The Unsung Heroes of Security Operations: Navigating the Complex Technology and Organisational Landscape

Shaun Vlassis
11 min readOct 31, 2023

--

Introduction

In the realm of cybersecurity, Security Operations Centers (SOCs) are the frontline defenders, responsible for safeguarding an organisation’s digital assets and responding to threats. However, their effectiveness is intricately tied to the unsung heroes working behind the scenes: the engineering, management, and product teams.

The engineering team builds the technological foundation, designing and maintaining critical systems and security tools. Management oversees the strategic direction, resource allocation, and governance, ensuring the SOC aligns with the organisation’s goals. The product teams continuously enhance and develop cybersecurity solutions, providing the SOC with cutting-edge tools.

These interdependent teams face challenges, such as resource constraints and communication gaps, but their collaborative efforts are paramount for maintaining a resilient cybersecurity posture. The expectations are high, as they must anticipate emerging threats and ensure the SOC remains well-equipped to protect the organisation’s digital landscape. Together, these unsung heroes are the cornerstone of cybersecurity, supporting the SOC’s mission and ensuring a strong defence against evolving threats.

In this article we will overview the challenges these critical teams face with the goal of showing just how hard it is to implement such controls.

The Backbone of Security Operations

1. Platform Engineering

Platform engineering serves as the fundamental underpinning of a Security Operations Center’s (SOC) effectiveness. Its role encompasses the management and maintenance of the platforms and infrastructure that SOC teams rely on to perform their critical duties. This includes tasks like optimising performance, testing and deploying software updates, and ensuring the seamless operation of essential tools such as Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), and Network Detection and Response (NDR) solutions. The challenges in platform engineering become particularly apparent when adapting off-the-shelf solutions for SOC use.

One of the key challenges specific to Splunk SIEM is the need to sync extensive lookup tables across various indexes and search heads. This synchronisation is pivotal for accurate threat detection, and it demands careful management and maintenance to avoid discrepancies or errors. Further to this, the bigger the lookup tables, the bigger the performance impact on the ongoing healthy operation of your splunk cluster.

That is but one of the more ‘nuanced’ challenges that anyone who has built and maintained a heavily used Splunk for Security knows all too well. The sheer volume of log data and underlying infrastructure required to facilitate the effective searching activities is but the most obvious.

Furthermore, maintaining controller infrastructure, vital for orchestrating the various components of security tools, is no small feat. It necessitates continuous monitoring and fine-tuning of the underlying software running SIEM or NDR packet-capturing solutions to ensure they perform at their best. These intricacies of platform engineering underscore the critical role it plays in the SOC’s functionality, and the complexities of adapting and maintaining these systems cannot be overlooked.

2. Data Engineering

Data serves as the lifeblood of any Security Operations Center (SOC), powering its ability to detect and respond to threats effectively. Data engineering is the meticulous process of ensuring that data flows seamlessly into SOC systems, a task that involves cleaning, normalising, and enriching the data to make it ready for threat detection. This undertaking is far from the “magic” that some might envision, as it involves managing vast volumes of data from diverse sources. Each piece of information required by the SOC for their Detection & Response activities comes in different formats, varying volumes, privacy complexities, and unique methods of acquisition.

Beyond the realm of traditional log data, data engineering extends its reach to encompass “reference data” crucial for the SOC’s accurate insights. This reference data may include information from Configuration Management Databases (CMDBs), Active Directory, and other company-specific sources. This integration of reference data empowers the SOC to derive deeper and more accurate insights from the log data, enriching its threat detection capabilities.

Data engineering isn’t just about data handling; it’s equally about data maintenance. Preserving data in pristine condition is paramount for correlation, alerting rules, and the SOC’s overall ability to detect threats effectively. One common misconception that some organisations harbour is the idea of logging everything and dealing with data organisation at a later stage. However, this approach can overwhelm the data engineering team and result in delayed detection and response times, potentially leaving the organisation vulnerable to threats. It underscores the crucial role of data engineering in maintaining the integrity and readiness of the SOC’s data resources.

3. Software Engineering

Software engineering is an integral part of SOC operations, often requiring SOC operators to develop scripts and tools to address specific threats or challenges. While this ad-hoc development is necessary due to the ever-evolving nature of cyber threats, it’s crucial to establish best practices, development pipelines, and release processes to ensure the creation of sustainable and secure solutions.

