18.09.2018

|

Daniel Felix Maurer

|

Article

Sourcing a SOC / CDC requires Consideration

Teaser Image

The detection and handling of security incidents, also known as Security Information and Event Management (SIEM) or “Detection and Response” according to the NIST Cybersecurity Framework, is - unfortunately - becoming increasingly important. The Security Operations Center (SOC) or Cyber Defense Center (CDC) plays a central role in the implementation of SIEM processes. The demands on the expertise and availability of the SOC/CDC are high; unfortunately, internal attacks cannot be restricted to office hours. These are important reasons why SOC services are often outsourced to third parties, and the market offering is growing rapidly as a result.

The SOC service provider should be selected on the basis of an appropriate requirements specification that also takes into account the customer’s restrictions. A 24/7 service for detection, for example, is of little use if the departments responsible for risk assessment and/or response are only available during office hours. Another fundamental question is whether the SOC service should be transferred to the system operator, a managed security provider or deliberately to an independent third party. There are good arguments for all three strategies and the decision must be based on the specific objectives of SOC sourcing.

About the author

Daniel Felix Maurer
Daniel Felix Maurer
Managing Security Consultant
lic. phil. UZH

I have been working in information security since 1986. That’s almost half a lifetime and I’ve enjoyed it most of the time. I have had the privilege of advising many companies and public authorities on all aspects of cyber, information and IT security management and have written over 100 security concepts, architectures and risk analyses. Security is and remains a difficult terrain that I have passionately explored and tried to master and - much like a mountain guide - I have accompanied my clients over paved paths and rough trails alike.

Linkedin

Teaser Image
02.04.2025| Markus Günther | Article

Post-quantum Cryptography: a New "year 2000" Hype?

Read article
Teaser Image
22.10.2024| Bruno Blumenthal | Presentation

AI Compliance Essentials: Standards and Emerging Regulations

Read article
Teaser Image
11.09.2024| Markus Günther | Article

Post Quantum Cryptography - Do the Locks Used Hold Up?

Read article
To all contributions