PILLAR GUIDE

Security Operations Center

Building & Managing an Effective SOC

Table of Contents
What is a SOC? SOC Team Structure Core SOC Processes Essential SOC Tools Threat Detection Strategies SOC Metrics & KPIs

What is a SOC?

A Security Operations Center (SOC) is a centralized unit that deals with security issues on an organizational and technical level. It houses the security team responsible for continuously monitoring and analyzing an organization's security posture.

SOC Models

SOC Team Structure

Tier 1: Security Analyst (Alert Triage)

Front-line analysts who monitor alerts, perform initial triage, and escalate confirmed incidents.

Tier 2: Security Analyst (Incident Response)

Experienced analysts who perform deep-dive investigations and coordinate incident response.

Tier 3: Threat Hunter / Senior Analyst

Proactive hunting, advanced forensics, and threat intelligence integration.

Core SOC Processes

Alert Triage Workflow

1. Alert Generation
   └─> SIEM, EDR, IDS, Firewall, etc.

2. Initial Triage (Tier 1)
   ├─> False Positive → Close with reason
   ├─> Known Good → Document and close
   └─> Suspicious → Escalate to Tier 2

3. Investigation (Tier 2)
   ├─> Collect additional context
   ├─> Correlate with other events
   └─> Determine scope and impact

4. Response & Containment
   ├─> Execute playbook
   ├─> Contain affected systems
   └─> Eradicate threat

5. Recovery & Lessons Learned
   └─> Update detections, close ticket

Essential SOC Tools

CategoryTools
SIEMSplunk, Microsoft Sentinel, Elastic SIEM
EDRCrowdStrike, Microsoft Defender, SentinelOne
SOARSplunk SOAR, Palo Alto XSOAR, Tines
Threat IntelMISP, ThreatConnect, Recorded Future
TicketingServiceNow, Jira, TheHive

Threat Detection Strategies

SOC Metrics & KPIs

MetricTargetDescription
MTTD< 1 hourMean Time to Detect
MTTR< 4 hoursMean Time to Respond
MTTC< 24 hoursMean Time to Contain
False Positive Rate< 50%Percentage of non-threats
Escalation Rate~20%Tier 1 to Tier 2

Last updated: December 2024