SlideShare a Scribd company logo
Author: Utkarsh Srivastava
CISSP, CISA, CEH, ITILv3F, CoBIT3, MCSE, CCNA
Security Operations Center Models
In-house SOC:
Certain industries, especially defense and BFSI, operate under tight regulatory obligations. Hence it is uncomfortable for
these industries, to wholly or partially outsource security operations, as it is an integral part of their processes and
business.
In-house SOC mitigates security risks of sensitive activity log data loss. In contract, in an Outsourced SOC, organizations
do not place the highest importance to the confidentiality of their security logs or analysis data, after the completion of
the SOC contract. While building and operating a SOC in-house over a period of time, organizations gain capabilities in
their security and incident handling process.
Challenges in operating an in-house SOC: Organizations may take years to realize the cost-benefit ratio and thus may
find it difficult convincing the board. SIEM tool licensing, threat intelligence, infrastructure setup and scaling up ongoing
operations are some considerations. One more possible risk is of not being able to procure skilled SOC analysts and
incident handlers.
However, many experienced Security Service providers help organizations build in-house SOC services for their clients in
perspective of the framework, technology selection, process, and skill sets thus making an in-house SOC implementation
easier.
Outsourced SOC:
Many organizations are choosing Managed Security operations (MSSP). In an outsourced model, customer can see the
immediate benefits of implementing SOC in their environment by leveraging service provider’s infrastructure,
intelligence and capability. Further, businesses need not worry about the core competency of SOC analysts and
attrition. MSSPs have ability to retain, train and develop skilled analysts. Undeniably, service providers with multiple
clients in different business verticals and geographies, are able to build a knowledge base and tested processes for
managing security incidents.
Service providers also have the capacity of investing to build and generate threat intelligence to detect real time
targeted and persistent attacks. To meet the log security requirements of the customer, as a compensatory control,
service providers sign stringent SLA’s and contracts with the organizations.
Hybrid SOC:
These are a combination of In-House and Outsourced SOC. Due to regulations, customers may prefer log data to be
stored within their own infrastructure. However, the selective and normalized log data which is security relevant may be
forwarded to MSSP providers. In turn, SOC provider will provide expertise, intelligence and infrastructure to provide the
filtered, compressed, correlated, analyzed and prioritized alerts and reports.
A Hybrid SOC enables customer to fit the solution to their requirements and arrive to a sustainable capacity plan. This
balance helps businesses satisfy its auditors and also showcase the value an outsourced SOC service provider.

More Related Content

PDF
Certificate Management Made Easy
PDF
Umer Khalid Thesis Abstract
PPTX
Priviledged Identity Management
PPTX
LTS Secure offers PIM User Activity Monitoring
PDF
WITDOM Credit Risk Scoring use case at ISSE 2017
DOCX
Certifications on Security - IS AUDIT
PDF
Third-party Remote Support Threats Inforgraphic
PDF
Iraje brochure v17 master
Certificate Management Made Easy
Umer Khalid Thesis Abstract
Priviledged Identity Management
LTS Secure offers PIM User Activity Monitoring
WITDOM Credit Risk Scoring use case at ISSE 2017
Certifications on Security - IS AUDIT
Third-party Remote Support Threats Inforgraphic
Iraje brochure v17 master

What's hot (18)

PDF
Security as a Service flyer
PDF
Data Sheet For Erg
PDF
Privileged identity management
 
PDF
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
PPTX
Privileged Access Management - 2016
PPT
Electronic health records
PPTX
Corp Overview 11510
PDF
Project Management for Computer Systems Validation
PDF
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
PDF
10 Commandments for Achieving Operational Excellence
PDF
Broadening Your Cybersecurity Mindset
PDF
CyberObserver
PDF
Infopercept_Technology_Risk_Review
PPT
Security Readiness Profile
PDF
PCI Certification and remediation services
PDF
Data-Centric Security for the Extended Enterprise
DOCX
Week 6(1)
PPTX
Are SSAE 16 Data Center Problems Impacting Customers? (SlideShare)
Security as a Service flyer
Data Sheet For Erg
Privileged identity management
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Privileged Access Management - 2016
Electronic health records
Corp Overview 11510
Project Management for Computer Systems Validation
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
10 Commandments for Achieving Operational Excellence
Broadening Your Cybersecurity Mindset
CyberObserver
Infopercept_Technology_Risk_Review
Security Readiness Profile
PCI Certification and remediation services
Data-Centric Security for the Extended Enterprise
Week 6(1)
Are SSAE 16 Data Center Problems Impacting Customers? (SlideShare)
Ad

