Security Operations Center
Having a centralized location in dealing with security issues at an organization
and technical level is what Cloud Destinations aims in developing with its SOC implementation.
We incorporate various frameworks such as the MITRE ATT&CK, Cyber Kill Chain alongside a
robust Incident response framework to proactively detect, contain, respond and prevent attacks.
We help our customers in implementing:
- Implement and Manage SIEM
- Indicators of Compromise
- Incident Management
- Threat Management
A Security Operation Centre (SOC) is a centralized function within an organization employing people,
processes,
and technology to continuously monitor and improve an organization's security posture while preventing,
detecting,
analysing, and responding to cybersecurity incidents. SOC is responsible for ensuring that potential
security
incidents are correctly identified, analyzed, defended, investigated, and reported.
In Cloud Destinations, we provide the following services in SOC incorporating various industry standard
frameworks
such as Cyber Kill Chain, MITRE ATT&CK.
Security Monitoring:
Security Monitoring provides an easier way to identify patterns and pinpoint potential security
vulnerabilities in
cloud infrastructure.
Active: An active approach to security builds upon the reactive with enhanced security
monitoring of
information and assets.
Proactive: A proactive defence posture is intelligence-led, depending on comprehensive cyber
security
assessments.
Reactive: The reactive approach invests in upgrading to latest versions of security software and
‘keeping
the lights on’. The focus is on establishing a strong perimeter to prevent breaches.
Services:
- Network Security Monitoring (Firewall)
- SIEM (Splunk, ELK, Sumologic)
- Intrusion Detection / prevention
- BA (Behavioral Analytics)
- File Integrity Monitoring
Advanced Threat Detection:
Advanced threat detection (ATD) is a type of security that goes beyond basic security analysis. It is
built
into
"appliances" and other solutions that work on a deeper level to fix security vulnerabilities and prevent
cyberthreats.
Services:
- Endpoint Detection & Response (EDR)
- Network Traffic Analysis (NTA)
- Deception & Counterintelligence Service
Cyber Threat Intelligence:
Cyber threat intelligence provides a value-add to cyber threat information, which reduces uncertainty
for
the
consumer, while aiding the consumer in identifying threats and opportunities. Threat intelligence can be
broken
down into three unique categories: Strategic, Tactical, and Operational threat intelligence.
Services:
- Threat Data Feeds
- Cloud Sandbox
Managed Detection and Response:
Managed Detection and Response is an advanced managed security service that provides threat
intelligence,
threat
hunting, security monitoring, incident analysis, and incident response.
Services:
- Endpoint Prevention and Detection
- Endpoint Risk Analytics
- Cyber Threat Hunting
- Network Traffic Analysis
- SIEM
Vulnerability Management:
Vulnerability management is the process of identifying, evaluating, treating, and reporting on security
vulnerabilities in systems and the software that runs on them. The 4 Stages of Vulnerability Management
are
Identification, Evaluation,Remediation, Reporting.
Services:
- Vulnerability Intelligence
- Software Asset Management
- Threat Detection Integration