An information Security Operations Centre “SOC” is a facility where enterprise information systems are monitored, assessed and defended. These include entire datacenters, networks, application and database servers, desktops and other endpoints.
CTRL Group’s SOC provides your organisation with dedicated security specialists to oversee critical infrastructure in real-time, enabling you to operate at a high level of security maturity to defend against cyber threats 24/7.
Our SOC also gives your organisation the capability to respond to incidents rapidly and resolve them effectively. This includes an initial assessment of the breach, a thorough investigation, implementation of a solution, advise on navigating reporting obligations and ongoing support to improve your security environment.
The SOC also offers our controls overview assessment which utilises CTRL Group’s maturity rating framework to identify controls, processes, policies and capabilities within your environment. These are then measured against the current top 20 threats, industry standards and best practices, and will inform how CTRL Group will work with you to address identified vulnerabilities and risks, as well as providing a road map to reducing your cyber risk profile.
Monthly vulnerability scans are also executed against the internal environment which gives you insights on which infrastructure may be targeted by attackers and how to remediate the risks.
Why Is This Important
- Ensure your organization is compliant with regulations.
- 24/7 monitoring of all critical assets and systems.
- Real-time detection of threats as well as identification of impending threats through threat intelligence features.
- Rapid response to cyber breaches to mitigate reputational and financial impact.
CTRL will execute a scoping session with a technical member of your team to answer a variety of infrastructure questions in order to accurately scope the Security Operations Center. The scoping session takes approximately 30 minutes.
This is highly dependent on the amount of technical resources you can allocate for the SOC deployment. We have had clients onboarded in 5 days whilst others in 2 months. The more technical resources allocated, the faster the onboarding into the SOC service.
Once onboarded into the CTRL SOC, there will need to be nominated contact persons inside and outside of business hours to be able to receive incident notifications and action them appropriately.
Security Operations Center is stored on AES 256 bit encrypted media. No data is held outside of Australia.
Below are deliverables for our SOC which has several ongoing touchpoints:
- Daily Live Updates of Security Incidents
- Weekly calls from dedicated Security Analysts
- Monthly Security Operations Reports
- Monthly Vulnerability Assessment Reports