In a SOC, software engineering can become a continuous cycle of script creation and adaptation, driven by the dynamic nature of threats and the necessity for swift responses. The challenge lies in maintaining the reliability and security of these scripts over time. To address this, it’s essential to have a dedicated team responsible for the ongoing development, maintenance, and security of these scripts, rather than relying solely on the original developer within the operations team.

One effective approach to ensuring the sustainability of scripts and tools is through the concept of “field engineering.” This involves embedding software engineers directly within the SOC operations team. This arrangement fosters a stronger sense of partnership and mutual understanding between the engineering and operations sides, proven to be effective, especially in large organisations. It ensures that the software engineering efforts align with the specific needs and objectives of the SOC, ultimately leading to more robust and enduring solutions.

4. Production Management and Monitoring

Production management and monitoring play a pivotal role in the day-to-day operations of a Security Operations Center (SOC). These teams are tasked with the critical responsibility of maintaining the overall health and functionality of SOC systems. Their duties encompass a wide range of activities, including the timely application of patches, ensuring data backups are effective, and confirming that integrated data sources are functioning as expected. The importance of their role cannot be overstated, as production issues can significantly disrupt SOC operations, diverting valuable resources away from addressing real security threats.

The cybersecurity landscape is characterised by its relentless pace and ever-evolving threat landscape. In this dynamic environment, the pressure on production management and monitoring teams is unceasing. They must constantly stay vigilant and responsive to ensure that SOC systems remain in optimal working condition. One critical aspect of their role involves the meticulous application of security patches to address vulnerabilities and strengthen the SOC’s defences. Additionally, they are responsible for confirming the effectiveness of data backups, a critical component of disaster recovery and incident response plans. Any lapse in these areas could leave the organisation vulnerable to security breaches or data loss.

Integrated data sources, which often include logs from various network and security devices, must operate seamlessly to provide the SOC with the real-time information needed for threat detection and incident response. Any disruption in the flow of data from these sources can impede the SOC’s ability to identify and mitigate security incidents effectively. The pressure to ensure that these integrated sources continue to function without hitches is immense, given the high stakes involved in safeguarding an organisation’s digital assets.

In summary, production management and monitoring within a SOC are responsible for the continuous upkeep of the systems that underpin the organisation’s security posture. In the ever-pressing realm of cybersecurity, their unwavering dedication to maintaining the health and availability of SOC systems is essential to ensure that the SOC can effectively fulfil its mission of detecting, responding to, and mitigating security threats. The intricate, often unnoticed work of these teams is vital in safeguarding an organisation’s digital assets in a landscape where the pace of change is relentless.

5. Product and Program Management

Product and program management play a vital role in ensuring that a Security Operations Center (SOC) is not just a reactive entity but a proactive force aligned with an organisation’s strategic goals. In a SOC context, different capabilities such as incident response, forensics, and threat detection are treated as individual products. Product owners are responsible for setting priorities and defining the direction of these capabilities, thereby ensuring that the SOC is closely aligned with the broader needs of the business.

Managing products and programs in the context of a SOC, particularly within larger organisations, can be a complex and multifaceted endeavour. The challenge arises from the need to comprehend the diverse requirements and goals of various teams operating within the SOC and to ensure that these components are seamlessly integrated with the overarching business objectives. This task necessitates effective coordination, open and robust communication, and adaptability to evolving circumstances. It involves translating the high-level business strategy into actionable plans and initiatives that empower the SOC to meet the organisation’s security needs effectively.

The role of product and program management extends beyond just planning and coordination. It involves a continuous cycle of assessment and improvement, where the performance of SOC capabilities is regularly evaluated against predefined key performance indicators (KPIs) and goals. This iterative process ensures that the SOC remains agile, responsive, and capable of adapting to emerging threats and evolving business requirements. By managing the SOC’s capabilities as individual products and maintaining a strategic outlook, product and program managers play a pivotal role in positioning the SOC as a valuable asset that not only reacts to threats but also proactively contributes to the organisation’s security posture and success.

6. Security Architecture and Strategy

Security architecture and strategy are foundational components of an organisation’s approach to cybersecurity. They serve a pivotal role in fostering a security-conscious culture throughout the entire organisation. These architectural and strategic frameworks are designed to establish guidelines, standards, and best practices that not only reduce the need for last-minute security interventions but also mitigate unnecessary risks from the outset. By embedding security considerations into the fabric of an organisation, it ensures that security is always at the forefront of decision-making, from designing new systems to implementing new processes.

