Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Detection & Response Glossary

Security Operations Center (SOC)

A Security Operations Center (SOC) is the central hub for real-time monitoring, detection, and response to cybersecurity incidents. SOCs bring together people, processes, and technology—SIEM, EDR, SOAR—to detect and combat threats 24/7.

A Security Operations Center (SOC) is the "nerve center" of an organization's cybersecurity. SOC analysts continuously monitor security signals, investigate anomalies, and respond to incidents—ideally before an attacker can cause significant damage.

SOC Maturity Levels

Not every company needs a Tier 1/2/3 SOC with 50 analysts:

SOC Maturity Model:

Level 0 - No SOC:
  → No active monitoring, no centralized logs
  → Incidents are handled reactively after user reports
  → Risk: Average detection time > 200 days

Level 1 - Basic SOC (SIEM-based):
  → SIEM with standard use cases (Windows events, firewall, AD)
  → Alert triage by IT admins (no dedicated SOC team)
  → Business hours only
  → Suitable for: SMEs with up to 500 employees

Level 2 - Mature SOC:
  → Dedicated SOC analysts (Tier 1 + Tier 2)
  → Custom detection rules
  → IR playbooks for common scenarios
  → 24/7 operation (in-house or MSSP)
  → Threat hunting as a separate function

Level 3 - Advanced SOC:
  → Tier 3: Threat intelligence and proactive hunting
  → Red team integration (purple team exercises)
  → In-house malware analysis capabilities
  → Automation/orchestration via SOAR
  → Suitable for: KRITIS, large corporations, high-value targets

SOC Technology Stack

Core technologies of a modern SOC:

SIEM (Security Information and Event Management):
  Function: Log aggregation, correlation, alerting
  Examples: Microsoft Sentinel, Splunk, Elastic SIEM, IBM QRadar
  Data sources: Windows Events, Linux Syslog, Firewall, EDR, Cloud

EDR/XDR (Endpoint/Extended Detection and Response):
  Function: Endpoint telemetry, behavioral analysis, automatic isolation
  Examples: CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint

SOAR (Security Orchestration, Automation, and Response):
  Function: Automation of repetitive tasks (IP blocking, ticket creation)
  Examples: Palo Alto XSOAR, Splunk SOAR, Microsoft Sentinel Automation

Threat Intelligence Platform (TIP):
  Function: IOC management, threat feed integration
  Examples: MISP (open source), ThreatConnect, Anomali

Vulnerability Management:
  Function: Vulnerability inventory for context in alerts
  Examples: Tenable Nessus, Qualys, Rapid7

SME Alternative: MSSP and MDR

For most German SMEs, maintaining their own 24/7 SOC is not economically viable:

Models for SME Security Monitoring:

MSSP (Managed Security Service Provider):
  → External provider handles SOC tasks
  → SLA: Alert response time < 15–30 minutes (24/7)
  → Costs: EUR 500–3,000/month (depending on number of endpoints and scope)

MDR (Managed Detection and Response):
  → Like MSSP, but with a more active IR component
  → MDR provider can isolate endpoints, remove threats
  → "We come to you" instead of "We send you alerts"
  → Recommended for SMBs without their own security team

Co-Managed SOC:
  → Company operates SIEM, MSSP provides analysts and expertise
  → More flexible than pure outsourcing
  → Internal knowledge building

SOC Metrics

A good SOC is measured by specific metrics:

  • MTTD (Mean Time to Detect): Time until an incident is detected - Target: < 24h
  • MTTR (Mean Time to Respond): Time until resolution - Target: < 1h–24h depending on severity
  • False Positive Rate: Percentage of false-positive alerts - Target: < 10%
  • Alert Volume per Analyst: > 100 alerts/day = risk of burnout, automation required
  • Detection Coverage: Which MITRE ATT&CK tactics are detected?