<!--[if gte mso 9]><xml> </xml><![endif]--> <p style="margin:0px;">Introduction xx</p> <p style="margin:0px;">Part I SOC Basics</p> <p style="margin:0px;">Chapter 1 Introduction to Security Operations and the SOC 1</p> <p style="margin:0px;">Cybersecurity Challenges 1</p> <p style="margin:0px;"> Threat Landscape 4</p> <p style="margin:0px;"> Business Challenges 7</p> <p style="margin:0px;"> The Cloud 8</p> <p style="margin:0px;"> Compliance 9</p> <p style="margin:0px;"> Privacy and Data Protection 9</p> <p style="margin:0px;">Introduction to Information Assurance 10</p> <p style="margin:0px;">Introduction to Risk Management 11</p> <p style="margin:0px;">Information Security Incident Response 14</p> <p style="margin:0px;"> Incident Detection 15</p> <p style="margin:0px;"> Incident Triage 16</p> <p style="margin:0px;"> Incident Categories 17</p> <p style="margin:0px;"> Incident Severity 17</p> <p style="margin:0px;"> Incident Resolution 18</p> <p style="margin:0px;"> Incident Closure 19</p> <p style="margin:0px;"> Post-Incident 20</p> <p style="margin:0px;">SOC Generations 21</p> <p style="margin:0px;"> First-Generation SOC 22</p> <p style="margin:0px;"> Second-Generation SOC 22</p> <p style="margin:0px;"> Third-Generation SOC 23</p> <p style="margin:0px;"> Fourth-Generation SOC 24</p> <p style="margin:0px;">Characteristics of an Effective SOC 24</p> <p style="margin:0px;">Introduction to Maturity Models 27</p> <p style="margin:0px;">Applying Maturity Models to SOC 29</p> <p style="margin:0px;">Phases of Building a SOC 31</p> <p style="margin:0px;">Challenges and Obstacles 32</p> <p style="margin:0px;">Summary 32</p> <p style="margin:0px;">References 33</p> <p style="margin:0px;">Chapter 2 Overview of SOC Technologies 35</p> <p style="margin:0px;">Data Collection and Analysis 35</p> <p style="margin:0px;"> Data Sources 37</p> <p style="margin:0px;"> Data Collection 38</p> <p style="margin:0px;"> The Syslog Protocol 39</p> <p style="margin:0px;"> Telemetry Data: Network Flows 45</p> <p style="margin:0px;"> Telemetry Data: Packet Capture 48</p> <p style="margin:0px;"> Parsing and Normalization 49</p> <p style="margin:0px;"> Security Analysis 52</p> <p style="margin:0px;"> Alternatives to Rule-Based Correlation 55</p> <p style="margin:0px;"> Data Enrichment 56</p> <p style="margin:0px;"> Big Data Platforms for Security 57</p> <p style="margin:0px;">Vulnerability Management 58</p> <p style="margin:0px;"> Vulnerability Announcements 60</p> <p style="margin:0px;">Threat Intelligence 62</p> <p style="margin:0px;">Compliance 64</p> <p style="margin:0px;">Ticketing and Case Management 64</p> <p style="margin:0px;">Collaboration 65</p> <p style="margin:0px;">SOC Conceptual Architecture 66</p> <p style="margin:0px;">Summary 67</p> <p style="margin:0px;">References 67</p> <p style="margin:0px;">Part II: The Plan Phase</p> <p style="margin:0px;">Chapter 3 Assessing Security Operations Capabilities 69</p> <p style="margin:0px;">Assessment Methodology 69</p> <p style="margin:0px;"> Step 1: Identify Business and IT Goals 71</p> <p style="margin:0px;"> Step 2: Assessing Capabilities 73</p> <p style="margin:0px;"> Assessing IT Processes 75</p> <p style="margin:0px;"> Step 3: Collect Information 82</p> <p style="margin:0px;"> Step 4: Analyze Maturity Levels 84</p> <p style="margin:0px;"> Step 5: Formalize Findings 87</p> <p style="margin:0px;"> The Organization’s Vision and Strategy 87</p> <p style="margin:0px;"> The Department’s Vision and Strategy 87</p> <p style="margin:0px;"> External and Internal Compliance Requirements 87</p> <p style="margin:0px;"> Organization’s Threat Landscape 88</p> <p style="margin:0px;"> History of Previous Information Security Incidents 88</p> <p style="margin:0px;"> SOC Sponsorship 89</p> <p style="margin:0px;"> Allocated Budget 89</p> <p style="margin:0px;"> Presenting Data 89</p> <p style="margin:0px;"> Closing 90</p> <p style="margin:0px;">Summary 90</p> <p style="margin:0px;">References 90</p> <p style="margin:0px;">Chapter 4 SOC Strategy 91</p> <p style="margin:0px;">Strategy Elements 91</p> <p style="margin:0px;"> Who Is Involved? 