Security Operations Center (SOC): Basics, costs and benefits

What is a Security Operations Center?

A Security Operations Center (SOC) is a central unit that is responsible for monitoring, analysing and defending against cyber threats within an organization. Cyber attacks are increasing in frequency and sophistication. As an essential part of a robust cyber security strategy, a SOC helps to detect attackers early before they can cause significant damage.

In this blog post, we look at who needs a SOC and how it works. We also compare the benefits and challenges of setting up an in-house SOC with outsourcing to a managed service provider and look at the financial factors of both options.

Who needs a SOC?

Cyber attacks have become the number one threat to companies, regardless of their size or industry. The damage caused is varied and hits many unexpectedly:

  • Operational downtime: Paralyzed IT systems lead to productivity losses. Restoring systems can take time and resources.
  • Financial losses: In addition to losses due to operational downtime, further financial losses can result from the theft of funds or extortion through ransomware.
  • Data loss: Business secrets, intellectual property or customer data can be leaked or permanently lost.
  • Legal consequences: Data breaches can result in penalties and claims for damages.
  • Reputational damage: A successful cyber attack can have a negative impact on the trust and reputation of the affected company among customers, partners and the public.

Many companies take preventive security measures to avoid such scenarios. However, practice shows that a successful attack is often only a matter of time. Once affected, many questions arise: How did the attackers get into the system? Which systems are affected? What data has been lost? Has personal data been leaked? Is a report to the data protection authority necessary? And what information must be provided there? If these questions cannot be answered, there may even be legal consequences under the GDPR, KRITIS laws of the BSI or NIS-2.

A Security Operations Center makes a significant contribution to detecting potential attacks at an early stage, responding to them and minimizing potential damage. In the best-case scenario, the questions above do not even arise thanks to a SOC. Furthermore, in the event of an attack, the process and the scope of the affected systems and data can be precisely specified.

The short answer is therefore: every company that wants to protect its IT infrastructure and business-critical data and be prepared for an emergency should consider implementing a SOC.

How does a SOC work?

Cyber attacks usually take place in several phases: from reconnaissance of the target and identification of suitable attack methods, through initial attacks and the installation of a bridgehead, to control of the target systems (see Lockheed Martin's Cyber Kill Chain®), for example). A look at the statistics shows that attackers can often move around the system for weeks to months after the initial intrusion before they are discovered. In doing so, the attackers create traces that are reflected as digital footprints in the logs of the affected systems.

A Security Operations Center is designed to detect and stop attackers at every stage based on their footprints before they can cause any damage. The SOC essentially consists of a team of IT security experts who monitor a company's IT infrastructure around the clock.

Technologies and processes in a SOC

As a rule, a SIEM (Security Information and Event Management) plays a central role in the Security Operations Center. The SIEM analyzes the log data of all relevant systems in the network. These can be servers, firewalls, network devices, end devices or applications. If a suspicious pattern or behavior is detected, an alarm is triggered. This is analyzed and prioritized by a SOC analyst within a few minutes. They decide whether it is a false alarm or an actual threat and initiate further steps.

EDR solutions (Endpoint Detection and Response) can also be used. These run directly on the endpoints, such as desktops or laptops, and continuously analyze the activities taking place there. If a suspicious process is detected, it can be terminated automatically. Ransomware, for example, can be detected and stopped before any damage is done.

One of the main challenges in operating a SOC is to continuously improve the detection rate while at the same time reducing false alerts. Too many false alerts lead to SOC analyst fatigue, while actual attacks can be overlooked if visibility is too low. The systems used must therefore be continuously maintained and optimized to ensure efficient and effective operation.

Roles in a SOC

In addition to the processes, a SOC consists of clearly defined roles for the team members:

  • SOC analysts continuously analyze and prioritize incoming alarms and initiate countermeasures.
  • SOC engineers are responsible for the development, implementation and maintenance of the SOC's technical infrastructure.
  • SOC managers manage budgets and personnel. They are also the interface to other managers in the company.

There are often other roles, such as shift leads or threat hunters, who proactively search for threats. The specific distribution of roles can vary depending on the SOC. In any case, the processes and roles of the team members are clearly defined to ensure that the company is effectively protected against cyber attacks around the clock.

How does a SOC work in practice?

In this one-hour deep dive video, Tom Kinnaird (Cyber Services Practice Lead at Claranet UK) uses a simulated attack to show how a SOC can detect and defend against an attack in practice:

In-house vs. managed SOC

When setting up a Security Operations Center, companies are faced with the decision between an in-house and a managed SOC service.

An in-house SOC is set up and operated by the company itself. It offers complete control and particularly individual adaptation to the company's own needs. A major challenge when setting up an in-house SOC is the recruitment of qualified personnel. According to the SANS 2023 SOC Survey , a SOC size of 11 to 25 team members is the most common, with larger companies having up to 100.

A managed SOC is operated by an external service provider. Cyber security experts ensure monitoring and maximum response speed around the clock (Managed Detection and Response, MDR). However, companies must relinquish some control over their IT systems and find a suitable provider that meets their requirements. Once booked, a managed SOC offers maximum flexibility and scalability.

The choice between an in-house SOC and a managed SOC ultimately depends on a company's specific requirements and resources. In any case, we recommend that you carefully calculate and compare the total costs for both options.

Total cost consideration and return on investment

The decision to set up a Security Operations Center involves significant investment, which many companies initially shy away from.

For a differentiated view, it is important to first consider the (total cost of ownership (TCO)) . While the costs of a managed SOC can be read from the offer of the respective provider, determining the total costs of an in-house SOC requires the summation of all costs for setup and operation. This includes costs for personnel, technology, software licenses and premises, as well as ongoing costs for the further development of systems and employees. In most cases, the final sum is higher than the costs of specialized managed SOC providers, who benefit from economies of scale, among other things. Another advantage of booking a Managed SOC is that expenditure is easier to plan.

When it comes to investing in IT security, however, a purely cost-based approach falls short. IT security is not an end in itself, but rather an essential investment in a successful future. A SOC helps you to reduce potential damage caused by cyber attacks and the associated costs due to losses, downtime, reputational damage or legal consequences. In business administration, the return on investment (RoI) is often calculated when it comes to the quantifiable benefits of an investment. This involves calculating the return on an investment in relation to the associated costs. As security investments do not generate any direct income, the classic definition falls short. An interesting alternative is the return on security investment (RoSI). The key figure aims to determine how much damage could be avoided by the IT security investment.

Conclusion

A Security Operations Center is an essential component of an effective cyber security strategy. By looking at the overall costs and benefits, it becomes clear that the decision to invest in a SOC is a sensible and profitable investment. Both in-house and managed SOCs offer advantages. Companies should choose the operating model that best suits their requirements.

Practical check: Which SOC solutions are best for my company?

The rapid development of new technologies and the multitude of solution approaches do not always make it easy for decision-makers to find the right strategy. Many ask themselves:

  • Which technical solutions are best suited to my company?
  • How can they be implemented and integrated into existing structures?
  • What impact does a SOC have on my employees and processes?
  • Do I build it myself or do I rely on a specialized provider?
  • And last but not least: What will the whole thing cost?

The “Claranet SOC Assessment Workshop” helps you to find your way through the jungle of options: Together, we analyze your requirements and risks in order to develop the optimal combination of technologies, processes and skills. Have I piqued your interest? Then send a message using the contact form below to receive further information and a non-binding offer.