Modernize Your SOC: Why, Training & Resources

Note: This blog will contain resources and material from various sources including, Ignite, and one of my cybersecurity heros: Mark Simos. This blog is not meant to be a replacement for any of these resources – but rather a collection that can be easily referenced.

The digital estate from which defenders must protect, is rapidly evolving from traditional desktops and laptops to smartphone, IoT devices and even cloud SaaS applications. This changes the perimeter of the environment, and results in a different approach to defend this perimeter. As the assets we are protecting changes, so do the types of threats that we must protect against – and as a result our defenders and their people, process, and technology must evolve.

When you look at the Kill Chain, how cybersecurity professionals view the framework of a breach, there are different phases in an attack – and in order to properly defend against these advanced attacks a defense in depth model must be part of your approach.

The Cybersecurity Kill Chain
Defense in Depth Approach to Cybersecurity

Security Operations Centers or “SOCs” monitor an organization’s IT environment for various cyber threats and typically consist of a wide range of tools, processes and different skill sets. However, given the evolution of the digital estate and types of threats today, the SOC must also evolve.

To better understand this rapidly changing landscape of threats and why we must evolve our approach to cybersecurity please review the “Minutes Matter” and “Motivation Matters” posters from our Cybersecurity Solutions Group ( and to download)

I recorded the following video on the importance of modernizing your security operations center – and specifically how Microsoft modernized it’s SOC:

Video: Modernize your Security Operations Center
Table of Contents: 00:29 The Modern Workplace Vision 01:28 Microsoft Runs on Trust 02:09 Protecting the Digital Estate 03:32 Microsoft’s Unique Approach to Cybersecurity 06:12 SOC Challenges 08:17 Attack Realities 08:53 The Microsoft Approach to the Modern SOC 10:47 Microsoft’s Realities 12:25 Working Together: Coordinated Response 14:31 Microsoft’s Approach (from Microsoft’s SOC) 16:42 Tooling Started with SIEM Model 18:04 Modern SOC Model 18:56 Rapid Modernization Plan 20:10 Security is a Team Sport 22:08 Key Learnings and Resources

Minutes Matter and the “Fusion Center Model”

In the video I talked about the concept of a “Fusion Center” where all teams come together in a centralized manner:

Lessons Learned from the Microsoft Security Operations Center

This concept of a fusion center is the cornerstone to a modern SOC, but doesn’t come without it’s own challenges. To expand on the lessons learned from Microsoft’s own SOC modernization, I invite you to read this series of blogs that will help you to understand what must occur to modernize your approach to security – This is a must read before going further!

Assume Breach Mindset

As we realize that cyber threats are evolving almost on a daily basis, our methodology and approach must evolve as well – this means a SOC must not only be reactive to threats, but proactive to hunt down and stop potential threats. Introduce, Threat Hunting. Microsoft’s approach to Threat Hunting involves tools like Azure Sentinel our SIEM + SOAR product in addition to using the MITRE ATT&CK framework.

I invite you to review the blog from Jonathan Trull, Microsoft General Manager of the Cybersecurity Solutions Group on why your SOC needs this capability. Threat hunting: Part 1—Why your SOC needs a proactive hunting team. In addition, review the following two sessions from Microsoft Ignite on this topic:

Leverage the Cloud

With the rapidly evolving threat landscape, when it comes to detection and remediation of these advanced threats seconds matter. With the introduction of Artificial Intelligence and Machine Learning, cloud based SIEM and SOAR products have the ability to correlate data quicker and even execute a remediation playbook faster than a human. As you modernize your SOC, you need to embrace cloud technologies to help you better secure your assets.

I invite you to review an excellent blog by Lesley Kipling and Anthony Petito from the Microsoft Detection and Response Team (DART) on how Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

Technical Skills and Capabilitiy

In my opinion the most important part of modernizing your security operations, is to take care of the security analysts and IT professionals on the front lines. It’s our duty to help them learn new skills and adapt to the changing landscape professionally. A key part of this is ensuring diversity among the skillsets. I encourage you to read the following blog by Ann Johnson Corporate Vice President Microsoft Cybersecurity Solutions Group How to solve the diversity problem in security

A few things I recommend to get started when it comes to technical skills development in cybersecurity:

Breaking Down Silos

In the video I discussed how SOC analysts are used to working in silos, whether it’s product specific silos or organizational silos. Attackers traverse silos, and unless your silos are talking to each other, attacks may go unnoticed.

“Attackers traverse silos, and unless your silos are talking to each other, attacks may go unnoticed.”

These silos must be integrated, where analysts can collaborate with their counterparts and share threat intelligence. Here’s a good visual that describes this:

Converging Tools & Data

Once the SOC teams are integrated, sharing intelligence and are able to collaborate, the tools and data also need to follow. The threat intelligence flowing in needs to automatically be correlated, and managed via a single interface – with the capability to automate response. A good example of this is using Microsoft Threat Protection and Azure Sentinel:

Note: Review Azure Sentinel Connectors to understand how to connect data sources from Microsoft Defender ATP, Azure ATP, Azure Active Directory, Microsoft Cloud App Security and more to Azure Sentinel.

Here is a good visual of the high level architecture of Azure Sentinel:

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s