MDR<\/a>.<\/p>\nPart 2. What challenges will SOCs face internally: processes and efficiency<\/h2>\nSOCs will be forced to raise requirements, while experiencing staff shortages<\/h3>\n
Looking at the internal challenges, we first need to consider human resources issues. The future of SOC development lies in intensive, not extensive, growth, meaning the value every team member (even unskilled ones) brings to SOC is increasing. Developing the skills of the SOC team is a proven way to counter the increasing amount of threats every SOC will be facing in 2023. That means incident response training, and all forms of SOC exercises, such as TTX, purple teaming, and adversary attack simulations, should be a significant part of 2023 SOC strategy. This gives SOC a goal: to enhance the SOC team, architecture, and operations for better performance. In the case of a mature SOC, it is just a question of time; in others, usually lack of experience and vision in terms of SOC development can be an issue. Commonly, the second case can be solved with a SOC review by external experts, who can identify gaps with fresh eyes to avoid the bias that prevents the internal team from seeing the bigger picture from the outside.<\/p>\n
Another trend is related to the lack of skilled and experienced personnel that will continue to be present in 2023: the need for well-defined SOC processes. Therefore we predict an increasing role for SOC process development and related services.<\/p>\n
Bigger budgets alongside efficiency as the cornerstone of SOC processes<\/h3>\n
The growing threat landscape is pushing cybersecurity and SOC budgets skywards. This trend will focus attention on budget spending, prompting “Why? What was the effect? What value does it bring?”- type questions for SOC managers.<\/p>\n
With a mature approach, this circumstance should lead SOCs to implement “SOC efficiency management.” As part of this practice, companies will evaluate breach costs and map them to SOC performance in reducing such losses. Combined with analysis of prevented incidents, this can allow SOCs to evaluate the value they bring in monetary terms. But prior to implementing this approach, SOCs will need to deploy efficient metrics and their analysis, as well as established SOC governance processes.<\/p>\n
Building full-scale threat intelligence and threat hunting<\/h3>\n
The growth of cyberattacks and threats will transform into high demand to predict attacks and attacker techniques, thus increasing the value of cyberthreat intelligence (CTI). From what we have observed so far in our daily practice, many SOCs’ CTI activities boil down to managing IOC feeds. This approach is ineffective against zero-day and APT attacks. Current trends already have shifted to establish full-scale CTI capabilities within companies, and in most SOCs have a dedicated CTI unit. That trend will grow and mature in 2023.<\/p>\n
Cases of successful attacks being left unwatched for a long time are still common \u2013 and will be in 2023 due to the continuous growth of targeted attacks. And the Assume Breach Paradigm will stay with us in 2023 as well, which means that threat hunting has a good chance of becoming a trend.<\/p>\n
So, we believe that threat hunting will form a vital part of any SOC development strategy. Although current thinking places it at the bottom of the list of must-have SOC technologies, in most cases this can be explained by poor understanding of how to conduct threat hunting or chaotic approach to delivery. But since threat hunting is part of SOC detection capabilities, which will be challenged by evolving threats, more companies will consider conducting threat hunting on a regular basis with clear goals and an understanding of how to reach them continuously.<\/p>\n
These are our predictions for SOC specialists for 2023. Watch this space in 12 months’ time to see which of them came true.<\/p>\n","protected":false},"excerpt":{"rendered":"
Supply chain and reoccurring attacks, data destruction, lack of staff \u2014 what challenges will your security operations center be facing in 2023?<\/p>\n","protected":false},"author":2570,"featured_media":108522,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[437],"tags":[538,121,4149,4139,902,53,1310,4093,219,41,214],"banners":"","hreflang":[{"hreflang":"x-default","url":"https:\/\/securelist.com\/soc-socc-predictions-2023\/108512\/"},{"hreflang":"ru","url":"https:\/\/securelist.ru\/soc-socc-predictions-2023\/106492\/"},{"hreflang":"es","url":"https:\/\/securelist.lat\/soc-socc-predictions-2023\/97544\/"}],"_links":{"self":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/108512"}],"collection":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/users\/2570"}],"replies":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/comments?post=108512"}],"version-history":[{"count":8,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/108512\/revisions"}],"predecessor-version":[{"id":108824,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/108512\/revisions\/108824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/media\/108522"}],"wp:attachment":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/media?parent=108512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/categories?post=108512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/tags?post=108512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}