Standard SOC Infrastructure Setup¶
This document outlines the standard infrastructure requirements and setup procedures for a modern Security Operations Center (SOC).
1. Core Components¶
graph LR
Logs[Log Sources] -->|Ingest| SIEM[SIEM]
Endpoints[Endpoints] -->|Agent| EDR[EDR]
SIEM -->|Alert| SOAR[SOAR]
EDR -->|Alert| SOAR
SOAR -->|Create| Ticket[Ticketing]
Ticket -->|Track| Analyst[SOC Analyst]
A fully functional SOC requires the following core components:
1.1 SIEM (Security Information and Event Management)¶
- Purpose: Centralized log aggregation, correlation, and alerting.
- Requirements:
- High availability and scalability.
- Retention policy compliance (e.g., 90 days hot, 1 year cold).
- Support for common log formats (Syslog, CEF, JSON).
1.2 EDR (Endpoint Detection and Response)¶
- Purpose: Real-time monitoring and prevention on endpoints.
- Deployment: Agents must be deployed to all workstations, servers, and critical assets.
- Policy: Enforce prevention policies (Block/Quarantine) for known malware.
1.3 SOAR (Security Orchestration, Automation, and Response)¶
- Purpose: Automate repetitive tasks and orchestrate incident response workflows.
- Integration: Must connect with SIEM, EDR, and Ticketing systems.
1.4 Ticketing / Case Management¶
- Purpose: Track incidents, investigations, and analyst activities.
- Workflow: Seamless integration from SIEM alerts to case creation.
2. Infrastructure Hardening¶
2.1 Access Control¶
- MFA: Enforce Multi-Factor Authentication for all SOC tools.
- RBAC: Implement Role-Based Access Control (Analyst, Engineer, Manager).
- Segmentation: SOC infrastructure should reside in a secure, segmented network zone.
2.2 Monitoring¶
- Health Checks: Continuous monitoring of tool availability and performance.
- Audit Logs: Enable audit logging for all SOC analyst actions.
3. Network Architecture¶
- Log Shippers: Use dedicated forwarders to send logs to the SIEM securely (TLS encryption).
- Jump Host: Use a secure Jump Host or VPN for administrative access to SOC infrastructure.
4. Tool Access Matrix¶
| Tool | Tier 1 Analyst | Tier 2 Analyst | Tier 3/IR | SOC Engineer | SOC Manager |
|---|---|---|---|---|---|
| SIEM (Read) | ✅ | ✅ | ✅ | ✅ | ✅ |
| SIEM (Write/Config) | ❌ | ❌ | ✅ | ✅ | ✅ |
| EDR (View/Triage) | ✅ | ✅ | ✅ | ✅ | ✅ |
| EDR (Isolate/Contain) | ❌ | ✅ | ✅ | ✅ | ✅ |
| SOAR (Execute Playbooks) | ✅ | ✅ | ✅ | ✅ | ✅ |
| SOAR (Configure Workflows) | ❌ | ❌ | ✅ | ✅ | ✅ |
| Ticketing (Create/Update) | ✅ | ✅ | ✅ | ✅ | ✅ |
| Ticketing (Admin) | ❌ | ❌ | ❌ | ✅ | ✅ |
| Firewall/Proxy (View Logs) | ❌ | ✅ | ✅ | ✅ | ✅ |
| Firewall/Proxy (Block) | ❌ | ❌ | ✅ | ✅ | ✅ |
5. Health Check Schedule¶
| Component | Check | Frequency | Owner |
|---|---|---|---|
| SIEM Indexing | Verify all parsers active, no queue backlog | Hourly (automated) | SOC Engineering |
| EDR Coverage | Verify agent health on ≥95% endpoints | Daily | SOC Engineering |
| SOAR Connectivity | Test all integrations (API health check) | Daily | SOC Engineering |
| Log Forwarding | Confirm all critical sources reporting | Every shift | Shift Lead |
| Backup Status | Verify last backup success | Daily | SOC Engineering |
| Certificate Expiry | Check TLS certs for all SOC tools | Weekly | SOC Engineering |
6. Initial Setup Checklist¶
| # | Task | Owner | Done |
|---|---|---|---|
| 1 | Provision network segment for SOC infrastructure | Network Team | ☐ |
| 2 | Deploy SIEM cluster with HA configuration | SOC Engineering | ☐ |
