Security Operations Center (SOC)

A Security Operations Center (SOC) has different tasks for an organization, like threat hunting and incident response. A Security Operations Center has much more tasks to furfill and during this article we will explain in which area's Kappa Data can help SOC-teams or even help organisations that don't have a SOC-team availabile.

Ask for a demo
SOC center
On this page Kappa Data informs you in this article what a Security Operations Center do and how Kappa Data can help you  when you don't have a SOC-team available.

What does a Security Operations Center do?

Different functions of the security operations center (SOC) are to monitor, prevent, detect, investigate, and respond to cyber threats 24/7 during the year. 

This definition is quite brief, when you look at the different tasks what a SOC does on a daily basis. Let us clearify these tasks below :  

Establishing a SOC

Setting up a Security Operations Center costs a lot of effort and money, since you need not only advanced tools, but as well specialized personnel like Security Analysts, Security Engineers, SOC Manager and a Chief Information Security Office (CISO). More information can be found below. 

Incident Response

The Security Operations Center (SOC) is instrumental in the swift and efficient identification and management of security incidents. This critical function includes researching suspicious activities, probing potential threats, and executing necessary measures to contain and resolve the incident.

Regulatory Compliance

Organizations safeguard their operations by implementing external security standards and adhering to a comprehensive security policy. External benchmarks such as ISO 27001x, the General Data Protection Regulation (GDPR), and the NIS2 Cybersecurity Framework (CSF) play a vital role in this protection strategy. To ensure compliance with these crucial best practices and security standards, organizations rely on a Security Operations Center (SOC).

Management

The Security Operations Center (SOC) must collect, manage, and routinely examine logs of all network communications and activities throughout the entire organization. This data helps establish a standard for typical network behavior, reveal potential threats, and aid IT and security professionals in forensic analysis and remediation post-incident.

Many SOCs employ a Security Information and Event Management (SIEM) system to correlate and consolidate data feeds from firewalls, operating systems, endpoints, and applications, thus creating a centralized repository of security information.

Vulnerability Assessment

Vulnerability assessment tools scan your IT infrastructure for security issues and alert your SOC team whenever these problems are detected. Additionally, these tools ensure that your IT operations comply with data security requirements such as PCI DSS, SOX, and others.

Improving Security Processes

Security threats escalate over time if not promptly addressed. Thus, fortifying your security processes is essential. As a SOC manager, it’s crucial to understand how to evaluate and enhance the organization’s security measures. Here are some strategies to help you assess and improve processes effectively:

  • Conduct regular security assessments.
  • Review and update policies and procedures.
  • Integrate new technologies.

Automate Security Operations

Automate security data collection and analysis and other security operations center tasks to make your SOC faster and more efficient than ever before.

Remediation activities

A Security Operations Center (SOC) supervises the actions taken following an attack, ensuring that the organization effectively mitigates the threat and communicates with impacted parties. Merely issuing alerts and reviewing logs is insufficient for SOC teams. A fundamental aspect of incident response is aiding organizations in their recovery from an incident.

For example, recovery efforts may include removing ransomware or malware from affected systems, resetting passwords for compromised accounts, and wiping and reimaging infected endpoints.

SOC Manager

An SOC manager provides SOC team members with cybersecurity skills training. Also, the manager creates SOC processes and procedures, evaluates incident reports, develops and executes crisis communications plans, writes compliance reports, and performs security audits.

Threat Detection

SOC team members use threat hunting technologies to search for and address cyberthreats.

Intrusion Detection

An intrusion detection tool stops cybercriminals at their point of entry. It works with correlation rules built from your threat intelligence and notifies you about current and emerging threats.

Security Refinement

The SOC uses any intelligence gathered during an incident to address vulnerabilities, improve processes and policies, and update the security roadmap.

Continious Monitoring

By utilizing security analytics solutions such as Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), or Extended Detection and Response (XDR), SOC teams continuously monitor the entire environment—encompassing on-premises infrastructure, cloud services, applications, networks, and devices. This 24/7 surveillance aims to detect any anomalies or suspicious activities. These advanced tools collect telemetry data, consolidate the information, and in some instances, automate the incident response process.

Monitor and analyzing Logs

The Security Operations Center (SOC) employs tools to continuously scan the network, flagging any suspicious activities or anomalies. This 24/7 monitoring allows the SOC to receive notifications of emerging threats, enabling early-stage mitigation or prevention of attacks.

Monitoring tools may include Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) systems. Advanced tools utilize behavioral analysis to differentiate between routine operations and genuine threat behavior, reducing the amount of triage and analysis required by human operators.

Risk Management

Your SOC personnel track cyberthreats and communicate and collaborate with business stakeholders about them. They also produce security reports and can help you develop and execute a risk management strategy.

