SlideShare a Scribd company logo
SOC:
Use cases and are we asking the
right questions?
By Jonathan Sinclair
SOC: Use cases and are we asking the right questions?
History lesson
• A sunny day in Luzern, presenting on virtual machines at Hashdays
(now Area41)
Reconnected with Arron ‘Finux’ Finnon talking
about IDS/IPS testing, 2012
A few questions raised
• Why do we test IDS/IPS
• What’s a good and bad test
• What’s easy to test and what isn’t
In the Beginning there were security
conferences
• Here’s why everything you thought worked, doesn’t and
here’s how to hack it …..
Job done, another conference in the bag. Goodbye!
Scenario: Returning to the office
C-level: “So how did the conference go”
Me: “Very well thank you, it was a lot of fun, I met
a lot of interesting people and really managed to
connect with the leading IT security
professionals”
C-level: “Excellent, so what did you learn”
Me: “Everything we have is broken:
- Windows security is a mess,
- Shim’s expose everything,
- Linux is unmanageable in the Enterprise,
- Apple devices actually have vulnerabilities,
- NSA already owns us,
- Data exfiltration is impossible to protect against,
- Anti-virus can be circumvented with a 2 byte modification,
- IoT is the new DDoS vector, which we couldn’t protect against anyway and
now the problem has been exponentially compounded and our new strategic
office in country XX is already infiltrated by under-cover government moles
who are stealing our secrets over our flat network”
C-level: “Ahhh……”
C-level: “So it seems I should pull your funding as
nothing we seem to be doing is actually making
us anymore secure?”
Me: “Well, maybe, but before you do, I did hear
about this SOC thing, so instead of us being about
protection, we should focus on detection.
Let’s us go from proactive to reactive.
We’re going to be breached anyway, the
perimeter no longer exists, so let’s work on
detecting the breach”
C-level: “Hmm… not sure if makes sense”
Me: “Do you want to explain to the share holders
and the media why we didn’t have a response
prepared for when the next leaked breach hits
the headlines?
Haven’t you seen how Deloitte, Uber, Talk Talk
have been effected?”
C-level: “Interesting. What financial costs are we
looking at here?”
Me: “Oh, say around $10 million for a 24/7, follow
the sun operation, spanning multiple locations,
rotating teams and 6 month log retention
repository”
C-level: “Seems a lot”
Me: “Compared to what?
The project will safeguard the companies
reputation, monitor critical assets, track malicious
actor lateral movement, secure your job and
ensure world peace”
C-level: “And this SOC thing will do all these
things?”
Me: “Of course, all the IT security people are
raving about it.
Not only this, it puts us at the forefront of cool
cutting edge technology: machine learning, data
lakes, big data analytics, threat hunting, etc.”
C-level: Thinks…..
C-level: “Sounds great, I’ll email the CFO
tomorrow and get the programme initiated with
top level sponsorship.”
SOC Program: Plan, Build, Implement
• Buy more monitors, get more people, consume all logs, exponentially expand
network and storage pipe (or build out cloud instances), become NASA.
SOC: Use cases and are we asking the right questions?
So what does success look like?
Really!
Oh wait… no.. sorry… where is my bag of Use
cases?
The principle
• Define Use Cases as a mechanism to justify expenditure, success and
scope.
• “Focus on aligning SOC deliverables with business objectives by developing tightly
defined goals and metrics that the SOC needs to deliver against.”
-- Gartner
• References: Gartner
• https://www.gartner.com/newsroom/id/3815169
• https://www.gartner.com/webinar/3435517
The principle
• Supplementary:
• Events that can be processed
• Trained Staff, SOC management, adequate budget, good processes, integration into
incident response:
• “If your organization can’t commit to these five factors, do not build an internal SOC – it will
fail, will waste money and time and create false sense of security”
• https://www.rsaconference.com/writable/presentations/file_upload/tech-203.pdf
• SANS overview:
• https://www.sans.org/reading-room/whitepapers/analyst/building-world-
class-security-operations-center-roadmap-35907
Google search: “SOC success criteria”
Use Cases
• Monitor the following:
• Perimeter:
• Web proxies, Malicious, C2 communication, unauthorised access, suspicious activity,
lateral movement
• Infrastructure
• Privilege Account’s
• DNS
• Malware outbreak
• Circumvention of AD
Data retention
Detection period
• Ponemon research:
2015 – 256 days
(~8 months)
2016 – 201 days
(~6.5 months)
2017 – 191 days
(~6.2 months)
References:
• https://nhlearningsolutions.com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF
• http://info.resilientsystems.com/hubfs/IBM_Resilient_Branded_Content/White_Papers/2017_Global_CODB_Report_Final.pdf
Asking the right questions: Map threats to
capabilities
• What threats is the SOC capable of identifying
• Firewall logs = DDoS attacks, Firewalking, etc.
• Windows logs = lateral movement, privilege escalation, in-memory malware
injection, etc.
• Email server logs = Phishing, spam etc.
Asking the right questions: Who do you really
care about?
• Which threat actors are we concerned about identifying?
Asking the right questions: Approach
• Time to detection: technological capability vs. threat actor
• Script kiddie, Insider threat, Hacktivist, Nation State, Cyber (obtuse)
• Reconnaissance, Persistence, Exploitation, Action, Retreat (tool/method applicability)
SOC, so what?
• Security monitoring of course matters!
• But cost/benefit analysis shouldn’t be ignored. We’re in business after
all.
Go back to your office and test your SOC
Install Nmap and start the sweep:
(Reconnaissance)
Create a regedit key: (Persistence)
• HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersion
Run]
Install Mimikatz and run: (Exploitation)
Hint:
- https://github.com/danielbohannon/Invoke-Obfuscation
- https://github.com/peewpw/Invoke-WCMDump/blob/master/Invoke-WCMDump.ps1
Install VM -> Linux -> Metasploit -> Run:
(Exploitation)
Install VM -> Windows -> Wannacry (Action):
Data exfiltration (oopps!): (Retreat)
• “Exfiltration's using polymorphic blending techniques: Analysis and
countermeasures” -- Matteo Casenove. Undetectable data extraction!
Ok then, seriously: Copy confidential data to
cloud: (Retreat)
• IoC’s, C&C signatures etc…..
SOC: Use cases and are we asking the right questions?