92</p> <p style="margin:0px;"> SOC Mission 92</p> <p style="margin:0px;"> SOC Scope 93</p> <p style="margin:0px;"> Example 1: A Military Organization 94</p> <p style="margin:0px;"> Mission Statement 94</p> <p style="margin:0px;"> SOC Scope Statement 95</p> <p style="margin:0px;"> Example 2: A Financial Organization 95</p> <p style="margin:0px;"> Mission Statement 95</p> <p style="margin:0px;"> SOC Scope Statement 95</p> <p style="margin:0px;">SOC Model of Operation 95</p> <p style="margin:0px;"> In-House and Virtual SOC 96</p> <p style="margin:0px;">SOC Services 98</p> <p style="margin:0px;">SOC Capabilities Roadmap 99</p> <p style="margin:0px;">Summary 101</p> <p style="margin:0px;">Part III: The Design Phase</p> <p style="margin:0px;">Chapter 5 The SOC Infrastructure 103</p> <p style="margin:0px;">Design Considerations 103</p> <p style="margin:0px;">Model of Operation 104</p> <p style="margin:0px;">Facilities 105</p> <p style="margin:0px;"> SOC Internal Layout 106</p> <p style="margin:0px;"> Lighting 107</p> <p style="margin:0px;"> Acoustics 107</p> <p style="margin:0px;"> Physical Security 108</p> <p style="margin:0px;"> Video Wall 108</p> <p style="margin:0px;"> SOC Analyst Services 109</p> <p style="margin:0px;">Active Infrastructure 110</p> <p style="margin:0px;"> Network 111</p> <p style="margin:0px;"> Access to Systems 112</p> <p style="margin:0px;"> Security 112</p> <p style="margin:0px;"> Compute 115</p> <p style="margin:0px;"> Dedicated Versus Virtualized Environment 116</p> <p style="margin:0px;"> Choice of Operating Systems 118</p> <p style="margin:0px;"> Storage 118</p> <p style="margin:0px;"> Capacity Planning 119</p> <p style="margin:0px;"> Collaboration 119</p> <p style="margin:0px;"> Ticketing 120</p> <p style="margin:0px;">Summary 120</p> <p style="margin:0px;">References 120</p> <p style="margin:0px;">Chapter 6 Security Event Generation and Collection 123</p> <p style="margin:0px;">Data Collection 123</p> <p style="margin:0px;"> Calculating EPS 124</p> <p style="margin:0px;"> Ubuntu Syslog Server 124</p> <p style="margin:0px;"> Network Time Protocol 129</p> <p style="margin:0px;"> Deploying NTP 130</p> <p style="margin:0px;"> Data-Collection Tools 134</p> <p style="margin:0px;"> Company 135</p> <p style="margin:0px;"> Product Options and Architecture 136</p> <p style="margin:0px;"> Installation and Maintenance 136</p> <p style="margin:0px;"> User Interface and Experience 136</p> <p style="margin:0px;"> Compliance Requirements 137</p> <p style="margin:0px;"> Firewalls 137</p> <p style="margin:0px;"> Stateless/Stateful Firewalls 137</p> <p style="margin:0px;"> Cisco Adaptive Security Appliance ASA 138</p> <p style="margin:0px;"> Application Firewalls 142</p> <p style="margin:0px;"> Cisco FirePOWER Services 142</p> <p style="margin:0px;">Cloud Security 152</p> <p style="margin:0px;"> Cisco Meraki 153</p> <p style="margin:0px;"> Exporting Logs from Meraki 154</p> <p style="margin:0px;"> Virtual Firewalls 155</p> <p style="margin:0px;"> Cisco Virtual Firewalls 156</p> <p style="margin:0px;"> Host Firewalls 157</p> <p style="margin:0px;">Intrusion Detection and Prevention Systems 157</p> <p style="margin:0px;"> Cisco FirePOWER IPS 160</p> <p style="margin:0px;"> Meraki IPS 161</p> <p style="margin:0px;"> Snort 162</p> <p style="margin:0px;"> Host-Based Intrusion Prevention 162</p> <p style="margin:0px;">Routers and Switches 163</p> <p style="margin:0px;">Host Systems 166</p> <p style="margin:0px;">Mobile Devices 167</p> <p style="margin:0px;">Breach Detection 168</p> <p style="margin:0px;"> Cisco Advanced Malware Prevention 168</p> <p style="margin:0px;"> Web Proxies 169</p> <p style="margin:0px;"> Cisco Web Security Appliance 170</p> <p style="margin:0px;"> Cloud Proxies 172</p> <p style="margin:0px;"> Cisco Cloud Web Security 172</p> <p