SlideShare a Scribd company logo
The Journey
from
Zero to SOCAugust 2020
Sean Lengyel
Head of Cyber Security
About ME
- 12 years experience in IT &
Cyber Security
- 10 years in the Australian
Department of Defence
- Royal Australian Air Force
Veteran
- Built Citadel’s SOC from the
ground up
About Us
3
text
Text
© Citadel Group | Journey from Zero to SOC |
Health Solutions
Keeping People &
Information SafeEnterprise Solutions Technology Services
Professional Services
About Us – Security Operations
4© Citadel Group | Journey from Zero to SOC |
Where does the
Citadel SOC fit in?
About Us – Mission
5© Citadel Group | Journey from Zero to SOC |
Protect Customer Data
M
FA
TrustedDevice
About Us – Zero Trust
6© Citadel Group | Journey from Zero to SOC |
MFATrustedDevice
M
FA
Trusted Device
M
FAAny Device
MFA
Trusted Device
MFA
Trusted Device
Credential Manager
Launcher
Tenable.io
ASD Essential Eight
InTune MDM
Citadel SOE
Windows 10
MFAAny Device Elastic Endgame
Elastic Beats
Web Proxy Agents
MSCT/CIS Hardening
ASD Essential Eight
MFA
Any Device
MFA
Any Device
Any Device
Locked down
GooglePlay Store
Device Hardening
InTune MDM
Locked down
Apple App Store
Device Hardening
InTune MDM
Apple IOS Android
MFA
Trusted Device
Customer
Environments
Where did Our
logging Journey start?
Where did our logging journey start?
Some of the problems we faced…
9© Citadel Group | Journey from Zero to SOC |
• Existing solution didn’t offer native SIEM capabilities
• SIEM capabilities were an expensive add-on
• Very expensive to ingest the all the logs we needed
• The licencing model meant that it would have made it
very costly to ingest the following logs:
- Windows Sysmon Events (Security & Observability)
- Windows Perfmon Events (Observability)
- Azure SQL Database Audit Events (Security)
- Azure NSG Firewall Events (Security)
- Endpoint Protection Agent Logs (Security)
- Azure Diagnostics (Observability)
The positives…
10© Citadel Group | Journey from Zero to SOC |
I was very lucky to be working with some very security conscious
Developers, Cloud Engineers & Application Specialists
Why Elastic?
Why Elastic?
12© Citadel Group | Journey from Zero to SOC |
Cost: Perfect for a growing organisation
Security Features: Great out of the box features that a SOC needs
Observability: Allows us to met our service operations needs
Scalability: The SOC can easily grow as the company grows
Machine Learning: Detecting outliers without needing complicated rules
Customisation: Building alerts tailored to our environments
Fast forward to Today
Where are we now?
14© Citadel Group | Journey from Zero to SOC |
Where are we now?
15© Citadel Group | Journey from Zero to SOC |
ü Windows 10 Endpoint Logs
ü Azure AD Audit & Sign-in Logs
ü Azure Resources Audit Logs
ü SaaS Cloud Application Logs
ü Windows Customer Server Logs
ü Linux Customer Server Logs
ü SQL Database Audit Logs
ü On-prem & Cloud-based Firewall Logs
ü Web Application Firewall Logs
ü Office365 ATP Logs
ü MS Defender ATP Logs
ü Elastic Endgame Logs
SIEM Signals
16© Citadel Group | Journey from Zero to SOC |
SIEM Signals
17© Citadel Group | Journey from Zero to SOC |
Custom SIEM Signal
18© Citadel Group | Journey from Zero to SOC |
Elastic Endgame
19© Citadel Group | Journey from Zero to SOC |
Elastic Endgame – Custom Rule
20© Citadel Group | Journey from Zero to SOC |
Final Thoughts
21© Citadel Group | Journey from Zero to SOC |
We are in a good place now
Thank you!
sean.lengyel@citadelgroup.com.au

More Related Content

PDF
Innovating at speed and scale with implicit security
PDF
Elastic Security: Your one-stop OODA loop shop
PDF
Operationalize with alerting, custom dashboards, and timelines
PDF
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
PDF
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
PDF
What is the Future of SIEM?
PDF
Keynote: Elastic Security evolution and vision
PDF
Empowering agencies using Elastic as a Service inside Government
Innovating at speed and scale with implicit security
Elastic Security: Your one-stop OODA loop shop
Operationalize with alerting, custom dashboards, and timelines
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
What is the Future of SIEM?
Keynote: Elastic Security evolution and vision
Empowering agencies using Elastic as a Service inside Government