Threat Response

Upon identifying an incident, the SOC team acts as a first response point, undertaking actions such as isolating or shutting down infected endpoints, halting harmful processes, and removing malware. The primary objective is to mitigate the threat while ensuring minimal disruption to the organization’s operations.

Develop Incident Response Plan

A Security Operations Center (SOC) develops an incident response plan that guides the overall strategy. This process involves outlining the specific actions an organization should take during a cyber incident and identifying the key metrics that define a successful response.

Threat Intelligence

The Security Operations Center (SOC) leverages data analytics, external feeds, and product threat reports to gain insights into attacker behavior, infrastructure, and motives. This intelligence offers a comprehensive view of activities across the internet, helping teams understand how various threat groups operate. Armed with this information, the SOC can swiftly identify threats and bolster the organization against emerging risks.

Incident Management

Once an incident is identified, the SOC should adhere to a structured incident management process. This process includes several key elements:

  • Documentation: Collecting information to understand the scope and nature of the incident.
  • Corrective Action: Isolating or eliminating the risk to minimize the incident’s impact and prevent recurrence.
  • Investigation: Identifying the root cause of the incident to determine its source and implementing necessary controls to address security gaps.
  • Closure: Ensuring the incident is thoroughly documented and resolved, and updating relevant processes or controls to prevent future occurrences.

Alert Severity Ranking

Establish alert prioritization processes so your SOC team members will have no trouble determining which security alerts require immediate attention.

Data Monitoring Tools

SIEM tools are the backbone of SOC operations, aggregating and analyzing vast amounts of security data from various sources to detect and respond to threats. Popular SIEM tools include Splunk, IBM QRadar, and Elastic SIEM. These platforms offer advanced analytics, real-time monitoring, and customizable dashboards to streamline threat detection and incident response.

Proactive monitoring

This involves log file analysis. Logs may originate from endpoints (such as laptops, mobile phones, or IoT devices) or network resources like routers, firewalls, intrusion detection system (IDS) applications, and email appliances. Proactive monitoring, also known as threat monitoring, is a critical aspect of this process. SOC team members collaborate with various resources, including other IT personnel (like help desk technicians), as well as artificial intelligence (AI) tools and log files.

Root Cause Investigation

To prevent a recurrence of a similar attack, the SOC conducts an exhaustive investigation to identify vulnerabilities, inadequate security processes, and other factors that contributed to the incident.

Track and Report

Create key performance indicators (KPIs) to track your SOC’s performance. Use these KPIs to produce SOC performance reports so you can continuously look for ways to improve your security operations center.

Security Operations Center Team Roles and Responsibilities

Security Analyst

An SOC security analyst is usually the first person to respond to a cyberattack. The analyst verifies that SOC processes and procedures are implemented properly and keeps business stakeholders up to date on the SOC team’s incident response and remediation efforts.

Security Engineer

SOC security engineers work with developers to make sure that cybersecurity is integrated into a company’s IT systems, monitor the business’ security posture, and respond to cyberattacks.

SOC Manager

An SOC manager provides SOC team members with cybersecurity skills training. Also, the manager creates SOC processes and procedures, evaluates incident reports, develops and executes crisis communications plans, writes compliance reports, and performs security audits.

Chief Information Security Officer (CISO)

A CISO has the final say on a company’s cybersecurity policies and strategies and works with other SOC team members to address security issues.

Why do you need a Security Operations Center?

NIS2 Compliancy

For every mid-size company from 10 million Euro turnover on a yearly basis or delivery essential services, these companies are expected to be able to respond to incidents. 

Incident Response

Your SOC team looks for signs of a cyberattack, investigates malicious activities, and stops attacks.

Security Visibility

Your SOC monitors your IT infrastructure and addresses security incidents in near real time.

Risk Management

Your SOC personnel track cyberthreats and communicate and collaborate with business stakeholders about them. They also produce security reports and can help you develop and execute a risk management strategy.

Security Operations Center challenges you must know

Staffing

SOC teams are often understaffed or lack adequate skills and training. These issues make it difficult for SOC teams to keep pace with security alerts and incidents. They also prevent SOCs from running at peak levels.

Alert Fatigue

SOCs can use dozens of cybersecurity tools — but these tools don’t necessarily allow SOC team members to distinguish critical alerts from non-critical ones. SOC team members can also receive dozens of security alerts at once. In either of these scenarios, SOC team members risk missing critical security alerts.

Overhead Costs

An SOC requires cybersecurity professionals on hand to identify and remediate security issues around the clock and keep  up-to-date security tools in place. However, meeting both of these requirements can be expensive.

When considering have multiple Security Analysts, Security Engineers, backups for a SOC manager and a CISO, because everybody deserves to have holiday, you would need a team of at least 10 to 15 cyberspecialists. These people need to be paid and let’s consider a cost of 100.000 euro per year, the salary costs will be at least above 1 million euro per year. 