More Related Content

PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPSX
Next-Gen security operation center
PPTX
SOC Architecture Workshop - Part 1
PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
Effective Security Operation Center - present by Reza Adineh
PPTX
Security Operation Center Fundamental
PPTX
An introduction to SOC (Security Operation Center)
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
Security operations center-SOC Presentation-مرکز عملیات امنیت
Next-Gen security operation center
SOC Architecture Workshop - Part 1
Building a Next-Generation Security Operations Center (SOC)
Effective Security Operation Center - present by Reza Adineh
Security Operation Center Fundamental
An introduction to SOC (Security Operation Center)
From SIEM to SOC: Crossing the Cybersecurity Chasm

What's hot (20)

PDF
Building Security Operation Center
PDF
Cybersecurity Roadmap Development for Executives
PDF
Strategy considerations for building a security operations center
PPTX
Security Information and Event Management (SIEM)
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PPTX
Security operation center
PPTX
Security operation center (SOC)
PPT
SOC presentation- Building a Security Operations Center
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PDF
Rothke secure360 building a security operations center (soc)
PDF
Global Cyber Threat Intelligence
PPTX
SOC and SIEM.pptx
PDF
Enterprise Security Architecture for Cyber Security
PPTX
Cyber Threat Intelligence
PPTX
Cyber threat intelligence: maturity and metrics
PPTX
SIEM Primer:
PDF
What is SIEM? A Brilliant Guide to the Basics
PDF
Threat hunting 101 by Sandeep Singh
Building Security Operation Center
Cybersecurity Roadmap Development for Executives
Strategy considerations for building a security operations center
Security Information and Event Management (SIEM)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Security operation center
Security operation center (SOC)
SOC presentation- Building a Security Operations Center
Overview of the Cyber Kill Chain [TM]
Rothke rsa 2012 building a security operations center (soc)
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Rothke secure360 building a security operations center (soc)
Global Cyber Threat Intelligence
SOC and SIEM.pptx
Enterprise Security Architecture for Cyber Security
Cyber Threat Intelligence
Cyber threat intelligence: maturity and metrics
SIEM Primer:
What is SIEM? A Brilliant Guide to the Basics
Threat hunting 101 by Sandeep Singh
Ad

Similar to SOC: Use cases and are we asking the right questions? (20)

