3
Most read
6
Most read
14
Most read
Next-Gen Security
Operation Center
Future-Ready Protection Against Targeted Attacks
Muhammad Sahputra
Who..?
Motivation Behind Attacks Based on Stats
- March 2018
Cyber Crime & Cyber Espionage mostly motivates
hackers to launch attacks against targeted organisations
Cyber Kill Chain
– Gartner
“A security operations center (SOC) can be defined
both as a team, often operating in shifts around the
clock, and a facility dedicated to and organized to
prevent, detect, assess and respond to cybersecurity
threats and incidents, and to fulfill and assess
regulatory compliance.”
What is SOC?
Traditional Security
Operation Center
Machine Logs
192.168.2.20 - - [28/Jul/2006:10:27:10 -0300] "GET /cgi-
bin/try/ HTTP/1.0" 200 3395
127.0.0.1 - - [28/Jul/2006:10:22:04 -0300] "GET /
HTTP/1.0" 200 2216
x.x.x.90 - - [13/Sep/2006:07:01:53 -0700] "PROPFIND
/svn/[xxxx]/Extranet/branches/SOW-101 HTTP/1.1" 401 587
x.x.x.90 - - [13/Sep/2006:07:01:51 -0700] "PROPFIND
/svn/[xxxx]/[xxxx]/trunk HTTP/1.1" 401 587
x.x.x.90 - - [13/Sep/2006:07:00:53 -0700] "PROPFIND
/svn/[xxxx]/[xxxx]/2.5 HTTP/1.1" 401 587
x.x.x.90 - - [13/Sep/2006:07:00:53 -0700] "PROPFIND
/svn/[xxxx]/Extranet/branches/SOW-101 HTTP/1.1" 401 587
x.x.x.90 - - [13/Sep/2006:07:00:21 -0700] "PROPFIND
/svn/[xxxx]/[xxxx]/trunk HTTP/1.1" 401 587
x.x.x.90 - - [13/Sep/2006:06:59:53 -0700] "PROPFIND
/svn/[xxxx]/[xxxx]/2.5 HTTP/1.1" 401 587
x.x.x.90 - - [13/Sep/2006:06:59:50 -0700] "PROPFIND
/svn/[xxxx]/[xxxx]/trunk HTTP/1.1" 401 587
x.x.x.90 - - [13/Sep/2006:06:58:52 -0700] "PROPFIND
/svn/[xxxx]/[xxxx]/trunk HTTP/1.1" 401 587
x.x.x.90 - - [13/Sep/2006:06:58:52 -0700] "PROPFIND
/svn/[xxxx]/Extranet/branches/SOW-101 HTTP/1.1" 401 587
[Fri Dec 16 01:46:23 2005] [error] [client 1.2.3.4]
Directory index forbidden by rule: /home/test/
[Fri Dec 16 01:54:34 2005] [error] [client 1.2.3.4]
Directory index forbidden by rule: /apache/web-
data/test2
[Fri Dec 16 02:25:55 2005] [error] [client 1.2.3.4]
Client sent malformed Host header
[Mon Dec 19 23:02:01 2005] [error] [client 1.2.3.4] user
test: authentication failure for "/~dcid/test1":
Password Mismatch
• Application Logs
• Service Logs
• Event Logs
• System Logs
Security Information Event
Management
“Traditional SOC put
more weight on people
by introducing 24/7
security monitoring
activities”
External Data
Magic Word: Threat
Intelligence
People-Centric SOC
Define vision for the
team. Evaluate budgetary
/ resource concerns
First line of monitoring.
Eys-on-Glass monitoring.
Basic analysis, following
SOPs / playbooks
Actively look for loop
holes in network / system
/ configuration
Actively looking for threat
information and correlate
it with assets belong to
the organisation
Look deeper in to security
incidents. Assist in
investigating cyber
crimes
Remediate security
incidents ASAP based on
analysis performed by
security analyst
Actively dive-in to SIEM
data to look for
suspicipous activities
especially unknown
threat / zeroday
Configure, fine-
tune and maintain
SIEM solution
Second line of
monitoring.
Having more
experienced on
security analysis
Coordinate with all
team members.
Define and
document
process. Run the
operations
People-Centric SOC
“People-Centric SOC
introduce painful issue
to organisation”
“Don’t you think it is
inhuman to let people
watch the screen for 8
hours especially in the
middle-of night”?
“It is industry 4.0 era”
“Next-Gen Security Operation Center vision is to
improve technology, people, and process in
Traditional SOC”
Use Case: Improving MTTD-
MTTR
Define vision for the
team. Evaluate budgetary
/ resource concerns
First line of monitoring.
Eys-on-Glass monitoring.
Basic analysis, following
SOPs / playbooks
Actively look for loop
holes in network / system
/ configuration
Actively looking for threat
information and correlate
it with assets belong to
the organisation
Look deeper in to security
incidents. Assist in
investigating cyber
crimes
Remediate security
incidents ASAP based on
analysis performed by
security analyst
Actively dive-in to SIEM
data to look for
suspicipous activities
especially unknown
threat / zeroday
Configure, fine-
tune and maintain
SIEM solution
Second line of
monitoring.
Having more
experienced on
security analysis
Coordinate with all
team members.
Define and
document
process. Run the
operations
Solution: SOAR
SOAR
Next-Gen SOC utilise SOAR (Security Orchestration Automation and Response)
to perform actionable insights and interaction with another component in the
network
Use Case: Vulnerability
Management System
Define vision for the
team. Evaluate budgetary
/ resource concerns
First line of monitoring.
Eys-on-Glass monitoring.
Basic analysis, following
SOPs / playbooks
Actively look for loop
holes in network / system
/ configuration
Actively looking for threat
information and correlate
it with assets belong to
the organisation
Look deeper in to security
incidents. Assist in
investigating cyber
crimes
Remediate security
incidents ASAP based on
analysis performed by
security analyst
Actively dive-in to SIEM
data to look for
suspicipous activities
especially unknown
threat / zeroday
Configure, fine-
tune and maintain
SIEM solution
Second line of
monitoring.
Having more
experienced on
security analysis
Coordinate with all
team members.
Define and
document
process. Run the
operations
Solution: Bigdata and AI
Next-Gen SOC pushes forward the
limits of a tri-dimensional
paradigm. It needs to increase the
detection surface and decision
velocity, decrease reaction time
by utilising bigdata analytics
combined with AI technology
“Potensi serangan DDoS terhadap website
IDNIC (Indonesia Network Information
Center) dengan URL
https://www.idnic.id (203.119.13.145) pada
tanggal 29 November 2018”.
Analytics in Next-Gen Security Operation
Center
Next-Gen SOC preventing breaches from happening,
by leveraging big data and supercomputing capabilities
Summary
• No, Next-Gen SOC doesn’t intend to replace Human with
Machine
• Rarity of Human in IT Security forces us to be more creative
within Industry 4.0 era
• People role “improved” i.e Trainer for the Machine, Analysing
only high classified unknown-complex threat, Data scientist, …
• Convert your facility from Traditional to Next-Gen need proper
plan: Map according to your organisation requirement, focus
on what is the most pain point, improve them with machine
END