Similar to SOC Models Comparison (20)

PDF
Security operations center inhouse vs outsource
PDF
Security operations center inhouse vs outsource
PDF
SOC Service in India.pdf
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
Strengthening BFSI Security Posture with SOAR Integration.pdf
PDF
Future Trends in SOC Services What Indian Businesses Need to Know.pdf
PDF
BMC Discovery IDC Research Study 470 ROI in 5 Years
PDF
Building a Security Operations Center (SOC).pdf
PDF
Rothke secure360 building a security operations center (soc)
PDF
br-security-connected-top-5-trends
PDF
How Managed Security Services Keep Your Business Safe.pdf
PDF
What Role Does SOC Play in Preventing Data Breaches.pdf
PDF
What Role Does SOC Play in Preventing Data Breaches
PDF
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
PDF
SIEM Buyer's Guide
PDF
Clearswift f5 integration
PDF
CA_Module_2.pdf
PDF
Why NOC Services in 2025 Are Critical for MSPs and How to Implement Them.pdf
PDF
Security Operations Center (SOC) Market Dynamics: Global Growth and Trends (2...
PDF
IntelAdapt
Security operations center inhouse vs outsource
Security operations center inhouse vs outsource
SOC Service in India.pdf
Rothke rsa 2012 building a security operations center (soc)
Strengthening BFSI Security Posture with SOAR Integration.pdf
Future Trends in SOC Services What Indian Businesses Need to Know.pdf
BMC Discovery IDC Research Study 470 ROI in 5 Years
Building a Security Operations Center (SOC).pdf
Rothke secure360 building a security operations center (soc)
br-security-connected-top-5-trends
How Managed Security Services Keep Your Business Safe.pdf
What Role Does SOC Play in Preventing Data Breaches.pdf
What Role Does SOC Play in Preventing Data Breaches
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
SIEM Buyer's Guide
Clearswift f5 integration
CA_Module_2.pdf
Why NOC Services in 2025 Are Critical for MSPs and How to Implement Them.pdf
Security Operations Center (SOC) Market Dynamics: Global Growth and Trends (2...
IntelAdapt
Ad

SOC Models Comparison

  • 1. Author: Utkarsh Srivastava CISSP, CISA, CEH, ITILv3F, CoBIT3, MCSE, CCNA Security Operations Center Models In-house SOC: Certain industries, especially defense and BFSI, operate under tight regulatory obligations. Hence it is uncomfortable for these industries, to wholly or partially outsource security operations, as it is an integral part of their processes and business. In-house SOC mitigates security risks of sensitive activity log data loss. In contract, in an Outsourced SOC, organizations do not place the highest importance to the confidentiality of their security logs or analysis data, after the completion of the SOC contract. While building and operating a SOC in-house over a period of time, organizations gain capabilities in their security and incident handling process. Challenges in operating an in-house SOC: Organizations may take years to realize the cost-benefit ratio and thus may find it difficult convincing the board. SIEM tool licensing, threat intelligence, infrastructure setup and scaling up ongoing operations are some considerations. One more possible risk is of not being able to procure skilled SOC analysts and incident handlers. However, many experienced Security Service providers help organizations build in-house SOC services for their clients in perspective of the framework, technology selection, process, and skill sets thus making an in-house SOC implementation easier. Outsourced SOC: Many organizations are choosing Managed Security operations (MSSP). In an outsourced model, customer can see the immediate benefits of implementing SOC in their environment by leveraging service provider’s infrastructure, intelligence and capability. Further, businesses need not worry about the core competency of SOC analysts and attrition. MSSPs have ability to retain, train and develop skilled analysts. Undeniably, service providers with multiple clients in different business verticals and geographies, are able to build a knowledge base and tested processes for managing security incidents. Service providers also have the capacity of investing to build and generate threat intelligence to detect real time targeted and persistent attacks. To meet the log security requirements of the customer, as a compensatory control, service providers sign stringent SLA’s and contracts with the organizations. Hybrid SOC: These are a combination of In-House and Outsourced SOC. Due to regulations, customers may prefer log data to be stored within their own infrastructure. However, the selective and normalized log data which is security relevant may be forwarded to MSSP providers. In turn, SOC provider will provide expertise, intelligence and infrastructure to provide the filtered, compressed, correlated, analyzed and prioritized alerts and reports. A Hybrid SOC enables customer to fit the solution to their requirements and arrive to a sustainable capacity plan. This balance helps businesses satisfy its auditors and also showcase the value an outsourced SOC service provider.