ResearchSpace

Integrating a security operations centre with an organization's existing procedures, policies and information technology systems

Show simple item record

dc.contributor.author Mutemwa, Muyowa
dc.contributor.author Mtsweni, Jabu S
dc.contributor.author Zimba, Lukhanyo
dc.date.accessioned 2019-01-16T11:13:40Z
dc.date.available 2019-01-16T11:13:40Z
dc.date.issued 2018-12
dc.identifier.citation Mutemwa, M., Mtsweni, J.S. and Zimba, L. 2018. Integrating a security operations centre with an organization's existing procedures, policies and information technology systems. 2018 International Conference on Intelligent & Innovative Computing Applications (ICONIC), 6-7 December 2018, Mauritius en_US
dc.identifier.isbn 978-1-5386-6476-6
dc.identifier.uri http://mauricon.org/wp-content/uploads/2018/12/Mauricon-2018-Conference-Proceedings-44423-041218.pdf
dc.identifier.uri http://hdl.handle.net/10204/10602
dc.description Paper presented at the 2018 International Conference on Intelligent & Innovative Computing Applications (ICONIC), 6-7 December 2018, Mauritius en_US
dc.description.abstract A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component therefore there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, webservers, etc. for security posture monitoring. That is, which systems need to be monitored first and the order by which the rest of the systems follow. Secondly the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and nontechnical employees of an organization. Also, the priority matrix for incident types and notifications of incidents. Thirdly the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly the paper looks at how to show value for the large investments that are poured into designing, building and running an SOC. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;21814
dc.subject Cybersecurity Operation Centre en_US
dc.subject Priority matrix en_US
dc.subject Procedures and policies en_US
dc.title Integrating a security operations centre with an organization's existing procedures, policies and information technology systems en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Mutemwa, M., Mtsweni, J. S., & Zimba, L. (2018). Integrating a security operations centre with an organization's existing procedures, policies and information technology systems. http://hdl.handle.net/10204/10602 en_ZA
dc.identifier.chicagocitation Mutemwa, Muyowa, Jabu S Mtsweni, and Lukhanyo Zimba. "Integrating a security operations centre with an organization's existing procedures, policies and information technology systems." (2018): http://hdl.handle.net/10204/10602 en_ZA
dc.identifier.vancouvercitation Mutemwa M, Mtsweni JS, Zimba L, Integrating a security operations centre with an organization's existing procedures, policies and information technology systems; 2018. http://hdl.handle.net/10204/10602 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Mutemwa, Muyowa AU - Mtsweni, Jabu S AU - Zimba, Lukhanyo AB - A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component therefore there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, webservers, etc. for security posture monitoring. That is, which systems need to be monitored first and the order by which the rest of the systems follow. Secondly the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and nontechnical employees of an organization. Also, the priority matrix for incident types and notifications of incidents. Thirdly the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly the paper looks at how to show value for the large investments that are poured into designing, building and running an SOC. DA - 2018-12 DB - ResearchSpace DP - CSIR KW - Cybersecurity Operation Centre KW - Priority matrix KW - Procedures and policies LK - https://researchspace.csir.co.za PY - 2018 SM - 978-1-5386-6476-6 T1 - Integrating a security operations centre with an organization's existing procedures, policies and information technology systems TI - Integrating a security operations centre with an organization's existing procedures, policies and information technology systems UR - http://hdl.handle.net/10204/10602 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record