Cyber onboarding is ‘broken'

Cyber security operations centre (CSOC) is a horizontal business function responsible primarily for managing cyber incidents, in addition to cyber-attack detection, security monitoring, security incident triage, analysis and coordination. To monitor systems, networks, applications and services the C...

Full description

Bibliographic Details
Main Authors: Onwubiko, Cyril, Ouazzane, Karim
Format: Conference or Workshop Item
Language:English
Published: 2019
Subjects:
Online Access:https://repository.londonmet.ac.uk/4802/1/Cyber%20Onboarding%20is%20Broken-IEEE-Oxford_Camera_Ready.pdf
_version_ 1825625366330343424
author Onwubiko, Cyril
Ouazzane, Karim
author_facet Onwubiko, Cyril
Ouazzane, Karim
author_sort Onwubiko, Cyril
collection LMU
description Cyber security operations centre (CSOC) is a horizontal business function responsible primarily for managing cyber incidents, in addition to cyber-attack detection, security monitoring, security incident triage, analysis and coordination. To monitor systems, networks, applications and services the CSOC must first on-board the systems and services onto their security monitoring and incident management platforms. Cyber Onboarding (a.k.a. Onboarding) is a specialist technical process of setting up and configuring systems and services to produce appropriate events, logs and metrics which are monitored through the CSOC security monitoring and incident management platform. First, logging must be enabled on the systems and applications, second, they must produce the right set of computing and security logs, events, traps and messages which are analysed by the detection controls, security analytics systems and security event monitoring systems such as SIEM, and sensors etc.; and further, network-wide information e.g. flow data, heartbeats and network traffic information are collected and analysed, and finally, threat intelligence data are ingested in real-time to detect, or be informed of threats which are out in the wild. While setting up a CSOC could be straightforward, unfortunately, the ‘people’ and ‘process’ aspects that underpin the CSOC are often challenging, complicated and occasionally unworkable. In this paper, CSOC and Cyber Onboarding are thoroughly discussed, and the differences between SOC vs SIEM are explained. Key challenges to Cyber Onboarding are identified through the reframing matrix methodology, obtained from four notable perspectives – Cyber Onboarding Perspective, CSOC Perspective, Client Perspective and Senior Management Team Perspective. Each of the views and interests are discussed, and finally, recommendations are provided based on lessons learned implementing CSOCs for many organisations – e.g. government departments, financial institutions and private sectors.
first_indexed 2024-07-09T03:58:15Z
format Conference or Workshop Item
id oai:repository.londonmet.ac.uk:4802
institution London Metropolitan University
language English
last_indexed 2024-07-09T03:58:15Z
publishDate 2019
record_format eprints
spelling oai:repository.londonmet.ac.uk:48022021-03-15T10:30:16Z https://repository.londonmet.ac.uk/4802/ Cyber onboarding is ‘broken' Onwubiko, Cyril Ouazzane, Karim 000 Computer science, information & general works Cyber security operations centre (CSOC) is a horizontal business function responsible primarily for managing cyber incidents, in addition to cyber-attack detection, security monitoring, security incident triage, analysis and coordination. To monitor systems, networks, applications and services the CSOC must first on-board the systems and services onto their security monitoring and incident management platforms. Cyber Onboarding (a.k.a. Onboarding) is a specialist technical process of setting up and configuring systems and services to produce appropriate events, logs and metrics which are monitored through the CSOC security monitoring and incident management platform. First, logging must be enabled on the systems and applications, second, they must produce the right set of computing and security logs, events, traps and messages which are analysed by the detection controls, security analytics systems and security event monitoring systems such as SIEM, and sensors etc.; and further, network-wide information e.g. flow data, heartbeats and network traffic information are collected and analysed, and finally, threat intelligence data are ingested in real-time to detect, or be informed of threats which are out in the wild. While setting up a CSOC could be straightforward, unfortunately, the ‘people’ and ‘process’ aspects that underpin the CSOC are often challenging, complicated and occasionally unworkable. In this paper, CSOC and Cyber Onboarding are thoroughly discussed, and the differences between SOC vs SIEM are explained. Key challenges to Cyber Onboarding are identified through the reframing matrix methodology, obtained from four notable perspectives – Cyber Onboarding Perspective, CSOC Perspective, Client Perspective and Senior Management Team Perspective. Each of the views and interests are discussed, and finally, recommendations are provided based on lessons learned implementing CSOCs for many organisations – e.g. government departments, financial institutions and private sectors. 2019-06 Conference or Workshop Item PeerReviewed text en cc_by_nc_nd https://repository.londonmet.ac.uk/4802/1/Cyber%20Onboarding%20is%20Broken-IEEE-Oxford_Camera_Ready.pdf Onwubiko, Cyril and Ouazzane, Karim (2019) Cyber onboarding is ‘broken'. In: Cyber Security 2019: International Conference on Cyber Security and Protection of Digital Services, 3-4 June 2019, University of Oxford, UK. https://www.c-mric.com/cs2019
spellingShingle 000 Computer science, information & general works
Onwubiko, Cyril
Ouazzane, Karim
Cyber onboarding is ‘broken'
title Cyber onboarding is ‘broken'
title_full Cyber onboarding is ‘broken'
title_fullStr Cyber onboarding is ‘broken'
title_full_unstemmed Cyber onboarding is ‘broken'
title_short Cyber onboarding is ‘broken'
title_sort cyber onboarding is broken
topic 000 Computer science, information & general works
url https://repository.londonmet.ac.uk/4802/1/Cyber%20Onboarding%20is%20Broken-IEEE-Oxford_Camera_Ready.pdf
work_keys_str_mv AT onwubikocyril cyberonboardingisbroken
AT ouazzanekarim cyberonboardingisbroken