Security operations (SecOps)
safeguarding assets, prevent data breach, minimise impacts of cyber-attack, ensure compliance
holistic approach integration as fundamental element embedded into entire operation
SecOps key elements
integration with IT ops collab, automated workflows to streamline responses to incidents, reducing time
Proactive risk management continuous risk assessment/proactive, gathering and analysing threat intelligence
Organisation continuity and resilience beyond detecting/mitigating threats- robust incident and recovery to minimise don times
Regulatory compliance and governance monitoring/auditing
Security culture and awareness all employees
Continuous improvement and adaptation evolve with emerging threats, feedback
Technical components of security operations SIEM
Security information and event management (SIEM) SIEM tools – Collect and analyse data from across the enterprise (e.g. Splunk, LogRhythm, Microsoft Sentinel, ArcSight, IBM QRadar)
* Data sources – Ingest logs from switches, firewalls, routers, and endpoint devices
* Threat detection – Correlate data and display on dashboards for early threat identification
* SOC (Security Operations Centre) – Monitors and responds to threats; includes proactive threat hunting
* SOC types – Can be internal or outsourced
Technical components of security operations Security orchestration, automation and response
is a category of security solutions designed to enhance the efficiency and effectiveness of security operations by integrating and co-ordinating various security tools and systems (orchestration), automating routine and repetitive tasks to reduce manual intervention (automation) and providing a structured framework for responding to security incidents (response).
Technical components of security operations Network security monitoring
Network security monitoring using a solution such as CrowdStrike continuously monitors and evaluates the network. Monitoring it from a security perspective to detect threats uses advanced AI algorithms and analytics capabilities to evaluate network state and behaviour. This can be based on network protocols, client-server communications, traffic patterns and flow and data within individual packets.
Technical components of security operations Endpoint security
Endpoint security uses endpoint detection and response (EDR) tools, such as Microsoft Defender, CrowdStrike or Trellix, to protect endpoint devices such as laptops, printers and desktops. EDR is an expansion of endpoint security with greater visibility of devices to respond more quickly to threats. Continuous monitoring of endpoints detects suspicious activity that could indicate threats such as ransomware. It can also perform automatic actions to contain threats and send out alerts making use of AI and ML.
Technical components of security operations Vulnerability management
Vulnerability management is not just the process of using tools such as Nessus or Qualys to scan for vulnerabilities including misconfiguration or missing patches. Security vulnerabilities are across people, process and technology. It is proactive and continuous operation and can use automation. As vulnerabilities are found, they require analysis, prioritisation and treatment.
Technical components of security operations Incident response
Incident response (IR) is a process often designed internally for how the organisation will react to an incident. It consists of a reporting mechanism, IR team and playbooks or plans to contain and reduce the harm of an incident such as a cyber-attack or data breach.
Technical components of security operations Threat intelligence
Threat intelligence makes use of information on various threats and threat actors to help make informed decisions about their current security posture and areas they may need to focus on. It is a proactive process and is data-driven to make informed decisions that are used to prevent cyber-attacks before they occur.
Technical components of security operations Access control
Access control should be hardened by the use of strong access controls such as MFA, role-based access control (RBAC) and ACL. It goes hand in hand with proper on- and offboarding procedures for personnel along with having account auditing in place.
Example of a security operations structure Figure 4.1
Security Operations Structure
* Security engineering
* Security tool administration
* Security service desk
Security architecture
set of models, blueprint, methods and security principles that align with organisation objectives
e.g. access management, encryption, authentication
align with org goals/legislation,compliance, standards, third-party requirements
strong security architecture leads to fewer _____
strong security architecture leads to fewer security breaches
Security domains
cover
NETWORK SECURITY
APPLICATION SECURITY
ENDPOINT SECURITY
DATA SECURITY
IAM
Security domains
NETWORK SECURITY
network security, which includes measures to protect the integrity, confidentiality and availability of network resources
Security domains
APPLICATION SECURITY
application security, which involves securing software applications by identifying, fixing and preventing security vulnerabilities
Security domains
ENDPOINT SECURITY
endpoint security, protecting end-user devices such as computers, mobile devices and tablets;
Security domains
DATA SECURITY
data security, ensuring data privacy and protecting data from breaches or unauthorised access
Security domains
IAM
identity and access management (IAM), which involves managing user identities and their access to resources.
“The security architect needs to be able to see all these views at the same time”
different stakeholders= different viewpoints
whole organisation viewpoints into account
Security layers
Include physical security, perimeter security, internal network security,host security, application security, data security
Security layers
Physical security
physical security, which involves protecting hardware, software, data and employees from physical threats
Security layers
Perimeter security
perimeter security, which involves defending the outermost layer of the network, typically with firewalls and intrusion detection systems
Security layers
Internal network security
internal network security, which involves safeguarding internal network communications and assets