More Related Content

PDF
Building Security Operation Center
PPTX
An introduction to SOC (Security Operation Center)
PPTX
Security operation center (SOC)
PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
SOC Architecture Workshop - Part 1
PPTX
SOC and SIEM.pptx
PPTX
Effective Security Operation Center - present by Reza Adineh
PPTX
Rothke rsa 2012 building a security operations center (soc)
Building Security Operation Center
An introduction to SOC (Security Operation Center)
Security operation center (SOC)
Building a Next-Generation Security Operations Center (SOC)
SOC Architecture Workshop - Part 1
SOC and SIEM.pptx
Effective Security Operation Center - present by Reza Adineh
Rothke rsa 2012 building a security operations center (soc)

What's hot (20)

PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PPTX
Security Operation Center Fundamental
PPT
SOC presentation- Building a Security Operations Center
PPTX
Security operation center
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
Rothke secure360 building a security operations center (soc)
PDF
Introduction to QRadar
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPTX
WHY SOC Services needed?
PPTX
Security Information and Event Management (SIEM)
PDF
Governance of security operation centers
PDF
Building A Security Operations Center
PPTX
SOAR and SIEM.pptx
PDF
Bulding Soc In Changing Threat Landscapefinal
PPTX
7 Steps to Build a SOC with Limited Resources
Security operations center-SOC Presentation-مرکز عملیات امنیت
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Cyber Security Operations Center for SCADA/ICS Environments
Security Operation Center Fundamental
SOC presentation- Building a Security Operations Center
Security operation center
DTS Solution - Building a SOC (Security Operations Center)
From SIEM to SOC: Crossing the Cybersecurity Chasm
Rothke secure360 building a security operations center (soc)
Introduction to QRadar
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Threat Hunting - Moving from the ad hoc to the formal
WHY SOC Services needed?
Security Information and Event Management (SIEM)
Governance of security operation centers
Building A Security Operations Center
SOAR and SIEM.pptx
Bulding Soc In Changing Threat Landscapefinal
7 Steps to Build a SOC with Limited Resources
Ad

Similar to Next-Gen security operation center (20)

PDF
security operations center by Manage Engigne
PPTX
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
PDF
Changing the Security Monitoring Status Quo
 