What is interesting to look at for example on ChatGPT, is the calculation of the cost. This was the prompt that was used as a description : 

“You are an IT partner and you consider to build a Security Operations Center. Give an overview what the expected costs are for salaries in euro for the recommended number of Security analysts, engineers, CISO’s and on the other hand for the tools that a SOC needs. Make as well a distinction in costs for organizations that offer these services towards 100 customers – 500 customers and 1000 customers”

Result : 

 Overview of Expected Costs for Building a Security Operations Center (SOC)

Salaries

Security Analysts

Junior Analyst: €40,000 – €60,000 per year

Mid-level Analyst: €60,000 – €80,000 per year

Senior Analyst: €80,000 – €100,000+ per year

 

Security Engineers

Junior Engineer: €50,000 – €70,000 per year

Mid-level Engineer: €70,000 – €90,000 per year

Senior Engineer: €90,000 – €120,000+ per year

 

Chief Information Security Officer (CISO)

CISO: €120,000 – €200,000+ per year

 

Recommended Staffing Levels Based on Number of Customers

100 Customers

Security Analysts: 5 (1 Senior, 2 Mid-level, 2 Junior)

Security Engineers: 3 (1 Senior, 1 Mid-level, 1 Junior)

CISO: 1

500 Customers

Security Analysts: 15 (3 Senior, 6 Mid-level, 6 Junior)

Security Engineers: 10 (2 Senior, 4 Mid-level, 4 Junior)

CISO: 1-2

 

1000 Customers

Security Analysts: 30 (6 Senior, 12 Mid-level, 12 Junior)

Security Engineers: 20 (4 Senior, 8 Mid-level, 8 Junior)

CISO: 2-3

Salary Cost Estimates

100 Customers:

Security Analysts: €340,000 – €500,000 per year

Security Engineers: €210,000 – €330,000 per year

CISO: €120,000 – €200,000 per year

Total: €670,000 – €1,030,000 per year

 

500 Customers:

Security Analysts: €1,020,000 – €1,500,000 per year

Security Engineers: €700,000 – €1,100,000 per year

CISO: €120,000 – €400,000 per year

Total: €1,840,000 – €3,000,000 per year

 

1000 Customers:

Security Analysts: €2,040,000 – €3,000,000 per year

Security Engineers: €1,400,000 – €2,200,000 per year

CISO: €240,000 – €600,000 per year

Total: €3,680,000 – €5,800,000 per year

Tools and Technologies Costs

 

Security Information and Event Management (SIEM)

€50,000 – €100,000+ per year depending on the size and scope

 

Extended Detection and Response (XDR)

€50 – €70 per endpoint per year

 

Network Traffic Analysis (NTA)

€25,000 – €75,000 per year

 

Vulnerability Management Tools

€10,000 – €30,000 per year

 

Threat Intelligence Feeds

€10,000 – €50,000 per year

 

Incident Response Tools

€10,000 – €50,000 per year

 

Additional Costs (e.g., Cloud Security, Training, Certifications)

€50,000 – €150,000 per year

 

Tools Cost Estimates

100 Customers:

Tools and Technologies: €175,000 – €455,000 per year

500 Customers:

Tools and Technologies: €300,000 – €750,000 per year

1000 Customers:

Tools and Technologies: €500,000 – €1,200,000 per year

 

Summary of Total Costs

100 Customers:

Total Salaries: €670,000 – €1,030,000 per year

Total Tools: €175,000 – €455,000 per year

Grand Total: €845,000 – €1,485,000 per year

 

500 Customers:

Total Salaries: €1,840,000 – €3,000,000 per year

Total Tools: €300,000 – €750,000 per year

Grand Total: €2,140,000 – €3,750,000 per year

 

1000 Customers:

Total Salaries: €3,680,000 – €5,800,000 per year

Total Tools: €500,000 – €1,200,000 per year

Grand Total: €4,180,000 – €7,000,000 per year

 

 

When Incident Response is required, so is a Security Operations Center

When your organisation needs to be NIS2 compliant, a Detection – Response and Recovery policy for protection of your services and your company is required.  

When you have already a security team in place, 24x7x365, then Kappa Data can certainly help you with innovative and premium solutions for your SOC. Probably, you will be already have ISO27001 certification or you are already busy with updating the organisation for NIS2. 

What do you do when you don’t have the capital for building a Security Operations Center?  

SOC-As-A-Service

Kappa Data uses as well a Security Operations Center from a supplier that monitors our network 24x7x365. This Security operations center delivers endpoint security, firewalls, but as well integrations towards external systems like Cloud environment, Identity providers, other firewall brands, backup systems and much more. 

This SOC pulls a feed off metadata out of every system and feeds its own datalake with this information. With machine learning and AI tools this information will be categorized and organized in their own alert system and false positives and alerts will be handled by the Security Analysts of the supplier. 

