13. Goals implement SOC
Appropriate and effective dealing with security
events and threats
Promote security and stability of data and services
by protecting information infrastructure, traffic,
services and customer data
Reduce the time of disruption to customer service
Improve and speed up the security responses
Improve network performance
Reduce the costs of security threats and attacks
22. Sensors and Feeder
Security Information Event Management
Patch Management System
Ticketing System
Vulnerability Assessment
Traffic Flow Analyzer
Major Components of the SOC
24. امنیتی افزارهای سخت و افزارها نرم
UTM/Firewall
Anti Malware
IPS/IDS
Remote Access Software
Web proxy
Vulnerability Management System
Authentication Servers
Network Quarantine Servers
Router and Switch
Security Software
25. System Events
Service Changes
System Operation like Restart, shutdown
Audit Records
Security Events Like Successful or Failed Login
Access to Files
Change Security Policy
User Changes
Operating System
26. Client Requests and Server Responses
Web Server , Mail Server , …
Account Information
Authentication Logs , User Modification , Permission Modification
Brute Force , Guessing , Privilege Escalation , …
Usage Information
Number of Transaction , Traffic Bandwidth , Number of Mail , …
Significant Operational Actions
Software Problems , Service Shut or Up , …
Applications
27. Nessus
Acunetix
GFI LANGuard
IBM AppScan
Netsparker
Burp Suite
Retina
Qualys
HP WebInspect
Vulnerability Scanner
33. Compare events from multiple sources to track
users and processes across systems.
Track events across time periods to look for
sequences of activity that should not normally
occur
Encode human knowledge about what it not normal
for a system, or indicates a probably attack, into
automatic monitoring
Log Correlation is the most powerful feature in SIEM
Correlation