{"id":89997,"date":"2019-10-15T09:00:50","date_gmt":"2019-10-15T16:00:50","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89997"},"modified":"2023-05-26T15:21:08","modified_gmt":"2023-05-26T22:21:08","slug":"microsoft-4-principals-effective-security-operations-center","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/15\/microsoft-4-principals-effective-security-operations-center\/","title":{"rendered":"Microsoft\u2019s 4 principles for an effective security operations center"},"content":{"rendered":"
The Microsoft Cyber Defense Operations Center (CDOC) fields trillions of security signals every day. How do we identify and respond to the right threats? One thing that won\u2019t surprise you: we leverage artificial intelligence (AI), machine learning, and automation to narrow the focus. But technology is not enough. Our people, culture, and process are just as critical.<\/p>\n
You may not have trillions of signals to manage, but I bet you will still get a lot of value from a behind-the-scenes look at the CDOC. Even the small companies that I\u2019ve worked with have improved the effectiveness of their security operations centers (SOCs) based on learnings from Microsoft.<\/p>\n
Watch the operations episode of the CISO Spotlight Series\u2014The people behind the cloud<\/a> to get my take and a sneak peek at our team in action. In the video, I walk you through four principles:<\/p>\n Before you make any changes, it helps to identify the gaps in your current security system. Take a look at your most recent attacks to see if you have the right detections in place. Offense should drive your defenses. For example:<\/p>\n Understanding where your organization is vulnerable will help you determine what technology you need. If you need further help, I would suggest using the MITRE ATT&CK Framework<\/a>.<\/p>\n As you evaluate technology solutions, think of your security operations as a funnel. At the very top are countless threat signals. There is no way your team can address all of them. This leads to employee burnout and puts the organization at risk. Aim for automation to handle 20-25 percent of incoming events. AI and machine learning can correlate signals, enrich them with other data, and resolve known incidents.<\/p>\n Invest in good endpoint detection, network telemetry, a flexible security incident and event management system (SIEM) like Azure Sentinel<\/a>, and cloud workload protection solutions. The right technology will reduce the volume of signals that filter down to your people, empowering them to focus on the problems that machines can\u2019t solve.<\/p>\n The people you hire matter. I attribute much of our success to the fact that we hire people who love to solve problems. You can model this approach in your SOC. Look for computer scientists, security professionals, and data scientists\u2014but also try to find people with nontraditional backgrounds like military intelligence, law enforcement, and liberal arts. People with a different perspective can introduce creative ways of looking at a problem. For example, Microsoft has had a lot of success with veterans from the military.<\/p>\n I also recommend organizing your SOC into specialized, tiered teams. It gives employees a growth path and allows them to focus on areas of expertise. Microsoft uses a three-tiered approach:<\/p>\n For a more detailed look at how Microsoft has structured our team, read Lessons learned from the Microsoft SOC\u2014Part 2a: Organizing people<\/a><\/p>\n Culture influences SOC performance by guiding how people treat each other and approach their work. Well-defined career paths and roles<\/a> are one way to influence your culture. People want to know how their work matters and contributes to the organization. As you build your processes and team, consider how you can encourage innovation, diversity, and teamwork.<\/p>\n Read how the CDOC creates culture in Lessons learned from the Microsoft SOC\u2014Part 1<\/a>.<\/p>\n To learn more about how to run an effective SOC:<\/p>\n Microsoft Chief Cybersecurity Strategist, Jonathan Trull, outlines four principles any organization can use to improve the effectiveness of its SOC.<\/p>\n","protected":false},"author":96,"featured_media":89998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3672,3684,3685],"products":[3690,3691,3726],"threat-intelligence":[],"tags":[3788],"coauthors":[1916],"class_list":["post-89997","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-endpoint-security","topic-security-operations","topic-siem-and-xdr","products-microsoft-defender","products-microsoft-defender-for-cloud","products-microsoft-sentinel","tag-mitre-attck"],"yoast_head":"\n\n
It starts with assessment<\/h3>\n
\n
Invest in the right technology<\/h3>\n
Hire a diverse group of people<\/h3>\n
\n
Foster an innovative culture<\/h3>\n
Learn more<\/h3>\n
\n