Lecture 5 Flashcards

SOC Metrics and Maturity Models

1
Q

What is the purpose of a SOC maturity model?

A

To understand the current quality of SOC services, develop a roadmap for improvement, and predict and request budgets for SOC services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the five levels of maturity in the CMMI Institute example.

A

Initial, Managed, Defined, Quantitatively Managed, and Optimizing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are SOC Goal Assessment Process steps?

A

Meet with the SOC executive sponsor, develop SOC goals, create IT processes, identify missing people, processes, or technology, and validate results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the significance of ranking business goals in a SOC?

A

To determine how to prioritize goals and ensure alignment with the organization’s overall mission and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the Cyber Kill Chain Model apply to threat assessment?

A

By breaking down the stages of an attack to understand and counteract each stage effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Diamond Model in cybersecurity?

A

A model that maps how an adversary targets a victim using capabilities and infrastructure to launch an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the MITRE ATT&CK Model benefit SOCs?

A

By simulating adversary tactics and techniques based on real-world observations to enhance threat detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is it important to perform a capability map in a SOC?

A

To identify different parts of the network and how users and systems interact, aiding in understanding defense-in-depth architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a gap analysis in SOC capability assessment?

A

To evaluate the capability map for gaps and overlapping services, helping to prioritize areas for improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the first-generation SOC maturity model.

A

A SOC that primarily monitors device logs with limited coverage based on the data monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a second-generation SOC improve upon the first-generation?

A

By leveraging data correlation and consolidation to turn log data into security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What additional services are offered by a third-generation SOC?

A

Vulnerability management and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of a fourth-generation SOC?

A

Leveraging the latest SOC technologies and services, expanding visibility to other networks using threat intelligence and reputation security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the importance of having an executive sponsor for a SOC?

A

To help enforce SOC policies, validate business goals, and align SOC IT goals with organizational objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key milestones in SOC development?

A

Identifying executive sponsors, establishing the SOC program, developing a budget, recruiting talent, and acquiring technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly