Create an in-house soc using foss

Assignment Help Management Information Sys
Reference no: EM133389232

Case: As you know, a SOC is a dedicated team of security analysts that monitor your IT environment, assess threats, provide threat intelligence against potential breaches or system weaknesses, and conducts deep incident analyses. It maintains a unified and efficient front against malicious attacks, detects unauthorized activity and provides 24×7 monitoring for your environment. Organizations find themselves stuck between two choices: building their own internal SOC or outsourcing to a security-as-a-service company that offers a SOC solution. Each of these options has its own benefits and drawbacks, but since each company is different, there is no "standard" answer.

Project Submission Steps You are a cybersecurity analyst for a global energy services firm. The company has 600 sites across over sixty countries, and employees over 24,000 people. The IT environment is mostly Windows-based and uses Active Directory for authentication, but there are some systems running Red Hat Enterprise Linux and Solaris. These systems primarily run the financial reporting software, both at the corporate headquarters and in two other key locations: Dubai and Kuala Lumpur. In addition, the company has industrial control systems at most of its sites that perform various functions such as monitoring pipelines and wind turbines. These systems are part of the Operational Technology (OT) environment and are separated from the corporate IT network for security reasons. The company has grown quickly over the last few years, mainly as a result of mergers and acquisitions (M&A). As a result, it has become increasingly difficult to manage its security operations. Some sites are managed better and more effectively than others. Currently, the IT Security team is made up of a manager and three analysts, of which you are one. You and the other analysts use a variety of tools to manage and monitor both the IT and OT environments, but it's clear that the staff is overwhelmed, resulting in lower morale. Management wants to address this situation as quickly as possible before people start leaving, and they need to know what their options are. They have asked your manager to deliver a presentation that lays out the options along with the pros and cons of each. However, he's busy fighting fires so he doesn't really have time to work on it. Since you are the only team member that has had formal cybersecurity training, he has tapped you to put something together for him. * Your task to is write a report (5-6 pages) comparing the following three strategies: 1. Create an in-house SOC using FOSS (Free and Open Source Software) solutions. Examples include ELK Stack, OSSEC, and Kiwi Syslog Server. 2. Create an in-house SOC using commercial solutions.

3. Outsource the SOC to a third party MDR or SOCaaS. Assume that no members of the IT Security team will need to be eliminated if this option is selected since the vendor would simply end up being an extension of the existing team. Be sure to include important data points such as additional FTEs (Full Time Employees), software licenses, cloud instances, and storage requirements. The average salary for a SOC/cybersecurity analyst is about $90,000/yr so use that for calculating FTE costs

Reference no: EM133389232

Questions Cloud

Relationship between food and social class renaissance : In this chapter we briefly covered the relationship between food and social class during the Renaissance.
What are ethical and professional responsibilities of tax : What are the ethical and professional responsibilities of tax {?nancial} advisers? Including obligations under the TASA and TASR 'In your answer.
Keeping track of inventory : Keeping track of inventory Keeping track of sales records Providing the ability to place orders to manufacturers Providing the ability for customers to place
How does david composition focus the viewers eye on swords : How does the exacting precision of Jacques-Louis David's composition visually reinforce the narrative of the Horatii brothers' patriotic resolve?
Create an in-house soc using foss : Create an in-house SOC using FOSS (Free and Open Source Software) solutions. Examples include ELK Stack, OSSEC, and Kiwi Syslog Server
Discuss the tax issues raised by the above facts : Discuss the tax issues raised by the above facts, referring to any appropriate legislation, case law, guidelines and rulings. If applicable, reference should be
What is the legal question and what is the legal answer : What is the legal question and what is the legal answer in the MySpace vs Doe case with Julie Doe and her sexual assaulter Pete Solis.
How this database helps you personally : Lessons learned How this database helps you personally? Does it lower cost or waste? Does it increase productivity or revenue
Discuss the current australian taxation law for determining : discuss the current Australian taxation law for determining whether an individual is a resident of australia fo tax purposes?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd