0
(0)

 Important

The improved Microsoft 365 Defender portal is now available. This new experience brings Defender for Endpoint, Defender for Office 365, Microsoft 365 Defender, and more into the Microsoft 365 Defender portal. Learn what’s new.

Applies to:

  • Microsoft 365 Defender

Whatever the current maturity of your security operations, it is important for you to align with your Security Operations Center (SOC). While there is no single model that fits every organization, there are certain aspects that are more common than others.

The following sections describe the core functions of the SOC.

Provide situational awareness of modern threats

A SOC team prepares for and hunts new and incoming threats so that they can work with the organization to establish countermeasures and responses. Your SOC team should have personnel that are highly trained in modern attack methods and techniques and understand threat actors. Shared threat intelligence and frameworks like the Cyber Kill Chain or MITRE ATT&CK framework can empower your staff of threat analysts and threat hunters.

Provide first, second, and potentially third level responses to cyber incidents and events

The SOC is the frontline of defense to security events and incidents. When an event, threat, attack, policy violation, or audit finding triggers an alert or call to action, the SOC team makes an assessment to triage and contain it or escalate it for investigation. Therefore, the SOC first line responders must have broad technical knowledge of security events and indicators.

Centralize monitoring and logging of your organization’s security sources

Usually, the SOC team’s core function is to make sure all security devices such as firewalls, intrusion prevention systems, data loss prevention systems, threat and vulnerability management systems, and identity systems are functioning correctly and being monitored. The SOC teams will work with the broader network operations such as identity, DevOps, cloud, application, data science, and other business teams to ensure the analysis of security information is centralized and secured. Additionally, the SOC team is responsible for maintaining logs of the data in useable and readable formats, which could include parsing and normalizing disparate formats.

Establish Red, Blue, and Purple team operational readiness

Every SOC team should test its preparedness in responding to a cyber incident. Testing can be done via training exercises, such as table-tops and practice runs with various individuals in IT, security, and at the business level. Individual training exercise teams are created based on representative roles and are either playing the role of a defender (Blue Team), an attacker (Red Team), or as observers seeking to improve methods and techniques of both the Blue and Red teams through strengths and weakness that is uncovered during the exercise (Purple Team).

Source : Official Microsoft Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 2 times, 1 visits today)