Building a Superstar SOC with Automation and Standardization

When you have a team of security analysts that have a wide range of expertise, knowledge, and experience, it is natural to see the difference in the quality of work performed. One of the biggest challenges that security operation managers face when auditing the work performed is that some team members may execute different steps at different levels of rigor when investigating and remediating threats. This may have a negative impact on the organization’s overall security posture as some alerts may not be correctly or sufficiently investigated. Security teams also need to better equip junior members with the right resources so that they can add value to the team quickly.

The Importance of Standardization in Security

If you ask any SOC manager, “What does a superstar SOC look like to you?”, they may respond with some of the following:

There is no right formula to building a superstar SOC, but a proven strategy for helping analysts work more efficiently and effectively is to lay down the groundwork for creating standardized security procedures (SSPs). Standardized security procedures are a set of written, step-by-step instructions that catalog how every team member should perform routine operations. These procedures are straightforward, easy to follow, and iterative. Security teams may see a variety of benefits with putting SSPs in place (as detailed in the graphic below).

Augmenting Standardized Processes with Automation

Once there are SSPs in place for one or two common threats, and your security team feels confident that these procedures will sufficiently cover all the necessary steps to ensure thorough investigation and remediation, your SOC is ready to add automation and orchestration to the workflow.

Imagine you have a ten step procedure that you must follow to investigate and remediate a malware. Let’s say hypothetically that steps one through eight could be automated and the last two steps involve human decision making. The value of automation in this hypothetical scenario is that the analyst no longer has to manually perform all ten steps. Instead, they are only prompted to review the automated work and then manually perform two steps to close out the incident. This saves the analyst and the SOC more time to attend to more mission-critical tasks. Automation can be added to supplement any of the steps within the standardized process to reduce the mean time to respond.

Want to build a superstar SOC that is high performing, efficient, and effective? Learn how to create standard security procedures and automate mundane repetitive tasks through our e-book, "The Essential Guide to Foundational Security Procedures."

----------------------------------------------------
Thanks!
Kelly Huang

Related Articles

Security Advisories for Splunk 9.0
Security
4 Minute Read

Security Advisories for Splunk 9.0

On June 14, 2022 Splunk published eight Security Advisories regarding vulnerabilities related to Splunk Enterprise and Splunk Cloud Platform. To help you leverage the available resources we’ve gathered a number of resources in this post.
| datamodel Endpoint
Security
4 Minute Read

| datamodel Endpoint

Discover what's new in Splunk Common Information Model (CIM) 4.12
Building Large-Scale User Behavior Analytics: Data Validation and Model Monitoring
Security
6 Minute Read

Building Large-Scale User Behavior Analytics: Data Validation and Model Monitoring

Splunk's Cui Lin explores fundamental techniques to validate data volume and monitor models to understand the size of your own UBA clusters.