A security operations center, or SOC, helps organizations avoid attacks by identifying, investigating, and remediating threats.
이 글을 읽은 후에 다음을 할 수 있습니다:
글 링크 복사
A security operations center (SOC), also referred to as an information security operations center (ISOC), is a dedicated facility where security professionals monitor, analyze, and mitigate potential cyber threats. Due to the distributed nature of modern organizations, “SOC” is often used to describe the team of security engineers and analysts that carries out these functions.
While the architecture of a SOC varies from organization to organization, it fulfills several key functions:
Typically, an organization depends on a single internal SOC for threat management and remediation, but large enterprises may maintain multiple SOCs across different countries (sometimes called a global security operations center, or GSOC) or choose to employ a third-party group of security analysts and engineers.
A SOC can be configured in many different ways, and is likely to change depending on the needs and capabilities of an organization. Generally, its responsibilities fall into three buckets:
Asset inventory: To protect an organization from threats and identify security gaps, a SOC needs full visibility over its systems, applications, and data — as well as the security tools protecting them. An asset discovery tool may be used to carry out the inventory process.
Vulnerability assessment: To gauge the potential impact of an attack, a SOC may conduct regular testing on an organization’s hardware and software, and use the results to update their security policies or develop an incident response plan.
Preventative maintenance: Once a SOC has pinpointed vulnerabilities in an organization’s infrastructure, it can take steps to strengthen its security posture. These may include updating firewalls, maintaining allowlists and blocklists, patching software, and refining security protocols and procedures.
Log collection and analysis: A SOC collects log data generated by events across an organization’s network (like those documented by firewalls, intrusion prevention and detection systems, and so on), then analyzes those logs for any anomalies or suspicious activity. Depending on the size and complexity of an organization’s infrastructure, this can be a resource-intensive process, and it may be done via an automated tool.
Threat monitoring: A SOC uses log data to create alerts for suspicious activity and other indicators of compromise (IOC). IOCs are anomalies in data — network traffic irregularities, unexpected system file changes, unauthorized application usage, strange DNS requests, or other behavior — that indicate a breach or other malicious event is likely to occur.
Security information and event management (SIEM): A SOC often works with a SIEM solution to automate threat protection and remediation. Common capabilities of a SIEM include:
Incident response and remediation: When an attack occurs, a SOC often takes several steps to mitigate the damage and restore impacted systems. These may include isolating infected devices, deleting compromised files, running anti-malware software, and conducting a root cause investigation. SOCs may use these findings to improve existing security policies.
Compliance reporting: Following an attack, a SOC helps organizations remain compliant with data privacy regulations (for example, the GDPR) by notifying the appropriate authorities about the volume and type of protected data that has been compromised.
When creating a SOC, organizations have several options. The most common categories of SOCs include:
A network operations center, or NOC, oversees network activity and threats. A NOC team is responsible for monitoring the health of an organization’s network, anticipating and preventing outages, defending against attacks, and performing routine maintenance checks for various systems and software.
Unlike a SOC, which tracks and mitigates malicious activity across an organization’s entire infrastructure, a NOC is singularly focused on network security and performance.
Cloudflare Security Operations Center-as-a-Service combines detection and monitoring features with key security technologies, like a web application firewall (WAF), bot management solution, and DDoS attack prevention. By offloading SOC responsibilities to Cloudflare, organizations can maintain visibility over their infrastructure, track and mitigate incoming threats, and reduce overall security costs.