SOC-as-a-Service Brochure
SOC-as-a-Service Brochure
AS A SERVICE
Augment your SOC with automation & Fortinet experts
DETECT
RESPOND
PROTECT
Q4/2022
What is SOCaaS ?
Fortinet’s Security Operation Center-as-a-Service SOCaaS is a
cloud-based managed security monitoring service that analyzes
Service at a Glance security events generated from Customer’s FortiGate and other Fabric
Products, performs alert triage, and escalates confirmed threat
Detection Use Case notifications.
https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/forticloud-
Compromised Hosts
socaas.pdf
Malware Detection
Operations & Integration During the SOCaaS on-boarding phase, many aspects are reviewed to
24 7 Monitoring & Alert Triage identify and close security gaps needed to detect incidents.
Reports
Logging
Detect
Hardening Best Practices
Health Monitoring
Tuning Recommendations
Investigate
Security Posture Review
SOCaaS
Improve
Escalate
SOC 2
TYPE II Remediate
Escalate to Customer
2
How does my SOC integrate with
SOCaaS? Threat Focus Areas
Fortinet SOCaaS detections are investigated Attacker can enter the network, perform
Preparation malicious transfers, and go undetected
24 7, and qualified incidents will be escalated to due to mis-configuration.
the customer SOC contact points. Alerts can be
Attacker probes the victim’s
received via Email or phone call, and all details are Reconnaissance infrastructure and gains insights into
provided within the SOCaaS Portal. vulnerable access points.
3
SOC Use Case Details
PREPARATION
FortiGate Best Practices
Use cases which detect misconfigurations, gaps in visibility & detection, and logging problems.
Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
Device misconfigurations
FortiGate UTM logs Available
Tuning Preventive Controls)
Device misconfigurations
Additional Fabric Devices TBD Coming Soon
Tuning Preventive Controls)
RECONNAISSANCE
Reconnaissance
Use cases which detect techniques actively or passively gathering information.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
NOTE Use Case coverage evolves rapidly, please consult the latest coverage published in FortiGuard at https://www.fortiguard.com/socaas/
4
SOC Use Case Details
DELIVERY
Initial Access
Use cases which detect compromised websites, applications, remote access, services or phishing attacks.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
EXPLOITATION
Execution
Use cases which detect when unauthorized code or software is enabled on a system.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
5
SOC Use Case Details
Credential Access
Use cases which detect attempts to steal credentials such as keyloggers or credential dumping attacks.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
Discovery
Use cases which detect when attackers are attempting to gain knowledge about system and internal networks.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
6
SOC Use Case Details
Defense Evasion
Use cases which detect when attackers are attempting to circumvent protection controls.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
Virtualization /
T1497 FortiClient MS Windows Events MS Windows Security Coming Soon
Sandbox Evasion
Obfuscated Files
T1027 FortiEDR Security Logs Coming Soon
or Information
System Script
T1216 FortiEDR Security Logs Coming Soon
Proxy Execution
Privilege Escalation
Use cases which detect attempts to gain higher-level permissions on a system or network.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
7
SOC Use Case Details
INSTALLATION
Lateral Movement
Use cases which detect attempts to gain unauthorized access to systems on a network from a presumably trusted source on the same
network.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
8
SOC Use Case Details
Persistence
Use cases which detect attempts to keep access to systems across restarts, changed credentials, and other interruptions that
could cut off adversary access.
MITRE ID Use Case Descrip on Fabric Device Log Source Fabric Device Logs & For Guard Service Availability
9
SOC Use Case Details
C2
Collection
Use cases which detect techniques used by attackers to gather information for the purpose of exfiltration.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
T1071 Application Layer Protocol FortiGate IPS, Web and DNS Filtering, Traffic Available
T1132 Data Encoding FortiGate IPS, Web and DNS Filtering, Traffic Available
T1001 Data Obfuscation FortiGate IPS, Web and DNS Filtering, Traffic Available
T1568 Dynamic Resolution FortiGate IPS, Web and DNS Filtering, Traffic Available
T1573 Encrypted Channel FortiGate IPS, Web and DNS Filtering, Traffic Available
T1008 Fallback Channels FortiGate IPS, Web and DNS Filtering, Traffic Available
T1104 Multi-Stage Channels FortiGate IPS, Web and DNS Filtering, Traffic Available
T1095 Non-Application Layer Protocol FortiGate IPS, Web and DNS Filtering, Traffic Available
T1571 Non-Standard Port FortiGate IPS, Web and DNS Filtering, Traffic Available
T1572 Protocol Tunneling FortiGate IPS, Web and DNS Filtering, Traffic Coming Soon
Communication Through
T1092 FortiClient USB Device Control Available
Removable Media
10
SOC Use Case Details
ACTIONS
Exfiltration
Use cases which detect techniques that adversaries may use to steal data and avoiding detection while removing it.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
T1041 Exfiltration Over C2 Channel FortiGate IPS, Web and DNS Filtering, Traffic Available
T1052 Exfiltration Over Physical Medium FortiClient USB Device Control Available
T1537 Transfer Data to Cloud Account FortiGate Traffic, Application Firewall Coming Soon
Impact
Use cases which detect techniques that adversaries may use to disrupt availability or compromise integrity by manipulating
business and operational processes.
MITRE ID Use Case Description Fabric Device Log Source Fabric Device Logs & FortiGuard Service Availability
11
Visit Fortinet.com for more details.
Q4/2022 11.09.22