style="margin:0px;">DNS Servers 173</p> <p style="margin:0px;"> Exporting DNS 174</p> <p style="margin:0px;">Network Telemetry with Network Flow Monitoring 174</p> <p style="margin:0px;"> NetFlow Tools 175</p> <p style="margin:0px;"> StealthWatch 177</p> <p style="margin:0px;"> Exporting Data from StealthWatch 179</p> <p style="margin:0px;"> NetFlow from Routers and Switches 182</p> <p style="margin:0px;"> NetFlow from Security Products 184</p> <p style="margin:0px;"> NetFlow in the Data Center 186</p> <p style="margin:0px;">Summary 187</p> <p style="margin:0px;">References 188</p> <p style="margin:0px;">Chapter 7 Vulnerability Management 189</p> <p style="margin:0px;">Identifying Vulnerabilities 190</p> <p style="margin:0px;">Security Services 191</p> <p style="margin:0px;">Vulnerability Tools 193</p> <p style="margin:0px;">Handling Vulnerabilities 195</p> <p style="margin:0px;"> OWASP Risk Rating Methodology 197</p> <p style="margin:0px;"> Threat Agent Factors 198</p> <p style="margin:0px;"> Vulnerability Factors 198</p> <p style="margin:0px;"> Technical Impact Factors 200</p> <p style="margin:0px;"> Business Impact Factors 200</p> <p style="margin:0px;"> The Vulnerability Management Lifecycle 202</p> <p style="margin:0px;">Automating Vulnerability Management 205</p> <p style="margin:0px;"> Inventory Assessment Tools 205</p> <p style="margin:0px;"> Information Management Tools 206</p> <p style="margin:0px;"> Risk-Assessment Tools 206</p> <p style="margin:0px;"> Vulnerability-Assessment Tools 206</p> <p style="margin:0px;"> Report and Remediate Tools 206</p> <p style="margin:0px;"> Responding Tools 207</p> <p style="margin:0px;">Threat Intelligence 208</p> <p style="margin:0px;"> Attack Signatures 209</p> <p style="margin:0px;"> Threat Feeds 210</p> <p style="margin:0px;"> Other Threat Intelligence Sources 211</p> <p style="margin:0px;">Summary 213</p> <p style="margin:0px;">References 214</p> <p style="margin:0px;">Chapter 8 People and Processes 215</p> <p style="margin:0px;">Key Challenges 215</p> <p style="margin:0px;"> Wanted: Rock Stars, Leaders, and Grunts 216</p> <p style="margin:0px;"> The Weight of Process 216</p> <p style="margin:0px;"> The Upper and Lower Bounds of Technology 217</p> <p style="margin:0px;">Designing and Building the SOC Team 218</p> <p style="margin:0px;"> Starting with the Mission 218</p> <p style="margin:0px;"> Focusing on Services 219</p> <p style="margin:0px;"> Security Monitoring Service Example 220</p> <p style="margin:0px;"> Determining the Required SOC Roles 223</p> <p style="margin:0px;"> Leadership Roles 224</p> <p style="margin:0px;"> Analyst Roles 224</p> <p style="margin:0px;"> Engineering Roles 224</p> <p style="margin:0px;"> Operations Roles 224</p> <p style="margin:0px;"> Other Support Roles 224</p> <p style="margin:0px;"> Working with HR 225</p> <p style="margin:0px;"> Job Role Analysis 225</p> <p style="margin:0px;"> Market Analysis 225</p> <p style="margin:0px;"> Organizational Structure 226</p> <p style="margin:0px;"> Calculating Team Numbers 227</p> <p style="margin:0px;"> Deciding on Your Resourcing Strategy 228</p> <p style="margin:0px;"> Building Your Own: The Art of Recruiting SOC Personnel 229</p> <p style="margin:0px;"> Working with Contractors and Service Bureaus 229</p> <p style="margin:0px;"> Working with Outsourcing and Managed Service Providers 230</p> <p style="margin:0px;">Working with Processes and Procedures 231</p> <p style="margin:0px;"> Processes Versus Procedures 231</p> <p style="margin:0px;"> Working with Enterprise Service Management Processes 232</p> <p style="margin:0px;"> Event Management 232</p> <p style="margin:0px;"> Incident Management 233</p> <p style="margin:0px;"> Problem Management 233</p> <p style="margin:0px;"> Vulnerability Management 233</p> <p style="margin:0px;"> Other IT Management Processes 233</p> <p style="margin:0px;"> The Positives and Perils of Process 234</p> <p style="margin:0px;"> Examples of SOC Processes and Procedures 