PPTX
Is the SOC working as a viable business model (or security model)?
PPTX
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
PPT
Ca world 2007 SOC integration
PPTX
7 Steps to Build a SOC with Limited Resources
PDF
security operations center by Manage Engigne
PDF
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
PDF
DTS Solution - Building a SOC (Security Operations Center)
PPTX
Meet the Ghost of SecOps Future by Anton Chuvakin
PDF
Aujas incident management webinar deck 08162016
PPTX
Building a SOC - hackmiami 2018
PDF
The Complete Security Operations Center Guide for 2023
PDF
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
PDF
Security Operations Center scenario Interview based Questions
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PPTX
A SOC: Building Blocks of Digital Defense
PDF
What Role Does SOC Play in Preventing Data Breaches
PDF
What Role Does SOC Play in Preventing Data Breaches.pdf
PDF
What Role Does SOC Play in Preventing Data Breaches
PPTX
CISO's first 100 days
PPTX
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
Is the SOC working as a viable business model (or security model)?
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Ca world 2007 SOC integration
7 Steps to Build a SOC with Limited Resources
security operations center by Manage Engigne
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
DTS Solution - Building a SOC (Security Operations Center)
Meet the Ghost of SecOps Future by Anton Chuvakin
Aujas incident management webinar deck 08162016
Building a SOC - hackmiami 2018
The Complete Security Operations Center Guide for 2023
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Security Operations Center scenario Interview based Questions
Building a Cyber Security Operations Center for SCADA/ICS Environments
A SOC: Building Blocks of Digital Defense
What Role Does SOC Play in Preventing Data Breaches
What Role Does SOC Play in Preventing Data Breaches.pdf
What Role Does SOC Play in Preventing Data Breaches
CISO's first 100 days
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
Ad

More from Jonathan Sinclair (10)

PPTX
Machine learning 101 - or less
PDF
The cyber security hype cycle is upon us
PPTX
Architecting trust in the digital landscape, or lack thereof
PPTX
XAI – accountability unchecked
PPTX
Cyber speed – the unknown velocity component
PPTX
Cyber Security: Strategies, Defence and what’s not working
PPT
Blue Ocean IT Security
PPTX
Vulnerability management today and tomorrow
PPTX
State of virtualisation -- 2012
PPTX
Breach analysis slideshare
Machine learning 101 - or less
The cyber security hype cycle is upon us
Architecting trust in the digital landscape, or lack thereof
XAI – accountability unchecked
Cyber speed – the unknown velocity component
Cyber Security: Strategies, Defence and what’s not working
Blue Ocean IT Security
Vulnerability management today and tomorrow
State of virtualisation -- 2012
Breach analysis slideshare

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
KodekX | Application Modernization Development
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
cuic standard and advanced reporting.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation theory and applications.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Monthly Chronicles - July 2025
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
KodekX | Application Modernization Development
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation theory and applications.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MYSQL Presentation for SQL database connectivity
NewMind AI Monthly Chronicles - July 2025

SOC: Use cases and are we asking the right questions?

