This forum uses cookies
This forum makes use of cookies to store your login information if you are registered, and your last visit if you are not. Cookies are small text documents stored on your computer; the cookies set by this forum can only be used on this website and pose no security risk. Cookies on this forum also track the specific topics you have read and when you last read them. Please confirm whether you accept or reject these cookies being set.

A cookie will be stored in your browser regardless of choice to prevent you being asked this question again. You will be able to change your cookie settings at any time using the link in the footer.

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
SOC MM
#5
(02-28-2020, 02:10 PM)fati Wrote: Hello, Iam working on a set up SOC project. The SOC will be managed by external service provider but I should identify use-case for a Financial institution. I have consulted the Magma Framework. I found that the framwork is concentrates on infrastructure uses-cases. I have already worked as security analyst for some SOC. Have you already worked on use-cases dedicated on finacial institutions? on cloud environments? Thank you for your help and advices
Hi Fati,
Have you got some feed-back on this request? There are several aspects in your inquiry that needs clarification. FSI use cases - or use cases in general is a challenging topic. I've worked for IBM, HP and some Deep Packet Inspection / forensics organisations ... and I'm a certified SOC architect / SOC operations ... and of course also on the QRadar platform. I'm familiar with SPLUNK, LogRyth, ELK and a few others. I've guided MSSPs to set up their business model and I've worked at MSSPs setting up their SOC services. In my world there some basic use cases (and that term also need to be defined) ... that I would always implement - no matter what industry sectors you belong to (energy/utility, manufacturing, transportation (mainly shipping in my pats of the woods), telecom, healthcare etc). From the limited time I had to look at the MaGMa framework - i think you will come - if not all the way, certainly a long way down the road. Its your compliance/legal and regulatory demands as well as your risk appetite and vulnerabilities that will/should determine the use-case priority. If you don't have that info, them you need to get your hands dirty - perform the needed scans, risk / gap analysis (you could use CIS 20-CSC, NIST CSF or other frameworks, verify with regular pen-tests etc. 
Not sure if this provide any clarity - otherwise, respond to this feed-back and I'll try to provide more meat to the bone :-)
Rgds, /NEA
Reply


Messages In This Thread
SOC MM - by Trustconsulting - 01-20-2020, 10:36 AM
RE: SOC MM - by robvanos - 01-22-2020, 04:13 PM
RE: SOC MM - by Trustconsulting - 01-28-2020, 01:07 PM
RE: SOC MM - by fati - 02-28-2020, 02:10 PM
RE: SOC MM - by NEA - 05-22-2020, 08:49 AM

Forum Jump:


Users browsing this thread: 1 Guest(s)