Skip to content

Quickstart Guide — Your SOC in 30 Minutes

This guide shows you the fastest path through this repository. Follow the numbered steps to understand and implement a SOC from scratch.

Reading Roadmap

graph TD
    START[🚀 START HERE] --> S1[1. SOC 101]
    S1 --> S2[2. Team Structure]
    S2 --> S3[3. Infrastructure Setup]
    S3 --> S4[4. IR Framework]
    S4 --> S5[5. Your First 5 Playbooks]
    S5 --> S6[6. Detection Rules]
    S6 --> S7[7. Shift Operations]
    S7 --> S8[8. KPIs & Reporting]
    S8 --> S9[9. Purple Team Testing]
    S9 --> S10[10. Train New Analysts]

    style START fill:#e74c3c,color:#fff
    style S5 fill:#2ecc71,color:#fff
    style S10 fill:#3498db,color:#fff

Step-by-Step Reading Order

🔴 Week 1 — Understand (Read Only)

Step Time Document What You'll Learn
1 15 min SOC 101 What a SOC is, core components, maturity phases
2 10 min Glossary Key terminology (SIEM, EDR, IOC, TTP, etc.)
3 10 min SOC Team Structure Roles, staffing model, career path

🟠 Week 2 — Plan (Design Your SOC)

Step Time Document What You'll Learn
4 15 min Infrastructure Setup What systems you need to deploy
5 10 min Data Governance How to manage log data and retention
6 10 min SOC Assessment Checklist Gap analysis for your current state

🟡 Week 3 — Build (Implement Core Processes)

Step Time Document What You'll Learn
7 20 min IR Framework How to handle incidents end-to-end
8 30 min Top 5 Playbooks (see below) How to respond to common attacks
9 15 min Detection Rules Pre-built Sigma rules to deploy
10 10 min Integration Hub How to connect tools together

🟢 Week 4 — Operate (Go Live)

Step Time Document What You'll Learn
11 10 min Shift Handoff How to run 24/7 operations
12 10 min SOC Metrics MTTD, MTTR, False Positive Rate
13 15 min Monthly Report Template Reporting to leadership
14 10 min Analyst Onboarding Path How to train new hires

Top 5 Playbooks to Start With

Start with these — they cover 80% of real-world incidents:

Priority Playbook Why Start Here
1️⃣ Phishing #1 most common attack vector
2️⃣ Malware Infection Most frequent escalation from Phishing
3️⃣ Brute Force Easy to detect, good for training Tier 1
4️⃣ Account Compromise Growing attack surface with cloud adoption
5️⃣ Ransomware Highest business impact

SOC Maturity Roadmap

graph TD
    subgraph Phase1["Phase 1: CRAWL (Month 1-3)"]
        A1[Deploy SIEM]
        A2[Onboard Top 10 Log Sources]
        A3[Hire 3-5 Staff]
        A4[Basic Escalation Process]
    end

    subgraph Phase2["Phase 2: WALK (Month 3-6)"]
        B1[10 Detection Rules Live]
        B2[5 Playbooks Active]
        B3["Shift Schedule (8x5)"]
        B4["FP Rate < 30%"]
    end

    subgraph Phase3["Phase 3: RUN (Month 6-12)"]
        C1[All 50 Playbooks]
        C2[EDR on All Endpoints]
        C3[First Purple Team Exercise]
        C4[Monthly KPI Reporting]
    end

    subgraph Phase4["Phase 4: SPRINT (Year 1-2)"]
        D1[Threat Hunting Program]
        D2[Threat Intel Feeds]
        D3[SOAR Automation]
        D4[MITRE ATT&CK Coverage Map]
    end

    subgraph Phase5["Phase 5: FLY (Year 2+)"]
        E1["SOC-CMM Level 3+"]
        E2["80%+ Automated Triage"]
        E3[Detection-as-Code CI/CD]
        E4[Annual SOC Assessment]
    end

    Phase1 --> Phase2 --> Phase3 --> Phase4 --> Phase5

    style Phase1 fill:#e74c3c,color:#fff
    style Phase2 fill:#e67e22,color:#fff
    style Phase3 fill:#f1c40f,color:#000
    style Phase4 fill:#2ecc71,color:#fff
    style Phase5 fill:#3498db,color:#fff

Minimum Viable SOC Checklist

The absolute minimum you need to start — your "Day 1" checklist:

  • 1 SIEM deployed (Wazuh recommended for budget-conscious orgs)
  • 3 log sources onboarded (Firewall, Active Directory, Email)
  • 3 people hired (2 Tier 1 Analysts + 1 Manager)
  • 5 detection rules enabled (from our 08_Detection_Engineering/sigma_rules/)
  • 1 Playbook ready (start with Phishing)
  • 1 ticketing system (TheHive or Jira)
  • 1 escalation path defined (Tier 1 → Manager → CISO)
  • 1 communication channel (Slack/Teams for SOC team)

✅ If you can check all 8 boxes above, you have a functioning SOC!

Frequently Asked Questions

# Question Answer
1 How many people do I need to start a SOC? Minimum 3: 2 T1 analysts + 1 manager. See SOC Team Structure
2 What SIEM should I use? For budget: Wazuh (free). For enterprise: Splunk, Elastic, or Sentinel.
3 How long until my SOC is effective? Crawl (3 months), Walk (6 months), Run (12 months). Plan for at least 6 months.
4 Do I need 24/7 coverage from day 1? No. Start with 8x5, then expand as maturity grows.
5 Which playbooks should I create first? Phishing, Malware, Brute Force, Account Compromise, Ransomware.
6 How many detection rules do I need? Start with 5-10 high-confidence rules, then expand. Quality > quantity.
7 Should I build or buy a SOC? Start with internal + MSSP support if budget allows. See SOC Assessment.
8 What certifications do analysts need? T1: Security+/CySA+. T2: GCIH. T3: GCFA/OSCP.
9 How do I measure SOC effectiveness? MTTD, MTTR, FP rate, SLA compliance. See SOC Metrics.
10 Can I use this repository for my organization? Yes! Fork it, customize it, contribute back. See CONTRIBUTING.

References