{"id":111,"date":"2005-09-19T00:00:00","date_gmt":"2005-09-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/19\/build-your-own-security-operations-center\/"},"modified":"2021-12-30T11:36:32","modified_gmt":"2021-12-30T11:36:32","slug":"build-your-own-security-operations-center","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/19\/build-your-own-security-operations-center\/","title":{"rendered":"Build Your Own Security Operations Center"},"content":{"rendered":"<p>If you don&#8217;t have a dedicated security operations center and staff, you&#8217;ll be scrambling to shore up your defenses, even as the bad guys are invading your system.  A SOC can be as simple as a set of offices or cubicles next to each other, or as sophisticated as a standalone complex with extra-large displays, two-factor physical security and a budget to match.<br \/>\nIn a recent survey of Secure Enterprise readers, 72 percent of respondents with fewer than 5,000 employees had no plans to build a SOC.  Among the 28 percent who have a SOC or plan to build one, 53 percent will collocate in the network operations center, which makes sense because an existing NOC provides the framework to build in the additional functionality required for a SOC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The tasks the security operations center handles can range from typical event management and incident response to account administration, investigations and forensics.  Some companies choose to outsource their SOCs, because they want the expertise and 24-hour monitoring of a dedicated security team without staffing and building a SOC.  For many, it makes sense to maintain an internal SOC, especially when a NOC already exists.<\/p>\n<p>Building a separate infrastructure is expensive and probably not worth the effort.  In many cases, the data center is a good fit, because it already has manned guard stations, cameras, security clearance and sign-in\/sign out requirements and other physical security controls.  Common and successful approaches to this end include having highly restrictive firewall policies for the SOC and placing an IDS&#8211;or better yet, an IPS&#8211;with restrictive policies inline between the SOC and the rest of the company network.<\/p>\n<p>If remote access to the SOC is needed from within the company network, require a VPN connection.  An additional network connection will give your SOC personnel an outsider&#8217;s view of your network.  This link could be a T1 line or even an inexpensive DSL connection, preferably from an ISP other than the one providing your primary Internet connections.<\/p>\n<p>Undoubtedly, you&#8217;ll need a wireless network in the SOC so workers can roam between conference rooms and offices.  One possible solution is to have wireless users access the SOC network over a VPN requiring two-factor authentication.<\/p>\n<p>http:\/\/www.secureenterprisemag.com\/howtos\/showArticle.jhtml?articleID=166400611<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-111","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/111\/revisions"}],"predecessor-version":[{"id":2598,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/111\/revisions\/2598"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}