07.07.2015 Views

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

Cyber-Security-Monitoring-Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Cyber</strong> <strong>Security</strong> <strong>Monitoring</strong> and Logging <strong>Guide</strong>SOC servicesIf you decide to use a SOC (either outsourced or developed internally) the services of the SOC should be customised to yourthreat landscape and data assets to enable a targeted analysis of data based on your organisation’s security objectives.You should also make sure that, where required, your SOC:• Accumulates all relevant traffic entering and leaving your network for a fixed duration• Analyses all captured data, putting it into context using situational awareness - forensically sound capture files canbe retained should evidence be required• Alerts you to certain events or trends in real-time by capturing data across multiple capture locations and analysing itin numerous dimensions• Reports evidence of real events and actual incidents, sophisticated attack detection – including infiltration andexfiltration incidents, corporate or third party security policy violations, and specific compliance non-conformities• Enables effective remediation of cyber security incidents• Assesses both the general health and security posture of your organisation at network level as well as theeffectiveness of existing cyber security controls.“A good SOC should not just be a detection centre”Many major SOC offerings run 24/7 every day of the year, providing a wide rangeof commercial services. They deliver a ’service wrap’ of offerings for their clients,effectively integrating a wide range of technical security services.People, process, technology and informationAny SOC needs to be supported by the right blend of people, process, technology and information, as outlined in Figure 9below.PROCESSPEOPLETECHNOLOGYCYBERSECURITYINCIDENT110101010010101000101111101010100101010001010100010101010001010101000010101010101010100010101010001010101011101010100010010100010001001001010101011101010100101010001011111010101001010100010101000101010100010101010000101010101010101000101010100010101010111010101000100101INFORMATIONFigure 9: Main considerations for each phase of the cyber security monitoring and logging process38

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!