One of the key challenges in the realm of security architecture and strategy is the constant need for adaptation. The ever-evolving threat landscape, coupled with rapid technological advancements and evolving business processes, demands that security measures remain agile and responsive. These frameworks must continually evolve to encompass emerging threats and accommodate new technologies. Staying ahead of potential risks is no small feat, but it is imperative to ensure that an organisation remains well-prepared to face these challenges head-on. By continually updating and aligning security architecture and strategy with the evolving landscape, organisations can minimise vulnerabilities and respond effectively to the dynamic and unpredictable nature of cybersecurity threats.

The strategic aspect of security architecture is not merely about setting policies but also about defining a roadmap for security. It includes identifying long-term security goals, implementing measures to achieve them, and ensuring that security is integrated into the organisation’s overall strategic planning. It goes beyond the technical aspects of security and encompasses the broader organisational context, aligning security with the organisation’s objectives, culture, and mission. A robust security strategy is instrumental in maintaining a proactive, comprehensive, and resilient security posture that can adapt to an ever-changing threat environment.

Interdependence of Teams

These crucial areas within a Security Operations Center (SOC) don’t operate in isolation; rather, they are intricately intertwined. Engineers are responsible for constructing the underlying infrastructure that supports SOC operations. Data engineers ensure that data flows accurately through this infrastructure, optimising it for effective threat detection. Software engineers create the essential tools that SOC teams rely on to detect and respond to security incidents promptly. Product and program management oversee the alignment of SOC capabilities with the overarching business objectives, ensuring that the SOC is an asset to the organisation. Meanwhile, security architecture and strategy provide the comprehensive framework that guides the SOC’s operations within the broader organisational context.

The challenge in this intricate web of interconnected functions lies in achieving effective cross-functional coordination. This coordination is vital not only for ensuring the security within the SOC but also for fostering collaboration with the wider IT organisation and business units. In some cases, especially within less mature organisations, the importance of cross-functional coordination can be overlooked, leading to potential gaps in security and misalignment with business objectives. On the other hand, in more mature organisations, there might be an overemphasis on coordination, which can sometimes introduce unnecessary complexity and bureaucracy. Striking the right balance and optimising cross-functional collaboration is essential for the SOC to operate effectively and efficiently, safeguarding the organisation’s digital assets while staying aligned with its strategic goals.

The Challenges of Balancing Today and Tomorrow

The operational challenges faced by a Security Operations Center (SOC) are multifaceted. They encompass everything from addressing immediate issues to maintaining a healthy operational environment while also planning for the future. Factors such as a company’s growth, the adoption of new technologies, or acquisitions can significantly alter the security landscape. In response, SOC teams must be adaptable and responsive, which often necessitates budgeting, securing funding, and, in some cases, implementing new tools and technologies to keep pace with these changes.

What is often not widely recognized or addressed is the investment in time, effort, and human resources required to ensure that business decisions have a thorough understanding of their impact on the SOC’s capabilities. Many organisations overlook the importance of considering security requirements early in the decision-making process, often treating security as a last-minute gate to production. This tendency can result in inadequate visibility and access controls, leaving critical security aspects under-addressed until they become urgent, potentially exposing the organisation to unnecessary risks. It underscores the importance of integrating security considerations at the planning stage to create a proactive and resilient security posture.

No Simple Solution

Addressing these complex challenges is not straightforward, but the key lies in simplification. Leveraging cloud services and tailor-made technologies can help reduce complexity, minimise the need for large internal data storage, and streamline analytics platforms. This approach allows organisations to cut technology costs while simultaneously enhancing their security posture.

In the end, while there’s no single, simple solution, this article highlights that delivering effective security operations is a multifaceted endeavour. It requires substantial support, ongoing funding, and a clear understanding of the value of investing in security. By adopting the right approach and making judicious use of modern technologies, organisations can navigate these challenges and find more efficient and effective ways to deliver robust security capabilities. In essence, the journey may be complex, but there is a better path to achieving the desired outcomes in the realm of security.

Conclusion

Security operations extend far beyond the responsibilities of the SOC team; they are a collaborative symphony involving various departments. Recognising the critical contributions of engineering, administration, and product teams in upholding a secure environment is paramount. In an ever-evolving business landscape, these teams must work together, adapt, and innovate to maintain a strong security posture.

In our upcoming article, we will delve into the methods for measuring the effectiveness of your threat detection and response capabilities, offering valuable insights into the world of security operations and how to continually enhance them.

If you made it this far thank you, I hope it has been informative!

At Illuminate Security we aim to make the goals of Threat Detection & Response simpler to implement and sustain long term. Get in touch to learn more!

--

--