DOC
Take back your security infrastructure
PDF
Cybersecurity_Security_architecture_2023.pdf
PDF
Alienvault how to build a security operations center (on a budget) (2017, a...
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PDF
What's behind a cyber attack
PDF
Use Exabeam Smart Timelines to improve your SOC efficiency
PPTX
Optimizing Security Operations: 5 Keys to Success
PPT
Security Considerations in Process Control and SCADA Environments
PDF
What Is Cyber Threat Intelligence | How It Work? | SOCVault
PPTX
LIBRARY RESEARCH PROJECT, SECURITY OPERATION CENTER.pptx
PDF
Exploration Draft Document- CEM Machine Learning & AI Project 2018
PDF
Intrusion Detection System using Data Mining
PPTX
Fundamentals of SOCs and CERTS for decision makers
DOCX
Overall Security Process Review CISC 6621Agend.docx
PPTX
SEIM-Microsoft Sentinel.pptx
PPTX
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
security operations center by Manage Engigne
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Changing the Security Monitoring Status Quo
 
Take back your security infrastructure
Cybersecurity_Security_architecture_2023.pdf
Alienvault how to build a security operations center (on a budget) (2017, a...
Cyber-Espionage: Understanding the Advanced Threat Landscape
What's behind a cyber attack
Use Exabeam Smart Timelines to improve your SOC efficiency
Optimizing Security Operations: 5 Keys to Success
Security Considerations in Process Control and SCADA Environments
What Is Cyber Threat Intelligence | How It Work? | SOCVault
LIBRARY RESEARCH PROJECT, SECURITY OPERATION CENTER.pptx
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Intrusion Detection System using Data Mining
Fundamentals of SOCs and CERTS for decision makers
Overall Security Process Review CISC 6621Agend.docx
SEIM-Microsoft Sentinel.pptx
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Ad

Recently uploaded (20)

PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
SaaS reusability assessment using machine learning techniques
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PPTX
Microsoft User Copilot Training Slide Deck
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
Data Virtualization in Action: Scaling APIs and Apps with FME
Basics of Cloud Computing - Cloud Ecosystem
SGT Report The Beast Plan and Cyberphysical Systems of Control
SaaS reusability assessment using machine learning techniques
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Early detection and classification of bone marrow changes in lumbar vertebrae...
Microsoft User Copilot Training Slide Deck
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
future_of_ai_comprehensive_20250822032121.pptx
LMS bot: enhanced learning management systems for improved student learning e...
4 layer Arch & Reference Arch of IoT.pdf
Training Program for knowledge in solar cell and solar industry
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
sbt 2.0: go big (Scala Days 2025 edition)
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf

