Cyber Law Academy
Part 13.6

SOC and SIEM

"Eyes on Your Network 24x7"

Security Operations Center setup, SIEM implementation, log management, 180-day retention requirements, NTP synchronization, and incident response playbooks.

6.1

SOC - Security Operations Center

What is a SOC?

Definition: A Security Operations Center is a centralized unit that monitors, detects, analyzes, and responds to cybersecurity incidents using people, processes, and technology.

Key Functions:

1. Continuous monitoring of IT infrastructure

2. Threat detection and analysis

3. Incident response and containment

4. Security event investigation

5. Compliance reporting and audit support

6. Threat intelligence integration

SOC ModelDescriptionBest ForCost Range
In-house SOCFully owned and operated internallyLarge enterprises, banks, CIIRs. 5-20 Cr setup + Rs. 3-10 Cr/year
Managed SOC (MSSP)Outsourced to security providerMid-size companies, cost-sensitiveRs. 50L - Rs. 2 Cr/year
Hybrid SOCInternal team + MSSP supportGrowing organizationsRs. 1-5 Cr/year combined
Virtual SOCRemote monitoring, no physical centerSMEs, startupsRs. 10L - Rs. 50L/year
6.2

SIEM - Security Information and Event Management

SIEM Functions

SIM (Security Information Management):

- Log collection from multiple sources

- Long-term storage and retention

- Compliance reporting

SEM (Security Event Management):

- Real-time event correlation

- Alert generation

- Dashboard and visualization

Combined SIEM:

- Unified platform for both functions

- Advanced analytics and ML-based detection

- Automated response capabilities

SIEM SolutionTypeUse CaseApproximate Cost
SplunkCommercialEnterprise, large data volumesRs. 50L - Rs. 5Cr/year
IBM QRadarCommercialEnterprise, compliance-heavyRs. 40L - Rs. 3Cr/year
Microsoft SentinelCloud (Azure)Azure/M365 environmentsUsage-based (Rs. 10L+/year)
Elastic SIEMOpen-source/CommercialCost-sensitive, flexibleFree to Rs. 1Cr+ (enterprise)
WazuhOpen-sourceSMEs, startupsFree (support extra)
AlienVault (AT&T)CommercialMid-market, MSSPRs. 20L - Rs. 1Cr/year
6.3

Log Management - CERT-In 180-Day Requirement

Log Types to Retain
Log CategorySpecific LogsRetention Priority
NetworkFirewall, IDS/IPS, Router, Switch, VPNMandatory
SystemWindows Event Logs, Linux syslog, AuthenticationMandatory
ApplicationWeb server, Database, Custom applicationsMandatory
SecurityAntivirus, EDR, WAF, DLPMandatory
CloudAWS CloudTrail, Azure Activity, GCP AuditMandatory
EmailMail server logs, Email gatewayRecommended
DNSDNS query logsRecommended
Log Storage Architecture

Hot Storage (0-30 days): Fast SSD storage for active analysis; immediate query access

Warm Storage (30-90 days): Standard HDD; slower but accessible for investigations

Cold Storage (90-180 days): Archive storage (tape, S3 Glacier); compliance retention

Location: Must be within Indian jurisdiction (CERT-In mandate)

Integrity: Tamper-proof logging; hash verification; chain of custody

6.4

NTP Synchronization

Approved NTP Servers
ProviderNTP Server AddressStratum
NIC (Primary)time.nic.inStratum 1
NPLtime.nplindia.orgStratum 1
NIC Poolntp.nic.inStratum 2

Why Important?

- Accurate timestamps for incident investigation

- Log correlation across systems

- Legal validity of evidence

- Compliance demonstration

6.5

Incident Response Playbooks

Sample Playbook: Ransomware Incident

Detection (T+0):

1. SOC analyst receives SIEM alert for mass file encryption

2. Verify alert is not false positive

3. Escalate to Tier 2 analyst

Containment (T+30 min):

4. Isolate affected systems from network

5. Disable affected user accounts

6. Block C2 communication if identified

Investigation (T+1-4 hours):

7. Identify ransomware variant

8. Determine initial infection vector

9. Assess lateral movement

10. Document all findings

Reporting (T+6 hours max):

11. Prepare CERT-In incident report

12. Submit via portal/email

13. Notify sector regulator if applicable

Recovery (T+6+ hours):

14. Restore from clean backups

15. Patch vulnerabilities

16. Monitor for reinfection

SOC Maturity Levels
LevelDescriptionCapabilities
Level 1: BasicReactive monitoringLog collection, basic alerting
Level 2: ManagedDefined processesSIEM correlation, incident response
Level 3: DefinedDocumented playbooksThreat intelligence, hunting
Level 4: QuantifiedMetrics-drivenKPIs, SLAs, continuous improvement
Level 5: OptimizedPredictive, automatedAI/ML, SOAR, proactive defense

Key Points - Part 13.6