This supplier has a Security operations team of more then 600 people worldwide and they are fast in their response towards incidents and alerts. We already experienced incidents where response times where measured of less then 1 hour till remediation. 

Kappa Data’s profile can be compared with many organizations in the Benelux region and we have had to make the same as other companies. Do we build our own Security Operations Center or shall we outsource this? 

We have made the choice to buy service licenses for this service. Kappa Data resells as well these services towards IT partners who resell from their side towards end-customers, with or without extra services on a monthly basis or a yearly basis. Their license system is quite flexible and can be adapted towards any business case. 

Let us know if you wish to learn more about these services. 

Frequently asked questions

Check here our questions and answers for organizing a Security Operations Center and why you should use it for preventing cyber incidents. When you wish to know more about Managed Services thay we offer, don't hesitate to contact us.

Contact us
  • How can a SOC help organizations comply with the NIS2 directives?

    A SOC can help organizations comply with the NIS 2 directives by:

    • Monitoring and detection: Providing continuous monitoring to detect and respond to security incidents in real-time.
    • Incident response: Implementing effective incident response procedures to mitigate the impact of security breaches.
    • Reporting: Ensuring timely and accurate reporting of significant incidents to the relevant authorities.
    • Threat intelligence: Keeping the organization informed about emerging threats and vulnerabilities.
    • Security audits: Conducting regular security audits and assessments to ensure compliance with NIS 2 requirements.
  • How does a SOC enhance incident response capabilities?

    A SOC enhances incident response capabilities by providing a structured and coordinated approach to detecting, analyzing, and responding to security incidents. The SOC team uses advanced tools and technologies to quickly identify threats, contain incidents, and mitigate their impact, ensuring that the organization can recover swiftly and effectively from security breaches.

  • How does a SOC improve an organization’s cybersecurity?

    A SOC improves an organization’s cybersecurity by providing continuous, real-time monitoring and rapid response to threats, which helps in minimizing the impact of security incidents. It also enhances the overall security posture by proactively identifying vulnerabilities and keeping the organization informed about emerging threats.

  • What are the benefits of having a SOC for regulatory compliance?

    The benefits of having a SOC for regulatory compliance include:

    • Proactive threat management: Continuously identifying and mitigating threats to ensure compliance with security regulations.
    • Timely incident reporting: Ensuring that significant security incidents are reported to the relevant authorities within the required timeframe.
    • Detailed documentation: Maintaining comprehensive records of security activities and incidents to demonstrate compliance during audits.
    • Improved risk management: Enhancing the organization’s ability to manage and reduce cybersecurity risks.
  • What are the primary functions of a SOC?

    The primary functions of a SOC include:

    • Continuous monitoring: Keeping an eye on network traffic, endpoints, and other systems for signs of suspicious activity.
    • Incident detection and response: Identifying and addressing security incidents in real-time.
    • Threat intelligence: Gathering and analyzing information about emerging threats to improve security posture.
    • Vulnerability management: Identifying and mitigating vulnerabilities in the organization’s systems.
    • Compliance and reporting: Ensuring adherence to regulatory requirements and generating reports on security activities and incidents.
  • What is a Security Operations Center (SOC)?

    A Security Operations Center (SOC) is a centralized facility that houses an information security team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents. The SOC team works around the clock to ensure the security and integrity of an organization’s information systems.

  • What role does threat intelligence play in a SOC’s operations?

    Threat intelligence plays a critical role in a SOC’s operations by providing actionable insights into emerging threats and vulnerabilities. By analyzing threat data from various sources, the SOC team can anticipate potential attacks, implement preventive measures, and respond more effectively to security incidents. This proactive approach helps in maintaining a robust security posture.

  • Why is it important for a SOC to be linked with the NIS2 directives?

    It is important for a SOC to be linked with the NIS 2 directives because the SOC plays a crucial role in ensuring compliance with these regulations. By continuously monitoring and responding to cybersecurity incidents, the SOC helps organizations meet the NIS 2 requirements for incident detection, response, and reporting, thereby enhancing the security of critical infrastructure and services.

  • Why should organizations invest in a SOC to align with the NIS2 directives?

    Organizations should invest in a SOC to align with the NIS2 directives because a SOC provides the necessary infrastructure and expertise to meet the stringent security requirements of the directives. By ensuring continuous monitoring, rapid incident response, and compliance with reporting obligations, a SOC helps organizations protect critical infrastructure and essential services, thereby reducing the risk of significant disruptions and enhancing overall cybersecurity resilience.

Contact us for a demo

Are you curious to learn how Kappa Data can help you for having your own Security Operations Center (SOC), available for your organization, via a managed service? Contact us for more information via the below button. 

Request more information