https://www.techtarget.com/searchsecurity/feature/SOC-services-How-to-find-the-right-provider-for-your-company
As organizations face ever more threats and attacks to their information systems and data, they are increasingly considering setting up security operations centers to centrally manage their detection and management of cybersecurity incidents. Properly implementing a SOC is often a complex undertaking, requiring significant time, money and staff. Plus, organizations can face challenges such as SOC talent shortages and inability to scale. As a result, many businesses are exploring outsourcing some or all of their SOC services to third-party companies, known as SOC service providers.
This buyer's handbook helps you understand the different types of services that are available from SOC vendors, which features you should look for and how to choose services that are appropriate for your organization.
A SOC is a set of people, processes and technologies, often centralized, that -- at a minimum -- receives and analyzes user reports and data feeds -- logs, for example -- from information systems and cybersecurity controls. Typically, the primary goal of a SOC is to detect and prioritize cybersecurity incidents that could negatively impact an organization's information systems or data.
SOCs vary from organization to organization and are implemented per structural cybersecurity priorities and risk tolerance. Some SOCs will manage an incident from detection to remediation; others will focus on supporting and coordinating incident responders and handling incident response communication -- e.g., status updates and third-party communication.
Each organization must implement SOC services that are appropriate and reasonable for it.
SOC employees and technologies are typically located in a central location that employees with different levels of expertise -- such as analysts, responders and hunters -- staff 24/7 year-round. SOCs tend to be very process-driven: They have standard operating procedures, use cases and play books to define how SOC staff respond to and communicate about various cybersecurity events and incidents.
In addition to real-time analysis of user reports and data feeds, SOCs can also provide the following:
Organizations may consider outsourcing all or some of their SOC services to a SOC service provider for one or more of the following reasons:
For all of the above reasons, the expectation is that the SOC service provider will be able to provide specific SOC services more effectively or less expensively than the organization itself.
SOC vendors can provide the following:
As the above list makes clear, SOC service providers offer many capabilities that could be useful for your organization's SOC. But the variety of services can be overwhelming. One way to start evaluating SOC providers is with two basic steps to identify those services of most value for your company.
, identify cybersecurity controls (firewalls, IDS/IPS and so on) that your organization has already implemented but are not being effectively used, either because there are technical challenges or because your team lacks the expertise required. Second, identify services that your organization wants (such as threat intelligence) but cannot effectively implement due to lack of qualified staff or inability to reach necessary scale.
Be sure you're effectively managing and monitoring your existing cybersecurity systems before signing up for advanced services like threat intelligence. For instance, it will be difficult to reap the benefits of threat intelligence if your organization doesn't already have a good understanding of what's happening on its cybersecurity systems.
A key decision you should be prepared to make is whether to have a SOC service provider only monitor (for example, receive logs from some or all of your organization's cybersecurity systems) or also manage certain cybersecurity systems (such as firewalls or SIEMs). Your organization's security policy and risk tolerance will determine this.
Using a SOC service provider can lighten the load on your organization's SOC, but your company will still need to define and assign program-management resources to keep the SOC vendor on task and to evaluate its ongoing effectiveness.
Regardless of what services you choose from a SOC service provider, look for the following functional features:
Choosing to use a SOC service provider is an important business decision; you want to have a strong, trusted partner, so look for key business features, such as evidence that the provider is financially stable and has a strong customer-retention rate. The SOC provider should offer guaranteed performance-based service-level agreements that include the ability to terminate service in the case of poor performance. Naturally, the provider should have proven experience and expertise in your specific industry. Also, you should be able to reasonably customize provided SOC services; your organization shouldn't have to force itself into a one-size-fits-all service.
Using a SOC service provider will likely involve sharing sensitive data or giving the provider access to some of your organization's information systems. In order to prevent cybersecurity incidents and compliance gaps, require the following security features at a minimum:
Properly implemented and managed, outsourced SOC services can be an important part of your business's cybersecurity program; partnering with a service provider can be a smart way to efficiently and effectively improve your organization's security operations center. Be sure to carefully evaluate SOC service providers so that you end up with the right services for your company.
10 May 2018