236</p> <p style="margin:0px;"> Security Service Management 236</p> <p style="margin:0px;"> Security Service Engineering 237</p> <p style="margin:0px;"> Security Service Operations 238</p> <p style="margin:0px;"> Security Monitoring 239</p> <p style="margin:0px;"> Security Incident Investigation and Response 239</p> <p style="margin:0px;"> Security Log Management 240</p> <p style="margin:0px;"> Security Vulnerability Management 241</p> <p style="margin:0px;"> Security Intelligence 241</p> <p style="margin:0px;"> Security Analytics and Reporting 242</p> <p style="margin:0px;"> Breach Discovery and Remediation 242</p> <p style="margin:0px;">Summary 243</p> <p style="margin:0px;">Part IV: The Build Phase</p> <p style="margin:0px;">Chapter 9 The Technology 245</p> <p style="margin:0px;">In-House Versus Virtual SOC 245</p> <p style="margin:0px;">Network 246</p> <p style="margin:0px;"> Segmentation 247</p> <p style="margin:0px;"> VPN 251</p> <p style="margin:0px;"> High Availability 253</p> <p style="margin:0px;"> Support Contracts 254</p> <p style="margin:0px;">Security 255</p> <p style="margin:0px;"> Network Access Control 255</p> <p style="margin:0px;"> Authentication 257</p> <p style="margin:0px;"> On-Network Security 258</p> <p style="margin:0px;"> Encryption 259</p> <p style="margin:0px;">Systems 260</p> <p style="margin:0px;"> Operating Systems 261</p> <p style="margin:0px;"> Hardening Endpoints 262</p> <p style="margin:0px;"> Endpoint Breach Detection 263</p> <p style="margin:0px;"> Mobile Devices 264</p> <p style="margin:0px;"> Servers 264</p> <p style="margin:0px;">Storage 265</p> <p style="margin:0px;"> Data-Loss Protection 266</p> <p style="margin:0px;"> Cloud Storage 270</p> <p style="margin:0px;">Collaboration 271</p> <p style="margin:0px;"> Collaboration for Pandemic Events 272</p> <p style="margin:0px;">Technologies to Consider During SOC Design 273</p> <p style="margin:0px;"> Firewalls 273</p> <p style="margin:0px;"> Firewall Modes 273</p> <p style="margin:0px;"> Firewall Clustering 276</p> <p style="margin:0px;"> Firewall High Availability 276</p> <p style="margin:0px;"> Firewall Architecture 277</p> <p style="margin:0px;"> Routers and Switches 279</p> <p style="margin:0px;"> Securing Network Devices 280</p> <p style="margin:0px;"> Hardening Network Devices 280</p> <p style="margin:0px;"> Network Access Control 281</p> <p style="margin:0px;"> Deploying NAC 282</p> <p style="margin:0px;"> NAC Posture 284</p> <p style="margin:0px;"> Architecting NAC 285</p> <p style="margin:0px;"> Web Proxies 290</p> <p style="margin:0px;"> Reputation Security 290</p> <p style="margin:0px;"> Proxy Architecture 292</p> <p style="margin:0px;"> Intrusion Detection/Prevention 295</p> <p style="margin:0px;"> IDS IPS Architecture 295</p> <p style="margin:0px;"> Evaluating IDS IPS Technology 296</p> <p style="margin:0px;"> Tuning IDS/IPS 298</p> <p style="margin:0px;">Breach Detection 300</p> <p style="margin:0px;"> Honeypots 301</p> <p style="margin:0px;"> Sandboxes 302</p> <p style="margin:0px;"> Endpoint Breach Detection 303</p> <p style="margin:0px;"> Network Telemetry 306</p> <p style="margin:0px;"> Enabling NetFlow 308</p> <p style="margin:0px;"> Architecting Network Telemetry Solutions 310</p> <p style="margin:0px;"> Network Forensics 312</p> <p style="margin:0px;"> Digital Forensics Tools 313</p> <p style="margin:0px;">Final SOC Architecture 314</p> <p style="margin:0px;">Summary 317</p> <p style="margin:0px;">References 318</p> <p style="margin:0px;">Chapter 10 Preparing to Operate 319</p> <p style="margin:0px;">Key Challenges 319</p> <p style="margin:0px;"> People Challenges 319</p> <p style="margin:0px;"> Process Challenges 320</p> <p style="margin:0px;"> Technology Challenges 321</p> <p style="margin:0px;">Managing Challenges Through a Well-Managed Transition 321</p> <p style="margin:0px;"> Elements of an Effective Service Transition Plan 322</p> <p style="margin:0px;"> Determining Success Criteria and