Next-Gen security operation center

  • 1. Next-Gen Security Operation Center Future-Ready Protection Against Targeted Attacks Muhammad Sahputra
  • 3. Motivation Behind Attacks Based on Stats - March 2018 Cyber Crime & Cyber Espionage mostly motivates hackers to launch attacks against targeted organisations
  • 5. – Gartner “A security operations center (SOC) can be defined both as a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance.” What is SOC?
  • 7. Machine Logs 192.168.2.20 - - [28/Jul/2006:10:27:10 -0300] "GET /cgi- bin/try/ HTTP/1.0" 200 3395 127.0.0.1 - - [28/Jul/2006:10:22:04 -0300] "GET / HTTP/1.0" 200 2216 x.x.x.90 - - [13/Sep/2006:07:01:53 -0700] "PROPFIND /svn/[xxxx]/Extranet/branches/SOW-101 HTTP/1.1" 401 587 x.x.x.90 - - [13/Sep/2006:07:01:51 -0700] "PROPFIND /svn/[xxxx]/[xxxx]/trunk HTTP/1.1" 401 587 x.x.x.90 - - [13/Sep/2006:07:00:53 -0700] "PROPFIND /svn/[xxxx]/[xxxx]/2.5 HTTP/1.1" 401 587 x.x.x.90 - - [13/Sep/2006:07:00:53 -0700] "PROPFIND /svn/[xxxx]/Extranet/branches/SOW-101 HTTP/1.1" 401 587 x.x.x.90 - - [13/Sep/2006:07:00:21 -0700] "PROPFIND /svn/[xxxx]/[xxxx]/trunk HTTP/1.1" 401 587 x.x.x.90 - - [13/Sep/2006:06:59:53 -0700] "PROPFIND /svn/[xxxx]/[xxxx]/2.5 HTTP/1.1" 401 587 x.x.x.90 - - [13/Sep/2006:06:59:50 -0700] "PROPFIND /svn/[xxxx]/[xxxx]/trunk HTTP/1.1" 401 587 x.x.x.90 - - [13/Sep/2006:06:58:52 -0700] "PROPFIND /svn/[xxxx]/[xxxx]/trunk HTTP/1.1" 401 587 x.x.x.90 - - [13/Sep/2006:06:58:52 -0700] "PROPFIND /svn/[xxxx]/Extranet/branches/SOW-101 HTTP/1.1" 401 587 [Fri Dec 16 01:46:23 2005] [error] [client 1.2.3.4] Directory index forbidden by rule: /home/test/ [Fri Dec 16 01:54:34 2005] [error] [client 1.2.3.4] Directory index forbidden by rule: /apache/web- data/test2 [Fri Dec 16 02:25:55 2005] [error] [client 1.2.3.4] Client sent malformed Host header [Mon Dec 19 23:02:01 2005] [error] [client 1.2.3.4] user test: authentication failure for "/~dcid/test1": Password Mismatch • Application Logs • Service Logs • Event Logs • System Logs
  • 8. Security Information Event Management “Traditional SOC put more weight on people by introducing 24/7 security monitoring activities”
  • 9. External Data Magic Word: Threat Intelligence
  • 10. People-Centric SOC Define vision for the team. Evaluate budgetary / resource concerns First line of monitoring. Eys-on-Glass monitoring. Basic analysis, following SOPs / playbooks Actively look for loop holes in network / system / configuration Actively looking for threat information and correlate it with assets belong to the organisation Look deeper in to security incidents. Assist in investigating cyber crimes Remediate security incidents ASAP based on analysis performed by security analyst Actively dive-in to SIEM data to look for suspicipous activities especially unknown threat / zeroday Configure, fine- tune and maintain SIEM solution Second line of monitoring. Having more experienced on security analysis Coordinate with all team members. Define and document process. Run the operations
  • 11. People-Centric SOC “People-Centric SOC introduce painful issue to organisation” “Don’t you think it is inhuman to let people watch the screen for 8 hours especially in the middle-of night”? “It is industry 4.0 era”
  • 12. “Next-Gen Security Operation Center vision is to improve technology, people, and process in Traditional SOC”
  • 13. Use Case: Improving MTTD- MTTR Define vision for the team. Evaluate budgetary / resource concerns First line of monitoring. Eys-on-Glass monitoring. Basic analysis, following SOPs / playbooks Actively look for loop holes in network / system / configuration Actively looking for threat information and correlate it with assets belong to the organisation Look deeper in to security incidents. Assist in investigating cyber crimes Remediate security incidents ASAP based on analysis performed by security analyst Actively dive-in to SIEM data to look for suspicipous activities especially unknown threat / zeroday Configure, fine- tune and maintain SIEM solution Second line of monitoring. Having more experienced on security analysis Coordinate with all team members. Define and document process. Run the operations
  • 15. SOAR Next-Gen SOC utilise SOAR (Security Orchestration Automation and Response) to perform actionable insights and interaction with another component in the network
  • 16. Use Case: Vulnerability Management System Define vision for the team. Evaluate budgetary / resource concerns First line of monitoring. Eys-on-Glass monitoring. Basic analysis, following SOPs / playbooks Actively look for loop holes in network / system / configuration Actively looking for threat information and correlate it with assets belong to the organisation Look deeper in to security incidents. Assist in investigating cyber crimes Remediate security incidents ASAP based on analysis performed by security analyst Actively dive-in to SIEM data to look for suspicipous activities especially unknown threat / zeroday Configure, fine- tune and maintain SIEM solution Second line of monitoring. Having more experienced on security analysis Coordinate with all team members. Define and document process. Run the operations
  • 17. Solution: Bigdata and AI Next-Gen SOC pushes forward the limits of a tri-dimensional paradigm. It needs to increase the detection surface and decision velocity, decrease reaction time by utilising bigdata analytics combined with AI technology “Potensi serangan DDoS terhadap website IDNIC (Indonesia Network Information Center) dengan URL https://www.idnic.id (203.119.13.145) pada tanggal 29 November 2018”.
  • 18. Analytics in Next-Gen Security Operation Center Next-Gen SOC preventing breaches from happening, by leveraging big data and supercomputing capabilities
  • 19. Summary • No, Next-Gen SOC doesn’t intend to replace Human with Machine • Rarity of Human in IT Security forces us to be more creative within Industry 4.0 era • People role “improved” i.e Trainer for the Machine, Analysing only high classified unknown-complex threat, Data scientist, … • Convert your facility from Traditional to Next-Gen need proper plan: Map according to your organisation requirement, focus on what is the most pain point, improve them with machine
  • 20. END

Editor's Notes

  • #5: Cyber kill chain merupakan model yang dipopulerkan oleh lockheed martin dan menunjukan bagaimana fase real targeted cyber attack terjadi. Apabila satu dari fase tersebut terputus maka targeted attack dapat digagalkan. Ini adalah salah satu objektivitas kebutuhan SOC.
  • #6: Berikan story kenapa suatu organisasi butuh SOC. Ceritakan sedikit mengenai konsep cyber killchain lockheed martin.