https://www.techtarget.com/searchsecurity/tip/In-house-vs-outsourced-cybersecurity-operations-center-capabilities
The term cybersecurity operations is straightforward. In business, operations refers to all the things an organization does in order to perform its mission. But, to do that, the organization must also protect the resources needed to meet its goals, and that's where cybersecurity comes in.
Online information and resources require protection, and cybersecurity operations are the organizational processes needed to secure the overall organization -- and, in particular, its information assets -- against cybersecurity threats.
Cybersecurity operations have one overriding goal: protect the organization's information, websites, databases, business processes and communications. They do this by monitoring what goes on inside and outside the network to detect action that may represent malicious activity or threats.
Many networks grew in response to emerging technologies and changing demands -- leaving cybersecurity without a unified master plan to follow. The internet disrupted everything, making it critically necessary for companies to beef up their security operations and to place them under one umbrella. The volume of alerts generated by intrusion detection/prevention systems, firewalls and other systems compelled companies to take a closer look at their security infrastructure. Not only did companies fear a lack of trained staff meant alerts weren't being analyzed, but they were also worried that the sheer number of alerts was just too great to diagnose in a timely fashion. Organizations were afraid of what they didn't know from a threat monitoring standpoint.
For these organizations, there are two possible approaches to create security operations center (SOC) capabilities: outsource or build in-house.
Outsourcing the cybersecurity operations function is a reasonable way to monitor network alerts. At its most basic, outsourcing cybersecurity operations involves contracting with a managed security service provider to analyze network alerts for potential malicious behavior, with the MSSP discarding those that are not malicious and reporting those that may, in fact, be harmful.
For some organizations, complete and permanent outsourcing of cybersecurity operations is a desirable option. This is a reasonable approach for governmental organizations, in particular, where obtaining, training and managing people and facilities, as well as predicting cost effectiveness, are preferably handled under a services contract rather than in-house. Governmental organizations may also have significant compliance obligations regarding cybersecurity where it may be convenient to transfer regulatory mandates to a contractor.
Building an in-house cybersecurity operations center provides the greatest degree of control over cybersecurity operations and the best opportunity to get exactly the services that an organization needs. Building an in-house cybersecurity operations center can also provide the foundation for building future comprehensive cybersecurity services, including vulnerability management, incident response services, external and internal threat management services, and threat hunting.
Compared to outsourcing the cybersecurity operations function, building in-house capability has the following pros and cons.
As with many cybersecurity decisions, the right approach for many organizations is to find the correct balance between managing the cybersecurity operations function in-house and outsourcing it to an MSSP.
One reasonable option -- particularly for companies that intend to build an internal cybersecurity operations function -- is to take advantage of the speed that outsourcing provides while the organization builds its own cybersecurity operations. Outsourcing can provide at least some of the cybersecurity services needed today, and the organization can take advantage of the trained, experienced staff that an MSSP has at its disposal while building the services that it wants to provide on its own.
08 Dec 2020