{"id":89307,"date":"2019-04-23T09:00:23","date_gmt":"2019-04-23T16:00:23","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89307"},"modified":"2023-05-15T22:59:26","modified_gmt":"2023-05-16T05:59:26","slug":"lessons-learned-microsoft-soc-part-2-organizing-people","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/23\/lessons-learned-microsoft-soc-part-2-organizing-people\/","title":{"rendered":"CISO Series: Lessons learned from the Microsoft SOC\u2014Part 2a: Organizing people"},"content":{"rendered":"
In the second post in our series, we focus on the most valuable resource in the security operations center (SOC)\u2014our people. This series is designed to share our approach and experience with operations, so you can use what we learned to improve your SOC. In Part 1: Organization<\/a>, we covered the SOC\u2019s organizational role and mission, culture, and metrics.<\/p>\n The lessons in the series come primarily from Microsoft\u2019s corporate IT security operation team, one of several specialized teams in the Microsoft Cyber Defense Operations Center (CDOC<\/a>). We also include lessons our Detection and Response Team (DART)<\/a> have learned helping our customers respond to major incidents.<\/p>\n People are the most valuable asset in the SOC\u2014their experience, skill, insight, creativity, and resourcefulness are what makes our SOC effective. Our SOC management team spends a lot of time thinking about how to ensure our people are set up with what they need to succeed and stay engaged. As we\u2019ve improved our processes, we\u2019ve been able to decrease the time it takes to ramp people up and increase employee enjoyment of their jobs.<\/p>\n Today, we cover the first two aspects of how to set up people in the SOC for success:<\/p>\n Rapidly sorting out the signal (real detections) from the noise (false positives) in the SOC requires investing in both humans and automation. We strongly believe in the power of automation and technology to reduce human toil, but ultimately, we\u2019re dealing with human attack operators and human judgement is critical to the process.<\/p>\n In our SOC, automation is not about using efficiency to remove humans from the process\u2014it is about empowering humans. We continuously think about how we can automate repetitive tasks from the analyst\u2019s job, so they can focus on the complex problems that people are uniquely able to solve.<\/p>\n Automation empowers humans to do more in the SOC by increasing response speed and capturing human expertise. The toil our staff experiences comes mostly from repetitive tasks and repetitive tasks come from either attackers or defenders doing the same things over and over. Repetitive tasks are ideal candidates for automation.<\/p>\n We also found that we need to constantly refine the automation because attackers are creative and persistent, constantly innovating to avoid detections and preventive controls. When an effective attack method is identified (like phishing), they exploit it until it stops working. But they also continually innovate new tactics to evade defenses introduced by the cybersecurity community. Given the profit potential of attacks, we expect the challenges of evolving attacks to continue for the foreseeable future.<\/p>\n When repetitive and boring work is automated, analysts can apply more of their creative minds and energy to solving the new problems that attackers present to them and proactively hunting for attackers that got past the first lines of defense. We\u2019ll discuss areas where we use automation and machine learning in “Part 3: Technology.”<\/p>\n At Microsoft, we organized our SOC into specialized teams, allowing them to better develop and apply deep expertise, which supports the overall goals of reducing time to acknowledge and remediate.<\/p>\n This diagram represents the key SOC functions: threat intelligence, incident management, and SOC analyst tiers:<\/p>\n <\/p>\n Threat intelligence<\/strong>\u2014We have several threat intelligence teams at Microsoft that support the SOC and other business functions. Their role is to both inform business stakeholders of risk and provide technical support for incident investigations, hunting operations, and defensive measures for known threats. These strategic (business) and tactical (technical) intelligence goals are related but distinctly different from each other. We task different teams for each goal and ensure processes are in place (such as daily standup meetings) to keep them in close contact.