| 3 | Install EDR agents on all endpoints | Endpoint Team | ☐ |
| 4 | Configure SOAR integrations (SIEM, EDR, Ticketing) | SOC Engineering | ☐ |
| 5 | Set up ticketing system and workflow rules | SOC Engineering | ☐ |
| 6 | Enable audit logging on all SOC tools | SOC Engineering | ☐ |
| 7 | Configure MFA for all SOC analyst accounts | IAM Team | ☐ |
| 8 | Implement RBAC roles (Analyst, Engineer, Manager) | IAM Team | ☐ |
| 9 | Set up jump host / VPN access | Network Team | ☐ |
| 10 | Validate log ingestion from all critical sources | SOC Engineering | ☐ |
| 11 | Import baseline detection rules | Detection Engineering | ☐ |
| 12 | Conduct initial health check validation | SOC Manager | ☐ |
Pre-Flight Validation Checklist¶
Before declaring the SOC operational, validate every component:
Infrastructure¶
□ SIEM server(s) provisioned and running
□ SIEM storage sized for 90-day hot retention
□ EDR management console accessible
□ EDR agents deployed to all endpoints (target: 95%+)
□ Network sensors deployed at critical egress points
□ Log forwarders (Filebeat/Winlogbeat/Syslog) running
□ Ticketing system configured with severity levels
□ SOAR platform connected to SIEM + EDR
Data Flow Validation¶
□ Firewall logs → SIEM (test: block event visible in SIEM)
□ Active Directory logs → SIEM (test: logon event visible)
□ DNS logs → SIEM (test: DNS query visible)
□ Email gateway logs → SIEM (test: email event visible)
□ Endpoint logs → SIEM (test: process event visible)
□ VPN logs → SIEM (test: VPN connect visible)
□ Cloud audit trail → SIEM (test: API call visible)
Alerting¶
□ At least 5 detection rules active
□ Test alert fires correctly (trigger and verify)
□ Alert routing to ticketing system works
□ Email/Slack/Teams notification works
□ Escalation phone tree tested
Recommended Log Sources Priority¶
| Priority | Log Source | Why | EPS Estimate |
|---|---|---|---|
| 🔴 P1 | Firewall/IDS/IPS | Network perimeter visibility | 500-5,000 |
| 🔴 P1 | Active Directory (DC) | Authentication monitoring | 200-2,000 |
| 🔴 P1 | Email Gateway | Phishing detection | 100-1,000 |
| 🟠 P2 | DNS | C2 and tunneling detection | 1,000-10,000 |
| 🟠 P2 | EDR/Sysmon | Endpoint behavior analysis | 500-5,000 |
| 🟠 P2 | Web Proxy | Web-based threats | 500-5,000 |
| 🟡 P3 | VPN | Remote access monitoring | 50-500 |
| 🟡 P3 | Cloud Trail (AWS/Azure/GCP) | Cloud activity | 100-1,000 |
| 🟢 P4 | Database audit | Data access monitoring | 50-500 |
| 🟢 P4 | WAF | Web application attacks | 100-1,000 |
Go-Live Notification Template¶
Send to all stakeholders when SOC is declared operational:
Subject: 🟢 SOC Go-Live — [Organization Name] Security Operations Center Active
Dear Team,
I am pleased to announce that the Security Operations Center (SOC) is
now officially operational as of [DATE/TIME].
### What This Means
- 24/7 security monitoring is now active
- All security alerts will be triaged within [SLA] minutes
- Incident response procedures are in effect
### Key Contacts
- SOC Phone: [NUMBER]
- SOC Email: soc@company.com
- Emergency Escalation: [MANAGER NAME] — [PHONE]
### What You Should Do
1. Report suspicious emails to soc@company.com
2. Do NOT attempt to investigate security issues yourself
3. Call the SOC hotline for urgent security concerns
### Coverage Hours
- Monitoring: 24/7/365
- Tier 1 Response: 24/7
- Tier 2/3 Response: Business hours + on-call
Thank you for your cooperation in keeping our organization secure.
[CISO Name]
Chief Information Security Officer