Lab 01: SOC Architecture

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Design a Security Operations Centre (SOC) tier model

  • Understand SOC operational models (in-house, MSSP, hybrid)

  • Architect a SIEM pipeline

  • Calculate and interpret SOC performance metrics


Step 1: SOC Tier Model

A mature SOC operates across four functional tiers:

Tier
Role
Responsibilities

L1

Triage Analyst

Alert monitoring, initial triage, ticket creation, escalation

L2

Incident Handler

Deep investigation, containment decisions, playbook execution

L3

Senior Analyst / Threat Hunter

Threat hunting, custom detections, malware analysis, forensics

TI

Threat Intelligence

IOC management, threat actor tracking, MITRE ATT&CK mapping

💡 L1 handles volume; L3 handles depth. A well-tuned SIEM should allow L1 to close 70%+ of alerts within SLA.


Step 2: SOC Operational Models

In-House SOC

  • Full control, best for regulated industries (banking, defence)

  • High CAPEX: staff, SIEM licenses, 24/7 shifts

  • Suitable for organisations with >500 employees and dedicated security budget

MSSP (Managed Security Service Provider)

  • Low setup cost, immediate 24/7 coverage

  • Less customisation; shared analyst pool

  • Risk: limited knowledge of your environment

Hybrid SOC

  • MSSP handles L1/monitoring; internal team handles L2/L3 and TI

  • Best of both worlds — most common enterprise model

  • Requires clear escalation SLAs and runbook handoff


Step 3: SIEM Architecture

Key SIEM components:

  • Collectors: Beats (Filebeat, Winlogbeat, Packetbeat), Syslog agents

  • Processing: Logstash pipelines — parse, normalise, enrich (GeoIP, threat intel)

  • Storage: Elasticsearch indices with ILM (Index Lifecycle Management)

  • Analytics: Detection rules (EQL, Sigma), ML anomaly detection

  • Response: Integration with SOAR platforms (Splunk SOAR, Palo Alto XSOAR)


Step 4: SOC Metrics — Key Performance Indicators

Metric
Definition
Target

MTTD

Mean Time to Detect — time from incident start to detection

< 4 hours

MTTR

Mean Time to Respond — time from detection to containment

< 24 hours

False Positive Rate

FP alerts / total alerts

< 30%

Alert-to-Case Ratio

Cases opened / total alerts

> 5% indicates under-investigation

Analyst Utilisation

% time on alert triage vs. proactive work

< 80% reactive

Dwell Time

Time attacker is undetected in environment

< 7 days


Step 5: Build the SOC Metrics Calculator

Run it:

📸 Verified Output:


Step 6: SOC Technology Stack

Tier 1 — Alert Management:

  • SIEM: Elastic Security, Splunk ES, Microsoft Sentinel

  • SOAR: Palo Alto XSOAR, Splunk SOAR, IBM Resilient

  • Ticketing: ServiceNow, Jira

Tier 2 — Investigation:

  • EDR: CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint

  • Network: Zeek/Bro, Suricata, Darktrace

  • Memory forensics: Volatility, Rekall

Tier 3 — Hunting & Intelligence:

  • TIP: MISP, OpenCTI, Recorded Future

  • Hunting: Elastic SIEM, Velociraptor, osquery


Step 7: SOC Design Principles

  1. Detection-first mindset — assume breach; focus on reducing dwell time

  2. Automation at L1 — auto-enrich and auto-close low-fidelity alerts

  3. Metrics-driven tuning — review FPR weekly; update detection rules monthly

  4. People, Process, Technology — 40% people investment, 30% process, 30% tools

  5. Purple team integration — regular red/blue exercises to validate detections

💡 The SOC maturity model: Ad-hoc → Managed → Defined → Optimised. Most organisations are at "Managed"; targeting "Defined" (documented playbooks, SLAs, metrics) provides 3x improvement in MTTR.


Step 8: Capstone — SOC Design Exercise

Design a SOC for a 2,000-employee financial services company:

Requirements:

  • 24/7 monitoring

  • Regulatory: PCI DSS, SOX, GDPR

  • Budget: USD 3M/year

  • Risk appetite: Low (zero-tolerance for payment card data breach)

Recommended Architecture:


Summary

Concept
Key Points

SOC Tiers

L1 triage → L2 investigate → L3 hunt → TI intelligence

SOC Models

In-house (control), MSSP (cost), Hybrid (best of both)

SIEM Pipeline

Collect → Parse → Normalise → Enrich → Detect → Alert

Key Metrics

MTTD (<4h), MTTR (<24h), FPR (<30%), Dwell time (<7d)

Efficiency Score

Formula: 100 - FPR% - MTTD2 - MTTR0.5

Staffing

3-5 analysts per shift; 24/7 = minimum 8 FTEs

Last updated