SOC Operations

CASE STUDY
A ClearFocus client had recently formed a Security Operations Center (SOC) but was struggling with the roles, responsibilities and procedures to run an effective SOC.

PROCESS

ClearFocus conducted a review of business and technical processes from the existing SOC and identified a lack of clearly defined and documented roles, functions, and requirements which contributed to an environment where staff lacked clear authorities to implement the cybersecurity mission. ClearFocus staff conducted a review of applicable law, regulations, policy, and agency requirements, and mapped requirements to clearly defined roles and functions aligned to the NIST 800-181 Cybersecurity workforce framework. ClearFocus then developed tailored, repeatable cybersecurity processes leveraging technology to enhance overall SOC effectiveness, while also realizing efficiencies through automation of manual operations processes that enabled responses at machine speed.

RESULT

By clearly defining the mission, roles, responsibilities, functions, and requirements, ClearFocus was able to develop a Concept of Operations (CONOPS) and procedural documents to foster an environment where cybersecurity staff understood their roles and were able to take action on incidents and events. ClearFocus further helped by providing expert technical leadership to the teams to address and resolve lingering issues which had negatively impacted the cybersecurity mission in the past. This included providing leadership to security engineering, vulnerability management, threat intel analysis, situational awareness, audit log collection and monitoring, and incident response activities.

Case Studies.

We are innovators. Our consultants have the right mix of talent, creativity, process and technology to ensure every initiative we undertake has successful outcomes and meets mission objectives.

Industrial Control Systems

Industrial Control Systems (ICS) that support our nation’s critical infrastructure and manufacturing are vulnerable to cyber-attacks. Our nation’s energy grid, chemical plants, water treatment plants, manufacturing plants and other public and private sectors that use cyber physical systems have been the target of cyber-attacks in recent years, and these systems, if compromised, can cause serious harm and even loss of life. 

Cybersecurity Modernization

One of ClearFocus federal clients wanted to modernize their existing cybersecurity program since the organization was not able to address several federally mandated security requirements. Additionally, new standards like the Risk Management Framework (RMF) require new processes, technology and approaches to meet the NIST SP 800-37 requirements.

SOC Operations

A ClearFocus client had recently formed a Security Operations Center (SOC) but was struggling with the roles, responsibilities and procedures to run an effective SOC.

Establishing a Threat Defense Life Cycle

Cyber threats and the sophistication of cyber-attacks continue to increase. Yet, today’s cyber defenses may not be adequate to stop tomorrow’s cyber-attack. By now, most enterprises have invested in cyber defenses, deploying a myriad of cybersecurity tools to protect their information assets…but have they really reduced the risk of breach?

Industrial Control Systems

Industrial Control Systems (ICS) that support our nation’s critical infrastructure and manufacturing are vulnerable to cyber-attacks. Our nation’s energy grid, chemical plants, water treatment plants, manufacturing plants and other public and private sectors that use cyber physical systems have been the target of cyber-attacks in recent years, and these systems, if compromised, can cause serious harm and even loss of life. 

Cybersecurity Modernization

One of ClearFocus federal clients wanted to modernize their existing cybersecurity program since the organization was not able to address several federally mandated security requirements. Additionally, new standards like the Risk Management Framework (RMF) require new processes, technology and approaches to meet the NIST SP 800-37 requirements.

SOC Operations

A ClearFocus client had recently formed a Security Operations Center (SOC) but was struggling with the roles, responsibilities and procedures to run an effective SOC.

Establishing a Threat Defense Life Cycle

Cyber threats and the sophistication of cyber-attacks continue to increase. Yet, today’s cyber defenses may not be adequate to stop tomorrow’s cyber-attack. By now, most enterprises have invested in cyber defenses, deploying a myriad of cybersecurity tools to protect their information assets…but have they really reduced the risk of breach?