Menu

SOC: To outsource or not to outsource?

This post comes from Greg Boison, director of homeland and cybersecurity at Lockheed Martin, who was part of the Transforming SOCs roundtable discussion at the recent Gartner Security & Risk Management Summit. The following is his summary of the discussion.

Running your own SOC

While walking the floor and listening to the sessions at the Gartner Risk and Security Summit, a key issue crystallized for me around Security Operations Center (SOC) transformation.  Why is everyone building their own SOC?

For certain large-scale critical enterprises, a SOC is a must. But for the majority of enterprises, there is a need to determine one’s comparative advantage and understand where security should fall. Companies have two macro options when it comes to a SOC: build your own or fully outsource.

While no one wants to be reliant on an external party for what is a critical function, many businesses outsource critical functions such as payment processing, payroll, advertising, accounting, and legal.  When these functions are managed by an external entity, the other party is committing to staff the roles and can leverage economies of scale to ensure effective staffing or be terminated. 

But when a function is fully outsourced, an organization still requires an effective manager of that relationship. This manager needs to be a liaison with the sophistication and skillset to effectively supervise that relationship or else there will be tremendous waste or security risks.

In between these two extremes, one might band together with like organizations to create a shared SOC; such as several universities working together or several not-for-profit organizations of scale.  Akin to an ISAC with teeth, arms and legs, this organization would benefit from economies of scale while leveraging focused attention and an understanding of unique threats or capability needs.

An additional advantage to some outsourcing is the information sharing that will occur in an MSSP or system integrator with significant cyber responsibilities.  In our own activities at Lockheed Martin, we see our employees rotate into various roles supporting customers in civil federal agencies, defense, the intelligence community, and commercial critical infrastructure organizations. These “phone a friend” informal networks often precede more formal exchanges of threat intelligence and networking that can significantly elevate the maturity of one’s network defenses. 

If an enterprise does all of the analysis, and still requires a dedicated internal SOC, they need to analyze:

  • What percentage of their SOC resources, such as personnel, tools, training, processes, should be homegrown or leveraged by industry standards or contractor workforces;
  • Whether tools should be commodity or bespoke; and
  • How training can best occur, or should a training program be leveraged from an external provider or developed specific to their enterprise or mission. 

For the auditors, risk managers, network subject matter experts, and help desk technicians in small to medium enterprises to be expected to defend on par with CISSPs with years of experience who moonlight as ethical hackers is an unrealistic ideal.  Let us look to analogies throughout industry of defining comparative advantages and core competencies to determine the right mix of cyber focused enterprises and in the process improve the defenses of the economy and federal missions.

A focus on an intelligence-driven response can provide the resiliency to bounce back from a successful intrusion and continue gathering new levels of actionable intelligence.  But when an enterprise lacks the size or maturity to embrace true intelligence-driven defense, outsourcing can provide the expertise to transform a security operations center to an improve security intelligence posture. This continuum of security operations and security intelligence may provide a useful construct to plotting an enterprise’s transformation to defend against adversaries and effectively spend scarce budget resources.  

Posted on June 17, 2015

RSAC Contributor

by RSAC Contributor

RSA Conference

← View more Blogs

This document was retrieved from http://www.rsaconference.com/blogs/soc-to-outsource-or-not-to-outsource on Fri, 24 Nov 2017 05:51:58 -0500.
© 2017 EMC Corporation. All rights reserved.