This section dives into how Security Operations Centers (SOC) manage and respond to incidents effectively, as well as how they proactively search for hidden threats through threat hunting.
The incident handling process is a structured approach SOC teams use to detect, analyze, and respond to security incidents. Let’s explore each step in detail.
Threat hunting is a proactive approach to discovering hidden threats that might not have triggered any alerts. Unlike incident detection, which is reactive, threat hunting actively searches for malicious activity in the environment.
Formulate a Hypothesis:
Analyze Logs:
Validate Findings:
Imagine a scenario where a SOC analyst notices a sudden increase in DNS queries to an external domain. This could be a sign of:
Steps:
Both processes work together to strengthen an organization’s security posture and reduce the likelihood of successful cyberattacks.
Incident handling follows well-established industry frameworks that guide SOC teams in detecting, containing, and mitigating security threats. Two of the most widely used frameworks are:
The National Institute of Standards and Technology (NIST) provides a structured approach to handling security incidents:
The SANS Institute provides a similar framework, widely adopted by SOC teams:
Optimization Tip: Include NIST/SANS frameworks in SOC training to ensure all analysts follow standardized incident response procedures.
SOC teams have a well-defined tiered structure to efficiently handle security incidents and cyber threats.
| SOC Role | Responsibilities |
|---|---|
| Tier 1 SOC Analyst | Monitors SIEM alerts 24/7, performs initial triage, and escalates confirmed threats. |
| Tier 2 SOC Analyst | Conducts deeper forensic investigations, correlates logs, and performs threat hunting. |
| Tier 3 SOC Expert (Threat Hunter) | Focuses on proactive threat hunting, malware analysis, and custom detection rules. |
| SOC Manager | Oversees SOC operations, ensures team efficiency, and manages incident response strategy. |
| Threat Intelligence Analyst | Collects and analyzes external threat intelligence, maps attacker behaviors to MITRE ATT&CK, and enhances detection capabilities. |
Optimization Tip: Clearly define SOC roles and responsibilities to improve efficiency in incident handling and threat hunting.
SOC threat hunting is an active approach to finding threats that might evade automated detection. In addition to hypothesis-driven hunting, SOC analysts use:
Tools: FortiSIEM, FortiAnalyzer, VirusTotal, Threat Intelligence Platforms (TIPs)
Tools: FortiAnalyzer, SIEM UEBA module, AI-powered anomaly detection
Optimization Tip: Train SOC analysts in both IOC-based and behavior-based threat hunting to identify both known and unknown threats.
Optimization Tip: Integrate SOAR playbooks with SIEM to automate common response actions, such as blocking malicious domains or quarantining infected endpoints.
SOC teams need to continuously evaluate their effectiveness using Key Performance Indicators (KPIs):
Optimization Tip: Use MTTD and MTTR to identify bottlenecks in SOC response time and optimize security processes.
To strengthen SOC Operations, the following areas were enhanced:
What is the purpose of an event handler in FortiAnalyzer SOC operations?
An event handler detects suspicious activity by applying predefined rules to log data and generating alerts when conditions are met.
Event handlers analyze incoming logs from devices such as FortiGate firewalls. They apply correlation rules that identify security-relevant patterns such as repeated login failures, malware detections, or suspicious traffic behavior. When a rule condition is triggered, the system generates an alert that appears in the SOC dashboard. Analysts use these alerts to begin investigations. Event handlers are essential because they convert raw log data into actionable security events. Without them, analysts would need to manually review massive volumes of logs, making detection inefficient.
Demand Score: 87
Exam Relevance Score: 93
How are security incidents created in FortiAnalyzer SOC?
Security incidents are created when related events are correlated and grouped together to represent a potential attack scenario.
FortiAnalyzer collects logs from security devices and processes them using detection rules. When multiple related events occur, such as malware detection followed by suspicious outbound communication, the system correlates them and creates an incident. An incident provides analysts with a structured investigation case that includes associated alerts, timeline data, affected hosts, and threat indicators. This grouping helps analysts understand the full context of an attack instead of analyzing individual alerts separately. Incident management also allows SOC teams to track investigation progress and response actions.
Demand Score: 90
Exam Relevance Score: 95
What role do threat hunting dashboards play in SOC operations?
Threat hunting dashboards help analysts proactively search for suspicious activity that automated detection systems may have missed.
While alerts identify known attack patterns, threat hunting focuses on discovering hidden or emerging threats. Dashboards provide visual analytics showing network behavior, unusual traffic patterns, abnormal login activity, or compromised endpoints. Analysts use these dashboards to identify anomalies that might indicate attacker activity even if no alert was triggered. This proactive approach allows SOC teams to detect advanced threats earlier and reduce dwell time—the period attackers remain undetected in the network.
Demand Score: 83
Exam Relevance Score: 89
Why is IOC analysis important during incident investigation?
IOC analysis helps analysts confirm malicious activity by identifying known indicators associated with attacks.
Indicators of Compromise include suspicious IP addresses, malicious domains, file hashes, or abnormal processes. When investigating an incident, analysts compare these indicators against threat intelligence databases or internal logs. If an IOC matches known malicious activity, it provides strong evidence that the system may be compromised. IOC analysis also helps identify additional affected systems by searching for the same indicators across the network. This process allows SOC teams to understand the scope of an attack and respond effectively.
Demand Score: 84
Exam Relevance Score: 90
Why is event correlation important for SOC analysts during investigations?
Event correlation allows analysts to identify attack patterns by linking related security events together.
Attackers rarely generate a single alert. Instead, attacks usually involve a sequence of actions across multiple systems. Event correlation analyzes these related events to identify the broader attack pattern. For example, a phishing email followed by credential use and abnormal data transfers could indicate a successful compromise. By correlating logs across devices, SOC platforms reveal relationships that individual events cannot show. This capability significantly improves detection accuracy and speeds up investigations.
Demand Score: 81
Exam Relevance Score: 88
What information should SOC analysts collect when investigating a compromised host?
Analysts should collect logs, running processes, network connections, file hashes, and system activity related to the suspected compromise.
Investigating a compromised host requires gathering detailed forensic data to determine how the attacker entered and what actions were performed. Analysts review system logs, process lists, active network connections, and suspicious files. They may also check login history, privilege escalation attempts, and command execution records. This information helps determine whether malware is present, whether data was exfiltrated, and whether the attacker moved laterally to other systems. Proper evidence collection ensures the SOC team can understand the full attack lifecycle and implement effective remediation.
Demand Score: 85
Exam Relevance Score: 91