<\/p>\n Incident management<\/strong>\u2014Enterprise-wide coordination of incidents, impact assessment, and related tasks are handled by dedicated personnel separate from technical analyst teams. At Microsoft, these incident response teams work with the SOC and business stakeholders to coordinate actions that may impact services or business units. Additionally, this team brings in legal, compliance, and privacy experts as needed to consult and advise on actions regarding regulatory aspects of incidents. This is particularly important at Microsoft because we\u2019re compliant with a large number of international standards and regulations.<\/p>\n SOC analyst tiers<\/strong>\u2014This three-tier model for SOC analysts will probably look familiar to seasoned SOC professionals, though there are some subtleties in our model we don\u2019t see widely in the industry.<\/p>\n <\/p>\n Our organization uses the term hot path<\/strong> and cold path <\/strong>to describe how we discover adversaries and optimize processes to handle them.<\/p>\n Tier 1<\/strong>\u2014This team is the primary front line for and focuses on high-speed remediation<\/strong> over a large volume of incidents. Tier 1 analysts respond to a very specific set of alert sources and follow prescriptive instructions to investigate, remediate, and document the incidents. The rule of thumb for alerts that Tier 1 handles is that it can be typically remediated within seconds to minutes. The incidents will be escalated to Tier 2 if the incident isn\u2019t covered by a documented Tier 1 procedure or it requires involved\/advanced remediation (for example, device isolation and cleanup).<\/p>\n In addition:<\/p>\n Tier 2<\/strong>\u2014This team is focused on incidents that require deeper analysis and remediation<\/strong>. Many Tier 2 incidents have been escalated from Tier 1 analysts, but Tier 2 also directly monitors alerts for sensitive assets and known attacker campaigns. These incidents are usually more complex and require an approach that is still structured, but much more flexible than Tier 1 procedures. Additionally, some Tier 2 analysts also proactively hunt for adversaries (typically using lower priority alerts from the same Microsoft Threat Protection<\/a> tools they use to manage reactive incidents).<\/p>\n Tier 3<\/strong>\u2014This team is focused primarily on advanced hunting<\/strong> and sophisticated analysis to\u00a0identify anomalies that may indicate advanced adversaries.\u00a0Most incidents are remediated at Tiers 1 and 2 (96 percent) and only unprecedented findings or deviations from norms are escalated to Tier 3 teams. Tier 3 team members have a high degree of freedom to bring their different skills, backgrounds, and approaches to the goal of ferreting out red team\/hidden adversaries. Tier 3 team members have backgrounds as security professionals, data scientists, intelligence analysts, and more. These teams use different tools (Microsoft, custom, and third-party) to sift through a number of different datasets to uncover hidden adversary activity. A favorite of many analysts is the use of Kusto Query Language (KQL) queries across Microsoft Threat Protection tool datasets.<\/p>\n The structure of Tier 3 has changed over time, but has recently gravitated to four different functions:<\/p>\n For more insights into Microsoft\u2019s approach to using technology to empower people, watch Ann Johnson\u2019s keynote at RSA 2019<\/a> and download our poster<\/a>. For information on organizational culture and goals, read Lessons learned from the Microsoft SOC\u2014Part 1: Organization<\/a>. In addition, see our CISO series<\/a> to learn more.<\/p>\n Stayed tuned for the second segment in \u201cLessons learned from the Microsoft SOC\u2014Part 2,\u201d where we\u2019ll cover career paths and readiness programs for people in our SOC. And finally, we\u2019ll wrap up this series with \u201cPart 3: Technology,\u201d where we\u2019ll discuss the technology that enables our people to accomplish their mission.<\/p>\n For more discussion on some of these topics, see John and Kristina\u2019s session (starting at 1:05:48) at Microsoft\u2019s recent Virtual Security Summit<\/a>.<\/p>\n In the second of our three-part series, we focus on the most valuable resource in the SOC\u2014our people.<\/p>\n","protected":false},"author":96,"featured_media":87994,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3683],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1906,1978,1977],"class_list":["post-89307","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-security-management","tag-microsoft-security-insights"],"yoast_head":"\n\n
Empower humans with automation<\/h3>\n
Microsoft SOC teams and tiers model<\/h3>\n
\n
Roles and functions of the SOC analyst tiers<\/h3>\n
\n
\n
Learn more<\/h3>\n
Read more from this series<\/h3>\n
\n