Thai Cyber Legal Baseline for SOC Operations
Document ID : TH-LAW-SOC-001
Version : 1.0
Classification : Internal
Last Updated : 2026-04-26
Audience : CISO, SOC Manager, IR Engineer, Security Engineer, Compliance Officer, Legal Counsel
This document provides operational SOC guidance, not legal advice. Use it to trigger the right evidence, escalation, and decision workflow while Legal, DPO, or Compliance confirms the organization's formal position.
graph TD
A["Security incident detected"] --> B["Classify data, service, and legal impact"]
B --> C{"Thai legal trigger?"}
C -->|PDPA| D["Activate DPO / privacy path"]
C -->|Computer Crime / Cybersecurity| E["Preserve logs and coordinate Legal / CISO"]
C -->|Electronic records| F["Preserve integrity and chain of custody"]
D --> G["Record notification decision"]
E --> G
F --> G
1. Purpose and Operating Principle
Use this baseline when an incident may involve Thai legal, privacy, regulatory, law-enforcement, or critical-service implications.
Treat PDPA-specific breach assessment as governed by PDPA Incident Response and PDPA Compliance .
Preserve facts before interpretation: time, asset, owner, data type, user identity, log source, evidence custodian, and decision owner.
Escalate early when an incident involves personal data, public service disruption, critical infrastructure, criminal activity, or requests from authorities.
2. Thai Legal Baseline for SOC Teams
Legal anchor
SOC operating concern
Primary SOC action
Decision owner
Personal Data Protection Act B.E. 2562 (PDPA)
Personal data, sensitive personal data, affected data subjects, breach notification
Trigger DPO review, preserve breach timeline, link to PDPA evidence pack
DPO + CISO
Computer-Related Crime Act B.E. 2550 and amendments
Unauthorized access, data alteration, service disruption, malicious tools, unlawful content, traffic data
Preserve traffic logs, user attribution data, forensic images, and law-enforcement request trail
Legal + CISO
Cybersecurity Act B.E. 2562
Cyber threat affecting critical services, public safety, or critical information infrastructure
Assess threat level, prepare coordination package, preserve impact evidence
CISO + SOC Manager
Electronic Transactions Act B.E. 2544 and amendments
Electronic records, digital messages, logs, approvals, signatures, evidence reliability
Preserve integrity, authenticity, time source, system-of-record proof, and chain of custody
Legal + IR Lead
NCSA / ThaiCERT coordination
National-level advisories, sectoral CERT coordination, threat sharing, critical incident coordination
Maintain IOC package, timeline, contact record, and sharing approval
CISO + Threat Intel Lead
3. Trigger-to-Action Matrix
Incident trigger
Required SOC action
Owner
Evidence required
Notification checkpoint
Confirmed or suspected personal-data exposure
Activate PDPA assessment workflow and freeze deletion of relevant records
SOC Manager + DPO
Incident timeline, data types, affected systems, affected subject estimate
DPO decides notification path
Unauthorized access to computer system or data
Preserve authentication, network, endpoint, and application logs
IR Engineer
Log bundle, affected accounts, source/destination, access method, containment timeline
Legal decides law-enforcement path
Service disruption affecting critical business or public-facing service
Assess whether Cybersecurity Act escalation may apply
CISO + SOC Manager
Impact summary, service owner statement, downtime, affected population
CISO decides executive/regulator path
Request from authority, regulator, or sectoral CERT
Validate request channel and start response decision log
Legal + CISO
Request copy, requester identity, time received, scope requested, response owner
Legal approves response package
Electronic evidence may support legal, regulatory, or disciplinary action
Start legal hold and chain-of-custody handling
IR Lead + Legal
Evidence register, hash values, custodian trail, time synchronization proof
Legal confirms preservation scope
4. Minimum Evidence Package
Evidence item
Why it matters
Minimum standard
Incident timeline
Supports reporting, breach assessment, and executive decision-making
Detection, triage, containment, escalation, recovery, and decision timestamps
Asset and service ownership
Identifies accountable business and technical owners
Business owner, technical owner, data owner, service criticality
Log and traffic data package
Supports investigation and possible authority requests
Source system, retention status, collection time, completeness statement
Data-impact assessment
Connects technical facts to PDPA and business impact
Data class, subject estimate, sensitive-data indicator, evidence confidence
Chain of custody
Protects evidentiary value
Custodian, transfer time, storage location, hash or integrity marker
Notification decision log
Shows defensible governance
Facts reviewed, decision made, approver, time, next review point
5. Escalation Rules
6. 24-Hour SOC Operating Checklist
References