  • 1. SOC: Use cases and are we asking the right questions? By Jonathan Sinclair
  • 3. History lesson • A sunny day in Luzern, presenting on virtual machines at Hashdays (now Area41)
  • 4. Reconnected with Arron ‘Finux’ Finnon talking about IDS/IPS testing, 2012
  • 5. A few questions raised • Why do we test IDS/IPS • What’s a good and bad test • What’s easy to test and what isn’t
  • 6. In the Beginning there were security conferences • Here’s why everything you thought worked, doesn’t and here’s how to hack it ….. Job done, another conference in the bag. Goodbye!
  • 8. C-level: “So how did the conference go”
  • 9. Me: “Very well thank you, it was a lot of fun, I met a lot of interesting people and really managed to connect with the leading IT security professionals”
  • 10. C-level: “Excellent, so what did you learn”
  • 11. Me: “Everything we have is broken: - Windows security is a mess, - Shim’s expose everything, - Linux is unmanageable in the Enterprise, - Apple devices actually have vulnerabilities, - NSA already owns us, - Data exfiltration is impossible to protect against, - Anti-virus can be circumvented with a 2 byte modification, - IoT is the new DDoS vector, which we couldn’t protect against anyway and now the problem has been exponentially compounded and our new strategic office in country XX is already infiltrated by under-cover government moles who are stealing our secrets over our flat network”
  • 13. C-level: “So it seems I should pull your funding as nothing we seem to be doing is actually making us anymore secure?”
  • 14. Me: “Well, maybe, but before you do, I did hear about this SOC thing, so instead of us being about protection, we should focus on detection. Let’s us go from proactive to reactive. We’re going to be breached anyway, the perimeter no longer exists, so let’s work on detecting the breach”
  • 15. C-level: “Hmm… not sure if makes sense”
  • 16. Me: “Do you want to explain to the share holders and the media why we didn’t have a response prepared for when the next leaked breach hits the headlines? Haven’t you seen how Deloitte, Uber, Talk Talk have been effected?”
  • 17. C-level: “Interesting. What financial costs are we looking at here?”
  • 18. Me: “Oh, say around $10 million for a 24/7, follow the sun operation, spanning multiple locations, rotating teams and 6 month log retention repository”
  • 20. Me: “Compared to what? The project will safeguard the companies reputation, monitor critical assets, track malicious actor lateral movement, secure your job and ensure world peace”
  • 21. C-level: “And this SOC thing will do all these things?”
  • 22. Me: “Of course, all the IT security people are raving about it. Not only this, it puts us at the forefront of cool cutting edge technology: machine learning, data lakes, big data analytics, threat hunting, etc.”
  • 24. C-level: “Sounds great, I’ll email the CFO tomorrow and get the programme initiated with top level sponsorship.”
  • 25. SOC Program: Plan, Build, Implement • Buy more monitors, get more people, consume all logs, exponentially expand network and storage pipe (or build out cloud instances), become NASA.
  • 27. So what does success look like? Really!
  • 28. Oh wait… no.. sorry… where is my bag of Use cases?
  • 29. The principle • Define Use Cases as a mechanism to justify expenditure, success and scope. • “Focus on aligning SOC deliverables with business objectives by developing tightly defined goals and metrics that the SOC needs to deliver against.” -- Gartner • References: Gartner • https://www.gartner.com/newsroom/id/3815169 • https://www.gartner.com/webinar/3435517
  • 30. The principle • Supplementary: • Events that can be processed • Trained Staff, SOC management, adequate budget, good processes, integration into incident response: • “If your organization can’t commit to these five factors, do not build an internal SOC – it will fail, will waste money and time and create false sense of security” • https://www.rsaconference.com/writable/presentations/file_upload/tech-203.pdf • SANS overview: • https://www.sans.org/reading-room/whitepapers/analyst/building-world- class-security-operations-center-roadmap-35907
  • 31. Google search: “SOC success criteria”
  • 32. Use Cases • Monitor the following: • Perimeter: • Web proxies, Malicious, C2 communication, unauthorised access, suspicious activity, lateral movement • Infrastructure • Privilege Account’s • DNS • Malware outbreak • Circumvention of AD
  • 34. Detection period • Ponemon research: 2015 – 256 days (~8 months) 2016 – 201 days (~6.5 months) 2017 – 191 days (~6.2 months) References: • https://nhlearningsolutions.com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF • http://info.resilientsystems.com/hubfs/IBM_Resilient_Branded_Content/White_Papers/2017_Global_CODB_Report_Final.pdf
  • 35. Asking the right questions: Map threats to capabilities • What threats is the SOC capable of identifying • Firewall logs = DDoS attacks, Firewalking, etc. • Windows logs = lateral movement, privilege escalation, in-memory malware injection, etc. • Email server logs = Phishing, spam etc.
  • 36. Asking the right questions: Who do you really care about? • Which threat actors are we concerned about identifying?
  • 37. Asking the right questions: Approach • Time to detection: technological capability vs. threat actor • Script kiddie, Insider threat, Hacktivist, Nation State, Cyber (obtuse) • Reconnaissance, Persistence, Exploitation, Action, Retreat (tool/method applicability)
  • 38. SOC, so what? • Security monitoring of course matters! • But cost/benefit analysis shouldn’t be ignored. We’re in business after all.
  • 39. Go back to your office and test your SOC
  • 40. Install Nmap and start the sweep: (Reconnaissance)
  • 41. Create a regedit key: (Persistence) • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersion Run]
  • 42. Install Mimikatz and run: (Exploitation) Hint: - https://github.com/danielbohannon/Invoke-Obfuscation - https://github.com/peewpw/Invoke-WCMDump/blob/master/Invoke-WCMDump.ps1
  • 43. Install VM -> Linux -> Metasploit -> Run: (Exploitation)
  • 44. Install VM -> Windows -> Wannacry (Action):
  • 45. Data exfiltration (oopps!): (Retreat) • “Exfiltration's using polymorphic blending techniques: Analysis and countermeasures” -- Matteo Casenove. Undetectable data extraction!
  • 46. Ok then, seriously: Copy confidential data to cloud: (Retreat) • IoC’s, C&C signatures etc…..