Skip to content

SOC 101 — What is a Security Operations Center?

This document explains what a SOC is, why organizations need one, and what it takes to build one from scratch. No prior cybersecurity knowledge required.

1. What is a SOC?

graph LR
    Threats[🌐 Cyber Threats] --> SOC[🛡️ SOC]
    SOC --> Detect[Detect]
    SOC --> Respond[Respond]
    SOC --> Recover[Recover]
    Detect --> Safe[✅ Organization Protected]
    Respond --> Safe
    Recover --> Safe

A Security Operations Center (SOC) is a team of cybersecurity professionals who monitor, detect, and respond to security threats targeting an organization — 24 hours a day, 7 days a week.

Think of it as: - 🏥 Hospital Emergency Room — but for cyber incidents instead of medical emergencies - 🚒 Fire Station — always ready, watching for fires (attacks), and responding immediately - 🗼 Air Traffic Control Tower — monitoring everything, coordinating responses, preventing disasters

What Does a SOC Protect?

  • Data: Customer records, financial data, intellectual property
  • Systems: Servers, networks, cloud infrastructure, endpoints (laptops/desktops)
  • People: Employees from phishing, social engineering, and fraud
  • Business: Revenue, reputation, regulatory compliance

2. Why Does Your Organization Need a SOC?

The Reality of Cyber Threats

  • Average time to detect a breach: 194 days (without a SOC) — IBM, 2024
  • Average cost of a data breach: $4.88 million USD — IBM Cost of a Data Breach Report, 2024
  • Ransomware attacks: Every 11 seconds, a business is hit — Cybersecurity Ventures
  • Regulatory requirements: PDPA (Thailand), GDPR (EU), PCI-DSS require security monitoring

What Happens WITHOUT a SOC?

Scenario Without SOC With SOC
Phishing email received Nobody notices → Data stolen Detected in minutes → Blocked
Ransomware deployed Discovered days later → Systems encrypted Detected immediately → Contained
Unauthorized access Found during audit months later Real-time alert → Account locked
Data exfiltration Unknown until public disclosure Detected by monitoring → Stopped

3. Core Components of a SOC

graph TD
    SOC[SOC] --> People[👥 People]
    SOC --> Process[📋 Process]
    SOC --> Tech[🖥️ Technology]

    People --> T1[Tier 1: Alert Analysts]
    People --> T2[Tier 2: Incident Responders]
    People --> T3[Tier 3: Threat Hunters]
    People --> Mgr[SOC Manager]

    Process --> PB[Playbooks]
    Process --> IR[Incident Response]
    Process --> SH[Shift Handoff]

    Tech --> SIEM[SIEM]
    Tech --> EDR[EDR]
    Tech --> SOAR[SOAR]
    Tech --> TI[Threat Intel]

3.1 People — Who Works in a SOC?

Role What They Do Analogy
Tier 1 Analyst Watch screens, triage alerts, escalate real threats Security guard watching CCTV
Tier 2 Responder Deep-dive investigations, contain active attacks Detective solving a case
Tier 3 Hunter Proactively search for hidden threats Undercover agent tracking criminals
Detection Engineer Build and tune alert rules Alarm system technician
SOC Manager Lead the team, report to executives Police chief

📖 Deep Dive: See SOC Team Structure for full role definitions, skills required, career path, and staffing models.

3.2 Process — How Does a SOC Operate?

Process Purpose Document
Incident Response Step-by-step guide to handle attacks IR Framework
Playbooks Specific procedures for each attack type 50 Playbooks
Shift Handoff Ensure continuity between shifts (24/7) Shift Handoff
Detection Engineering Create rules that detect bad behavior Detection Lifecycle
Reporting Show leadership what the SOC is doing Monthly Report

3.3 Technology — What Tools Does a SOC Use?

Tool What It Does Open Source Option Commercial Option
SIEM Collects all logs, finds patterns, creates alerts Wazuh, Elastic SIEM Splunk, Microsoft Sentinel, QRadar
EDR Monitors endpoints (laptops/servers) for malware Wazuh, Velociraptor CrowdStrike, SentinelOne, Defender
SOAR Automates repetitive SOC tasks TheHive + Cortex, Shuffle Splunk SOAR, Palo Alto XSOAR
Threat Intel Platform Tracks known bad IPs, domains, file hashes MISP, OpenCTI Recorded Future, Mandiant
Ticketing Tracks incidents from start to finish TheHive, RTIR ServiceNow, Jira
Network Monitoring Watches network traffic for anomalies Zeek, Suricata Darktrace, ExtraHop

4. How to Build a SOC — The 5-Step Path

graph LR
    P1[Phase 1: Foundation] --> P2[Phase 2: Detection]
    P2 --> P3[Phase 3: Response]
    P3 --> P4[Phase 4: Hunting]
    P4 --> P5[Phase 5: Optimization]

    style P1 fill:#e74c3c,color:#fff
    style P2 fill:#e67e22,color:#fff
    style P3 fill:#f1c40f,color:#000
    style P4 fill:#2ecc71,color:#fff
    style P5 fill:#3498db,color:#fff

Phase 1: Foundation (Month 1-3) — "Crawl"

Goal: Get visibility into what's happening in your environment.

  • Choose and deploy a SIEM (start with Wazuh if budget is limited)
  • Identify your top 10 critical assets (servers, databases, cloud accounts)
  • Onboard log sources: Firewall, Active Directory, Email, VPN
  • Hire 2-3 Tier 1 Analysts + 1 SOC Manager
  • Set up a ticketing system (TheHive or Jira)
  • Define basic escalation procedures

📖 Read: SOC Infrastructure Setup

Phase 2: Detection (Month 3-6) — "Walk"

Goal: Create meaningful alerts that detect real attacks.

  • Implement top 10 detection rules (start with our Sigma rules)
  • Create your first 5 Playbooks (Phishing, Malware, Brute Force, Account Compromise, Ransomware)
  • Enable a detection rule for each MITRE ATT&CK tactic
  • Tune rules to reduce False Positives below 30%
  • Establish shift schedule (start with 8x5, expand to 24x7 later)

📖 Read: Detection Engineering Lifecycle

Phase 3: Response (Month 6-12) — "Run"

Goal: Respond to real incidents effectively.

  • Implement all 50 Playbooks from this repository
  • Hire Tier 2 Incident Responders
  • Set up EDR on all endpoints
  • Conduct first Purple Team exercise (Simulation Guide)
  • Implement SOC KPIs: MTTD, MTTR, False Positive Rate
  • Begin monthly executive reporting

📖 Read: SOC Metrics & KPIs

Phase 4: Hunting (Year 1-2) — "Sprint"

Goal: Proactively find threats that bypass detection.

  • Hire or train a Tier 3 Threat Hunter
  • Implement Threat Intelligence feeds (MISP/OpenCTI)
  • Map detection coverage to MITRE ATT&CK
  • Conduct quarterly Threat Hunting campaigns
  • Implement SOAR for automated response

📖 Read: Threat Intelligence Lifecycle

Phase 5: Optimization (Year 2+) — "Fly"

Goal: Measure, improve, and mature continuously.

  • Achieve SOC-CMM Level 3+ Maturity
  • Automate 80%+ of Tier 1 triage with SOAR
  • Implement Detection-as-Code (CI/CD for rules)
  • Conduct annual SOC Assessment (Assessment Checklist)
  • Publish Quarterly Business Reviews to leadership

5. Estimated Budget

SOC Size Staff Tools (Annual) Total Year 1
Minimal (Open Source, 8x5) 3-5 people $0-20K ~$150K-250K
Standard (Mixed, 16x5) 6-10 people $50K-150K ~$500K-800K
Enterprise (Commercial, 24x7) 12-20 people $200K-500K ~$1.5M-3M

Tip: Start small with open-source tools. You can always upgrade as you mature.

6. How to Use This Repository

This repository contains everything you need to operate a SOC. Here's the recommended reading order:

# Start Here Document
1 📖 You are here SOC 101 (this document)
2 👥 Build your team SOC Team Structure
3 🏗️ Set up infrastructure SOC Infrastructure Setup
4 📋 Learn the IR process Incident Response Framework
5 📕 Study the Playbooks PB-01 Phishing (start here)
6 🔍 Deploy detection rules Detection Rules
7 ⏰ Set up shift operations Shift Handoff
8 📊 Measure your KPIs SOC Metrics
9 🎯 Run simulations Simulation Guide
10 🎓 Train new analysts Analyst Onboarding Path

References