TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/tip/How-to-assess-SOC-as-a-service-benefits-and-challenges

How to assess SOC-as-a-service benefits and challenges

By John Burke

Security operations center as a service is a cloud-delivered, subscription-based offering that lets an enterprise outsource cybersecurity functions to a third-party vendor.

While individual SOCaaS offerings vary, they can include any function an on-premises SOC traditionally handles, such as network monitoring, threat detection, threat intelligence, incident response and vulnerability assessments.

Organizations considering SOCaaS, in lieu of an in-house SOC, should understand its key features, benefits and challenges.

What is SOC as a service?

In the SOC-as-a-service model, a third-party provider delivers SOC functionality to its customers via the cloud. The core purpose of the SOC -- whether in-house or outsourced -- is to act as a centralized hub from which analysts provide 24/7 security monitoring and prevent, detect, identify, prioritize and respond to cyberthreats.

The SOC team gathers real-time data from cybersecurity systems across the IT ecosystem, including those that secure identities, data, endpoints, networks, applications, servers, data centers and cloud environments. This usually involves collecting, managing and analyzing log data and alerts from systems such as firewalls, cloud access security brokers, identity management systems and endpoint protection platforms.

To aid in these objectives, a SOC-as-a-service offering might rely on tools such as a security information and event management system or an extended detection and response (XDR) system, either its own or the enterprise customer's. The SOC could also deploy security orchestration automation and response to standardize and accelerate responses to unfolding security events.

SOCaaS vs. MDR

Some providers offer solely XDR-based services or managed detection and response (MDR) -- in effect SOCaaS-lite. Full SOCaaS offerings have more extensive features and capabilities.

Key SOC-as-a-service features

Any SOC-as-a-service offering should provide its customers the following key features:

In addition, the SOCaaS offering should define clear handoffs between the provider's own staff, processes and systems and the customer's, based on their clearly defined roles and responsibilities.

The SOCaaS provider should also have a well-defined process for flagging any problems its SOC analysts see in the customer environment that they do not have access to fix.

For those problems it sees and can respond to, the provider should have clearly defined and consistent procedures for engaging the customer's own change management process to resolve them.

SOC-as-a-service benefits

The key benefits of SOCaaS are similar to those of many outsourcing arrangements and reflect the general reasons enterprises adopt the cloud model. They include the following:

SOC-as-a-service challenges

As with any outsourcing arrangement, potential challenges could ultimately offset potential benefits. Organizations considering SOCaaS should stay alert to the following possible downsides:

How to decide: In-house SOC vs. SOC as a service

A SOC used to be something only the largest companies considered. Today, however, as digital transformation continues and the threat landscape worsens, the SOC is becoming a necessity for organizations of diverse sizes.

Each organization should choose its SOC model based on a variety of considerations, starting with cost and the overall cost structure strategy. If the organization as a whole is prone to outsourcing, then outsourcing the SOC may be a natural option. If the organization can't afford an in-house SOC, then outsourcing managed SOC services is the only option -- and a complete SOC as a service may even prove unaffordable. In that case, the company should consider SOCaaS-lite options, such as the various types of MDR offerings.

Another crucial consideration is effectiveness. Nemertes research has found a good metric for judging overall security success is the time it takes a company to contain a compromise, or mean time to contain (MTTC).

Over the years, Nemertes has also found that, for smaller companies, the challenges of developing a solid SOC internally -- especially from a staffing perspective -- are so great that outsourcing is generally more successful for minimizing MTTC. For large companies, however, a DIY, in-house SOC is usually more effective.

A full evaluation must weigh a variety of additional factors, some of them specific to individual organizations. At a minimum, consider the following:

John Burke is CTO and principal research analyst with Nemertes Research. With nearly two decades of technology experience, he has worked at all levels of IT, including end-user support specialist, programmer, system administrator, database specialist, network administrator, network architect and systems architect. His focus areas include AI, cloud, networking, infrastructure, automation and cybersecurity.

Alissa Irei is senior site editor of TechTarget Security.

01 Aug 2024

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement