Skip to content

Standard SOC Infrastructure Setup

This document outlines the standard infrastructure requirements and setup procedures for a modern Security Operations Center (SOC).

1. Core Components

graph LR
    Logs[Log Sources] -->|Ingest| SIEM[SIEM]
    Endpoints[Endpoints] -->|Agent| EDR[EDR]
    SIEM -->|Alert| SOAR[SOAR]
    EDR -->|Alert| SOAR
    SOAR -->|Create| Ticket[Ticketing]
    Ticket -->|Track| Analyst[SOC Analyst]

A fully functional SOC requires the following core components:

1.1 SIEM (Security Information and Event Management)

  • Purpose: Centralized log aggregation, correlation, and alerting.
  • Requirements:
    • High availability and scalability.
    • Retention policy compliance (e.g., 90 days hot, 1 year cold).
    • Support for common log formats (Syslog, CEF, JSON).

1.2 EDR (Endpoint Detection and Response)

  • Purpose: Real-time monitoring and prevention on endpoints.
  • Deployment: Agents must be deployed to all workstations, servers, and critical assets.
  • Policy: Enforce prevention policies (Block/Quarantine) for known malware.

1.3 SOAR (Security Orchestration, Automation, and Response)

  • Purpose: Automate repetitive tasks and orchestrate incident response workflows.
  • Integration: Must connect with SIEM, EDR, and Ticketing systems.

1.4 Ticketing / Case Management

  • Purpose: Track incidents, investigations, and analyst activities.
  • Workflow: Seamless integration from SIEM alerts to case creation.

2. Infrastructure Hardening

2.1 Access Control

  • MFA: Enforce Multi-Factor Authentication for all SOC tools.
  • RBAC: Implement Role-Based Access Control (Analyst, Engineer, Manager).
  • Segmentation: SOC infrastructure should reside in a secure, segmented network zone.

2.2 Monitoring

  • Health Checks: Continuous monitoring of tool availability and performance.
  • Audit Logs: Enable audit logging for all SOC analyst actions.

3. Network Architecture

  • Log Shippers: Use dedicated forwarders to send logs to the SIEM securely (TLS encryption).
  • Jump Host: Use a secure Jump Host or VPN for administrative access to SOC infrastructure.

4. Tool Access Matrix

Tool Tier 1 Analyst Tier 2 Analyst Tier 3/IR SOC Engineer SOC Manager
SIEM (Read)
SIEM (Write/Config)
EDR (View/Triage)
EDR (Isolate/Contain)
SOAR (Execute Playbooks)
SOAR (Configure Workflows)
Ticketing (Create/Update)
Ticketing (Admin)
Firewall/Proxy (View Logs)
Firewall/Proxy (Block)

5. Health Check Schedule

Component Check Frequency Owner
SIEM Indexing Verify all parsers active, no queue backlog Hourly (automated) SOC Engineering
EDR Coverage Verify agent health on ≥95% endpoints Daily SOC Engineering
SOAR Connectivity Test all integrations (API health check) Daily SOC Engineering
Log Forwarding Confirm all critical sources reporting Every shift Shift Lead
Backup Status Verify last backup success Daily SOC Engineering
Certificate Expiry Check TLS certs for all SOC tools Weekly SOC Engineering

6. Initial Setup Checklist

# Task Owner Done
1 Provision network segment for SOC infrastructure Network Team
2 Deploy SIEM cluster with HA configuration SOC Engineering
3 Install EDR agents on all endpoints Endpoint Team
4 Configure SOAR integrations (SIEM, EDR, Ticketing) SOC Engineering
5 Set up ticketing system and workflow rules SOC Engineering
6 Enable audit logging on all SOC tools SOC Engineering
7 Configure MFA for all SOC analyst accounts IAM Team
8 Implement RBAC roles (Analyst, Engineer, Manager) IAM Team
9 Set up jump host / VPN access Network Team
10 Validate log ingestion from all critical sources SOC Engineering
11 Import baseline detection rules Detection Engineering
12 Conduct initial health check validation SOC Manager

Pre-Flight Validation Checklist

Before declaring the SOC operational, validate every component:

Infrastructure

□ SIEM server(s) provisioned and running
□ SIEM storage sized for 90-day hot retention
□ EDR management console accessible
□ EDR agents deployed to all endpoints (target: 95%+)
□ Network sensors deployed at critical egress points
□ Log forwarders (Filebeat/Winlogbeat/Syslog) running
□ Ticketing system configured with severity levels
□ SOAR platform connected to SIEM + EDR

Data Flow Validation

□ Firewall logs → SIEM (test: block event visible in SIEM)
□ Active Directory logs → SIEM (test: logon event visible)
□ DNS logs → SIEM (test: DNS query visible)
□ Email gateway logs → SIEM (test: email event visible)
□ Endpoint logs → SIEM (test: process event visible)
□ VPN logs → SIEM (test: VPN connect visible)
□ Cloud audit trail → SIEM (test: API call visible)

Alerting

□ At least 5 detection rules active
□ Test alert fires correctly (trigger and verify)
□ Alert routing to ticketing system works
□ Email/Slack/Teams notification works
□ Escalation phone tree tested
Priority Log Source Why EPS Estimate
🔴 P1 Firewall/IDS/IPS Network perimeter visibility 500-5,000
🔴 P1 Active Directory (DC) Authentication monitoring 200-2,000
🔴 P1 Email Gateway Phishing detection 100-1,000
🟠 P2 DNS C2 and tunneling detection 1,000-10,000
🟠 P2 EDR/Sysmon Endpoint behavior analysis 500-5,000
🟠 P2 Web Proxy Web-based threats 500-5,000
🟡 P3 VPN Remote access monitoring 50-500
🟡 P3 Cloud Trail (AWS/Azure/GCP) Cloud activity 100-1,000
🟢 P4 Database audit Data access monitoring 50-500
🟢 P4 WAF Web application attacks 100-1,000

Go-Live Notification Template

Send to all stakeholders when SOC is declared operational:

Subject: 🟢 SOC Go-Live — [Organization Name] Security Operations Center Active

Dear Team,

I am pleased to announce that the Security Operations Center (SOC) is
now officially operational as of [DATE/TIME].

### What This Means
- 24/7 security monitoring is now active
- All security alerts will be triaged within [SLA] minutes
- Incident response procedures are in effect

### Key Contacts
- SOC Phone: [NUMBER]
- SOC Email: soc@company.com
- Emergency Escalation: [MANAGER NAME] — [PHONE]

### What You Should Do
1. Report suspicious emails to soc@company.com
2. Do NOT attempt to investigate security issues yourself
3. Call the SOC hotline for urgent security concerns

### Coverage Hours
- Monitoring: 24/7/365
- Tier 1 Response: 24/7
- Tier 2/3 Response: Business hours + on-call

Thank you for your cooperation in keeping our organization secure.

[CISO Name]
Chief Information Security Officer

References