What is a Security Operations Center
A Security Operations Center (SOC) is a service that helps protect a company’s IT infrastructure by detecting attacks before attackers have time to cause damage. Its main task is to monitor and prevent cyber threats in real time.
Why is this important for business
Prevention of cyberattacks
Reduces the likelihood of successful attacks and minimizes associated risks
Maintaining business continuity
Ensures stable system operation and prevents downtime.
Compliance
Helps you comply with legislative and industry standards for data protection.
What’s included in the service
- Collection of event logs on infrastructure components
- Detection logic for identifying attacks
- Incident response time
- Incident and suspicious activity notification procedure
- Quality of information for incident response
- SOC client account
How SOC handles suspicious events
| Priority | Notification time | Notification method |
| Critical | No more than 30 minutes after a suspicious event is detected | 1. Personal account 2. Telegram chat message 3. Phone calls / email, etc. 4. SMS |
| High | No more than 40 minutes after detecting a suspicious event | |
| Medium | No more than 60 minutes after detecting a suspicious event | |
| Low | No more than 90 minutes after detection of a suspicious event |
Typical events analyzed
2 x 48 core
Starting/stopping services
and processes in the OS
Changing privileges
for an account
Attempts to reset/
change the password
Unsuccessful account logins
during working/non-working hours
Change of security event logging policies
Change of technical information security settings
Multiple failed authentication attempts
Clearing/deleting event logs
Disabling/changing the logging level
Logging out of the system
Changing account privileges
Running unauthorized scripts
Typical event sources
- Antivirus protection system against malicious software
- Systems for protection against unauthorized access
- IPS/IDS (Intrusion Detection/Prevention System)
- NGFW Next-Generation Firewall
- WAF (web application firewall)
- Other CPB
- Centralized management of virtual infrastructure
- Database management system (DBMS)
- Web server
- Backup and archiving system
- CRM (customer relationship management)
- IDM (identity and access management) / PAM (privileged access management)
- ERP (Enterprise Resource Planning)
Stages of implementation and operation
-
Establishing network connectivity between the Customer’s infrastructure and the SOC service
The customer’s network engineer is required for connection. The connection is made jointly with the SOC service team. 1 to 3 business days
-
Provision of SOC agent distribution
No specialists are required on the client’s side.
Within 24 hours
-
Installation of agents on the client’s IT infrastructure components
To install agents, the client needs a system administrator responsible for installing software on servers and workstations. 1 to 3 business days
-
Installation of a log collector
To install agents on the client’s side, a system administrator responsible for installing new IT infrastructure components is required. Depending on the type of component, an agentless connection to the SOC service is possible. With this connection method, a VM is installed in the client’s IT infrastructure. The log collector virtual machine image is provided by SOC service specialists. 1 to 3 business days
-
Configuring the transfer of security events from the client’s network equipment
A network engineer or system administrator is required to configure the transmission of security events from the client’s network equipment.
1 to 2 business days
-
Configuring advanced logging on all components of the customer’s IT infrastructure
The client will need system and network engineers. Configuration instructions are provided by SOC service specialists. 1 to 3 business days
-
Transfer, analysis, storage, and continuous monitoring of security events 24/7
After successful implementation, the service switches to continuous monitoring mode, in which specialists at various support levels analyze all suspicious security events. The client’s response is only required if suspicious events or security incidents are confirmed.
The service allows you to meet the requirements
- GOST R 57580.1-2017: measures MAS.1-MAS.8, MAS.10-MAS.23 (possible increase to the GOST rating — 0.06);
- Orders of the Federal Service for Technical and Export Control of Russia No. 21 and No. 17: requirements RSB.1-RSB.7, RSB.8 (17th order);
- Federal Law No. 187: Article 4. Principles for ensuring the security of critical information infrastructure, including GosSOPKA requirements;
- PCI DSS: requirements 10.1 (including subclauses), 10.2 (including subclauses), 10.3 (including subclauses), 10.5 (including subclauses), 10.6 (including subclauses), 10.7 (including subclauses), 10.8;
- Order of the Federal Technical and Export Control Service of Russia No. 239: AUD.4-AUD.9.
SOC service team
Service managers
Service Engineers
Service System Engineers
SIEM system specialists
First-level support analysts
Second-level support analysts
Technologies used
Personal service account
Centralized processing of information security events
EDR components
Prevention of malicious activity on endpoints: network-connected workstations, servers, Internet of Things devices, etc.
Threat Intelligence Components
Knowledge base of threats obtained through data analysis and interpretation.
Benefits of ITG Security
SOC team response time – no more than 10 minutes at any time of the day or night
Terms of service are known in advance and are not violated
Providing access to the SIEM system to view raw logs and dashboards
Development of non-standard correlation rules at the client’s request
At the end of each month, we provide a report that includes:
- A general list of events recorded during the reporting period
- A list of suspicious information security events that are not incidents
- Description of information security incidents identified during the reporting period
Additionally, the report may contain other information related to the results of the Service provision for the period.