What's hot (20)

PDF
Building Elastic into security operations
PDF
October 2020 meetup
PDF
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
PDF
Conferencia principal: Evolución y visión de Elastic Security
PDF
Keynote: Elastic Security evolution and vision
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Cisco Connect 2018 Singapore - Cybersecurity strategy
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
PDF
Palestra de abertura: Evolução e visão do Elastic Security
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
PDF
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
PDF
Cisco Connect 2018 Singapore - Do more than keep the lights on
PDF
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
PDF
Cisco Connect 2018 Singapore - delivering intent for data center networking
PDF
Cisco Connect 2018 Singapore - Cisco CMX
PDF
Managing Compliance in Container Environments
PDF
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
PDF
Keynote: Looping through data, insight, and action
PPTX
Secure Data Sharing in OpenShift Environments
Building Elastic into security operations
October 2020 meetup
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Conferencia principal: Evolución y visión de Elastic Security
Keynote: Elastic Security evolution and vision
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Palestra de abertura: Evolução e visão do Elastic Security
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore - Cisco CMX
Managing Compliance in Container Environments
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Keynote: Looping through data, insight, and action
Secure Data Sharing in OpenShift Environments
Ad

Similar to The Journey from Zero to SOC: How Citadel built its Security Operations from the Ground Up on Elastic (20)

PDF
Cloud Security by CK
PDF
智慧市政大未來 主題一
PPTX
AMER Introduction to ThousandEyes Webinar
PPTX
IoT World Forum Press Conference - 10.14.2014
PPTX
Alfresco Virtual DevCon 2020 - Security First!
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
PPTX
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
PDF
MT81 Keys to Successful Enterprise IoT Initiatives
PDF
IoT Security: Problems, Challenges and Solutions
PPTX
SwitchIT-02.2018-Company-overview.pptx
PDF
Tomorrow Starts Here - Security Everywhere
PDF
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
PDF
2021 01-27 reducing risk of ransomware webinar
PPTX
PDF
MILCOM 2013 Keynote Presentation: Larry Payne
PPTX
Cloud technology for hospitality
PDF
SAMSUNG SDS.pdf
PDF
Digital Transformation in a World of Connected Devices
PPTX
Fortinet Corporate Overview Deck 11.pptx
Cloud Security by CK
智慧市政大未來 主題一
AMER Introduction to ThousandEyes Webinar
IoT World Forum Press Conference - 10.14.2014
Alfresco Virtual DevCon 2020 - Security First!
New ThousandEyes Product Innovations: Cisco Live June 2025
New ThousandEyes Product Innovations: Cisco Live June 2025
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
MT81 Keys to Successful Enterprise IoT Initiatives
IoT Security: Problems, Challenges and Solutions
SwitchIT-02.2018-Company-overview.pptx
Tomorrow Starts Here - Security Everywhere
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
2021 01-27 reducing risk of ransomware webinar
MILCOM 2013 Keynote Presentation: Larry Payne
Cloud technology for hospitality
SAMSUNG SDS.pdf
Digital Transformation in a World of Connected Devices
Fortinet Corporate Overview Deck 11.pptx
Ad

More from Elasticsearch (20)

PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
From MSP to MSSP using Elastic
PDF
Cómo crear excelentes experiencias de búsqueda en sitios web
PDF
Te damos la bienvenida a una nueva forma de realizar búsquedas
PDF
Comment transformer vos données en informations exploitables
PDF
Plongez au cœur de la recherche dans tous ses états.
PDF
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
Welcome to a new state of find
PDF
Building great website search experiences
PDF
Keynote: Harnessing the power of Elasticsearch for simplified search
PDF
Cómo transformar los datos en análisis con los que tomar decisiones
PDF
Explore relève les défis Big Data avec Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Transforming data into actionable insights
PDF
Opening Keynote: Why Elastic?
PDF
Empowering agencies using Elastic as a Service inside Government
PDF
The opportunities and challenges of data for public good
PDF
Enterprise search and unstructured data with CGI and Elastic
PDF
What's new at Elastic: Update on major initiatives and releases
An introduction to Elasticsearch's advanced relevance ranking toolbox
From MSP to MSSP using Elastic
Cómo crear excelentes experiencias de búsqueda en sitios web
Te damos la bienvenida a una nueva forma de realizar búsquedas
Comment transformer vos données en informations exploitables
Plongez au cœur de la recherche dans tous ses états.
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
An introduction to Elasticsearch's advanced relevance ranking toolbox
Welcome to a new state of find
Building great website search experiences
Keynote: Harnessing the power of Elasticsearch for simplified search
Cómo transformar los datos en análisis con los que tomar decisiones
Explore relève les défis Big Data avec Elastic Cloud
Comment transformer vos données en informations exploitables
Transforming data into actionable insights
Opening Keynote: Why Elastic?
Empowering agencies using Elastic as a Service inside Government
The opportunities and challenges of data for public good
Enterprise search and unstructured data with CGI and Elastic
What's new at Elastic: Update on major initiatives and releases

