was exposing almost 700,000 customer records. Back in June 2021, according to our pals at Heise, an contractor identified ...
1 year ago Theregister.com
3 Best Practices for SOC Leaders for Staying Ahead In 2024 - For security operations center leaders, staying ahead of security threats is a substantial challenge as the cyberthreat landscape is constantly evolving. If SOC leaders fail to proactively monitor and readily adapt to these rising and ever-changing ...
1 year ago Securityboulevard.com
Google Gerrit Unauthorized Access to Code Tickets Supply Chain Attack - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
2 months ago Tenable.com
Google Cloud Platform (GCP) Privilege Escalation Vulnerability in GCP Cloud Run - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
2 months ago Tenable.com
Granola API Endpoint Information Disclosure - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
Multiple Vulnerabilities in Sante PACS Server - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
Camaleon CMS Privilege Escalation - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 month ago Tenable.com
OpenAI SearchGPT Results Tampering with Prompt Injection - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
4 weeks ago Tenable.com
Progress WhatsUp Gold Unauthenticated Wireless MAC Group Manipulation - Research Advisory | Tenable® - Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Enjoy full access to a modern, cloud-based vulnerability management platform that enables you ...
1 week ago Tenable.com
SANS Institute Research Shows the Frameworks Organizations Use - The report shares and analyzes research on a range of security operations center practices and outlines the current state of the SOC within many organizations, based on in-depth survey findings of IT and cybersecurity professionals from around the ...
1 year ago Darkreading.com
The Keys to Modernizing the SOC - Security teams worldwide all experience a similar shared frustration: the overwhelming volumes of low-fidelity alerts and false positives that SOCs receive every day. Eliminating the burden on SOC analysts is mission-critical to proactive threat ...
1 year ago Paloaltonetworks.com
Playbooks on-prem - To address this challenge, Sekoia.io has recently released Playbooks on-prem. In this way, Playbooks on-prem may appeal to companies seeking to synchronize cloud actions with those executed on-premises. At its core, Playbooks on-prem revolve around a ...
1 year ago Blog.sekoia.io

Latest Cyber News


Cyber Trends (last 7 days)