Managing to Success 322</p> <p style="margin:0px;"> Deploying Against Attainable Service Levels 323</p> <p style="margin:0px;"> Focusing on Defined Use Cases 325</p> <p style="margin:0px;"> Managing Project Resources Effectively 328</p> <p style="margin:0px;"> Marching to Clear and Attainable Requirements 329</p> <p style="margin:0px;"> Staffing Requirements for Go-Live 329</p> <p style="margin:0px;"> Process Requirements for Go-Live 330</p> <p style="margin:0px;"> Technology Requirements for Go-Live 331</p> <p style="margin:0px;"> Using Simple Checks to Verify That the SOC Is Ready 332</p> <p style="margin:0px;"> People Checks 332</p> <p style="margin:0px;"> Process Checks 336</p> <p style="margin:0px;"> Technology Checks 340</p> <p style="margin:0px;">Summary 346</p> <p style="margin:0px;">Part V: The Operate Phase</p> <p style="margin:0px;">Chapter 11 Reacting to Events and Incidents 347</p> <p style="margin:0px;">A Word About Events 348</p> <p style="margin:0px;">Event Intake, Enrichment, Monitoring, and Handling 348</p> <p style="margin:0px;"> Events in the SIEM 349</p> <p style="margin:0px;"> Events in the Security Log Management Solution 350</p> <p style="margin:0px;"> Events in Their Original Habitats 350</p> <p style="margin:0px;"> Events Through Communications and Collaboration Platforms 350</p> <p style="margin:0px;"> Working with Events: The Malware Scenario 351</p> <p style="margin:0px;"> Handling and Investigating the Incident Report 353</p> <p style="margin:0px;"> Creating and Managing Cases 354</p> <p style="margin:0px;"> Working as a Team 355</p> <p style="margin:0px;"> Working with Other Parts of the Organization 357</p> <p style="margin:0px;"> Working with Third Parties 359</p> <p style="margin:0px;">Closing and Reporting on the Case 362</p> <p style="margin:0px;">Summary 363</p> <p style="margin:0px;">Chapter 12 Maintain, Review, and Improve 365</p> <p style="margin:0px;">Reviewing and Assessing the SOC 366</p> <p style="margin:0px;"> Determining Scope 366</p> <p style="margin:0px;"> Examining the Services 367</p> <p style="margin:0px;"> Personnel/Staffing 369</p> <p style="margin:0px;"> Processes, Procedures, and Other Operational Documentation 371</p> <p style="margin:0px;"> Technology 372</p> <p style="margin:0px;"> Scheduled and Ad Hoc Reviews 373</p> <p style="margin:0px;"> Internal Versus External Assessments 374</p> <p style="margin:0px;"> Internal Assessments 374</p> <p style="margin:0px;"> External Assessments 374</p> <p style="margin:0px;"> Assessment Methodologies 375</p> <p style="margin:0px;"> Maturity Model Approaches 375</p> <p style="margin:0px;"> Services-Oriented Approaches 376</p> <p style="margin:0px;"> Post-Incident Reviews 378</p> <p style="margin:0px;">Maintaining and Improving the SOC 381</p> <p style="margin:0px;"> Maintaining and Improving Services 381</p> <p style="margin:0px;"> Maintain and Improving Your Team 383</p> <p style="margin:0px;"> Improving Staff Recruitment 383</p> <p style="margin:0px;"> Improving Team Training and Development 384</p> <p style="margin:0px;"> Improving Team Retention 386</p> <p style="margin:0px;"> Maintaining and Improving the SOC Technology Stack 387</p> <p style="margin:0px;"> Improving Threat, Anomaly, and Breach-Detection Systems 388</p> <p style="margin:0px;"> Improving Case and Investigation Management Systems 391</p> <p style="margin:0px;"> Improving Analytics and Reporting 392</p> <p style="margin:0px;"> Improving Technology Integration 392</p> <p style="margin:0px;"> Improving Security Testing and Simulation Systems 393</p> <p style="margin:0px;"> Improving Automated Remediation 394</p> <p style="margin:0px;">Conclusions 395</p> <p style="margin:0px;"> </p> <p style="margin:0px;"> </p> <p style="margin:0px;">9780134052014 TOC 10/12/2015</p> <!--[if gte mso 9]><xml> Normal 0 false false false EN-US X-NONE X-NONE </xml><![endif]--> <!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <![endif]--> <p style="margin:0px;"> </p>