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Programs and apps: productivity, graphics, security and other tools

The Journey from Zero to SOC: How Citadel built its Security Operations from the Ground Up on Elastic

  • 1. The Journey from Zero to SOCAugust 2020 Sean Lengyel Head of Cyber Security
  • 2. About ME - 12 years experience in IT & Cyber Security - 10 years in the Australian Department of Defence - Royal Australian Air Force Veteran - Built Citadel’s SOC from the ground up
  • 3. About Us 3 text Text © Citadel Group | Journey from Zero to SOC | Health Solutions Keeping People & Information SafeEnterprise Solutions Technology Services Professional Services
  • 4. About Us – Security Operations 4© Citadel Group | Journey from Zero to SOC | Where does the Citadel SOC fit in?
  • 5. About Us – Mission 5© Citadel Group | Journey from Zero to SOC | Protect Customer Data
  • 6. M FA TrustedDevice About Us – Zero Trust 6© Citadel Group | Journey from Zero to SOC | MFATrustedDevice M FA Trusted Device M FAAny Device MFA Trusted Device MFA Trusted Device Credential Manager Launcher Tenable.io ASD Essential Eight InTune MDM Citadel SOE Windows 10 MFAAny Device Elastic Endgame Elastic Beats Web Proxy Agents MSCT/CIS Hardening ASD Essential Eight MFA Any Device MFA Any Device Any Device Locked down GooglePlay Store Device Hardening InTune MDM Locked down Apple App Store Device Hardening InTune MDM Apple IOS Android MFA Trusted Device Customer Environments
  • 7. Where did Our logging Journey start?
  • 8. Where did our logging journey start?
  • 9. Some of the problems we faced… 9© Citadel Group | Journey from Zero to SOC | • Existing solution didn’t offer native SIEM capabilities • SIEM capabilities were an expensive add-on • Very expensive to ingest the all the logs we needed • The licencing model meant that it would have made it very costly to ingest the following logs: - Windows Sysmon Events (Security & Observability) - Windows Perfmon Events (Observability) - Azure SQL Database Audit Events (Security) - Azure NSG Firewall Events (Security) - Endpoint Protection Agent Logs (Security) - Azure Diagnostics (Observability)
  • 10. The positives… 10© Citadel Group | Journey from Zero to SOC | I was very lucky to be working with some very security conscious Developers, Cloud Engineers & Application Specialists
  • 12. Why Elastic? 12© Citadel Group | Journey from Zero to SOC | Cost: Perfect for a growing organisation Security Features: Great out of the box features that a SOC needs Observability: Allows us to met our service operations needs Scalability: The SOC can easily grow as the company grows Machine Learning: Detecting outliers without needing complicated rules Customisation: Building alerts tailored to our environments
  • 14. Where are we now? 14© Citadel Group | Journey from Zero to SOC |
  • 15. Where are we now? 15© Citadel Group | Journey from Zero to SOC | ü Windows 10 Endpoint Logs ü Azure AD Audit & Sign-in Logs ü Azure Resources Audit Logs ü SaaS Cloud Application Logs ü Windows Customer Server Logs ü Linux Customer Server Logs ü SQL Database Audit Logs ü On-prem & Cloud-based Firewall Logs ü Web Application Firewall Logs ü Office365 ATP Logs ü MS Defender ATP Logs ü Elastic Endgame Logs
  • 16. SIEM Signals 16© Citadel Group | Journey from Zero to SOC |
  • 17. SIEM Signals 17© Citadel Group | Journey from Zero to SOC |
  • 18. Custom SIEM Signal 18© Citadel Group | Journey from Zero to SOC |
  • 19. Elastic Endgame 19© Citadel Group | Journey from Zero to SOC |
  • 20. Elastic Endgame – Custom Rule 20© Citadel Group | Journey from Zero to SOC |
  • 21. Final Thoughts 21© Citadel Group | Journey from Zero to SOC | We are in a good place now