SlideShare a Scribd company logo
#SACON
Building the NextGen SOC
Shomiron DAS GUPTA (GCIA)
Founder, CEO
NETMONASTERY Inc.
#SACON
Agenda
■ Why are APTs difficult to detect
■ Revisit the cyber kill chain
■ Process orient detection
■ NextGen SOC process
■ Building your threat mind map
■ Implement and measure your SOC
#SACON
Why are we failing to pick them
■ Made to order
■ Exploit trust relationships
■ Multi stage deployments
#SACON
The Cyber Kill Chain
■ Reconnaissance
■ Weaponize
■ Delivery
■ Exploitation
■ Installation
■ Command and Control
■ Actions on objectives
So which are the phases you
should track to detect
Advanced Persistent Threats?
#SACON
The Cyber Kill Chain
■ Reconnaissance
■ Weaponize
■ Delivery
■ Exploitation
■ Installation
■ Command and Control
■ Actions on objectives
So, what are you looking for?
Indicators Of Compromise
or
Attempt To Compromise
Tackle Detection
with Process
#SACON
Process Orient Detection
■ Visualize your engagement with threats
■ Identify detection phases
■ Build a list of primary issues
■ Create use cases
■ Connect use cases for multi phase threats
■ Burn the context layer in to your SIEM for detection
#SACON
Concerns from the Old SOC
■ Lack of focus on detection
■ Push required to build new rules
■ Rules get out dated before you go production
■ Continuous improvement doesn’t exist
■ Lack of active pursuit
#SACON
ASOC One such option
Hunter
• Looking for threats
• Multiple toolkits
• No boundaries - laterals
• Finding loopholes
• Building content
• Writing process
• Handover and review
Process SOC Ops
• Understand threats
• React - FP Filtering
• Respond
• Resolve
• Metrics & Improvement
• Case retirement
#SACON
THREAT MAP
PLAY BOOK
USE CASES
#SACON
Building your Threat Mind Map
#SACON
What does it take?
■ Approach

IOC or ATC
■ Anticipation

High Probability Threats
■ Active Playbook

Build - Review - Improve
#SACON
Pre-breach Symptoms
#SACON
Post-breach Symptoms
#SACON
Bad Policy Symptoms
#SACON
WORKSHOP
BUILDING YOUR OWN PLAYBOOK
RandomHIT
Lateral
Exfil
InfectDriveBy
PWN
1
2 3
4
#SACON
Alerts v/s Incidents
■ Alerts are instant and descriptive
■ Incidents are usually delayed and vague
■ Alerts can be remediated
■ Incidents need handling
What would you work towards - Alerts or Incidents
#SACON
Watching the AfterLife
■ Sold in the underground unless a sponsored activity
■ Stolen data is segregated
■ Sometimes published
■ Mostly used quickly for monetary gain
How would you track your data in the AfterLife?
#SACON
Implement and Measure
■ Watch for primary issues not events
■ Connect multi phase threats automatically with tools
■ Selectively implement incident management
■ Look out for threat trends
■ Cyclically iterate and improve every week
#SACON
Shomiron DAS GUPTA
shomiron@netmonastery.com
+91 9820336050
Thank You!

More Related Content

PDF
SOC Architecture - Building the NextGen SOC
PPTX
SOC Architecture Workshop - Part 1
PDF
DTS Solution - Building a SOC (Security Operations Center)
PPTX
Security operation center (SOC)
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Malware evolution and Endpoint Detection and Response
PDF
The Critical Security Controls and the StealthWatch System
SOC Architecture - Building the NextGen SOC
SOC Architecture Workshop - Part 1
DTS Solution - Building a SOC (Security Operations Center)
Security operation center (SOC)
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
From SIEM to SOC: Crossing the Cybersecurity Chasm
Malware evolution and Endpoint Detection and Response
The Critical Security Controls and the StealthWatch System

What's hot (20)

PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
PPTX
SOC Cyber Security
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
PPTX
Anton's 2020 SIEM Best and Worst Practices - in Brief
PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
Effective Security Operation Center - present by Reza Adineh
PPTX
Modern SOC Trends 2020
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PPTX
IT Cyber Security Operations
PPTX
SOC 3.0: strategic threat intelligence May 2016
PPTX
Generic siem how_2017
PPTX
Making Log Data Useful: SIEM and Log Management Together
PDF
Bulding Soc In Changing Threat Landscapefinal
PDF
The Rise of the Purple Team
PDF
Skill Set Needed to work successfully in a SOC
PPTX
Five SIEM Futures (2012)
PDF
The Incident Response Playbook for Android and iOS
PPTX
NextGen Endpoint Security for Dummies
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
SOC Cyber Security
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
Security Operations Center (SOC) Essentials for the SME
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
Anton's 2020 SIEM Best and Worst Practices - in Brief
Building a Next-Generation Security Operations Center (SOC)
Effective Security Operation Center - present by Reza Adineh
Modern SOC Trends 2020
Building a Cyber Security Operations Center for SCADA/ICS Environments
IT Cyber Security Operations
SOC 3.0: strategic threat intelligence May 2016
Generic siem how_2017
Making Log Data Useful: SIEM and Log Management Together
Bulding Soc In Changing Threat Landscapefinal
The Rise of the Purple Team
Skill Set Needed to work successfully in a SOC
Five SIEM Futures (2012)
The Incident Response Playbook for Android and iOS
NextGen Endpoint Security for Dummies
Ad

Similar to SACON16 - SOC Architecture (20)

PDF
SACON17 - Detecting Threats with Analytics and Machine Learning
PDF
Threat Detection using Analytics & Machine Learning
PDF
AI on Spark for Malware Analysis and Anomalous Threat Detection
PPTX
RSA 2018: Recon For the Defender - You know nothing (about your assets)
PDF
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
PPTX
How i'm going to own your organization v2
PDF
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
PDF
Security precognition chaos engineering in incident response
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PDF
Basics of Meterpreter Evasion
PDF
Dev and Ops Collaboration and Awareness at Etsy and Flickr
PDF
How to build observability into Serverless (O'Reilly Velocity 2018)
PDF
MITRE ATTACKcon Power Hour - October
PPTX
Badneedles
PPTX
DevSecOps : an Introduction
PDF
IANS information security forum 2019 summary
PPTX
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
PDF
Making Threat Intelligence Actionable Final
PPTX
Jason Kent - AppSec Without Additional Tools
SACON17 - Detecting Threats with Analytics and Machine Learning
Threat Detection using Analytics & Machine Learning
AI on Spark for Malware Analysis and Anomalous Threat Detection
RSA 2018: Recon For the Defender - You know nothing (about your assets)
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
How i'm going to own your organization v2
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Security precognition chaos engineering in incident response
RIoT (Raiding Internet of Things) by Jacob Holcomb
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Basics of Meterpreter Evasion
Dev and Ops Collaboration and Awareness at Etsy and Flickr
How to build observability into Serverless (O'Reilly Velocity 2018)
MITRE ATTACKcon Power Hour - October
Badneedles
DevSecOps : an Introduction
IANS information security forum 2019 summary
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
Making Threat Intelligence Actionable Final
Jason Kent - AppSec Without Additional Tools
Ad

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
A Presentation on Touch Screen Technology
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Zenith AI: Advanced Artificial Intelligence
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
A Presentation on Touch Screen Technology
Heart disease approach using modified random forest and particle swarm optimi...
TLE Review Electricity (Electricity).pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Unlocking AI with Model Context Protocol (MCP)
A novel scalable deep ensemble learning framework for big data classification...
Building Integrated photovoltaic BIPV_UPV.pdf
Tartificialntelligence_presentation.pptx
Chapter 5: Probability Theory and Statistics
A comparative analysis of optical character recognition models for extracting...
Programs and apps: productivity, graphics, security and other tools
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1 - Historical Antecedents, Social Consideration.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
DP Operators-handbook-extract for the Mautical Institute
Group 1 Presentation -Planning and Decision Making .pptx

SACON16 - SOC Architecture