SOC Blueprint
SOC Blueprint
D – Detect How do you detect or "First, I validate the alert from SIEM or EDR. I
validate the alert? check if it's genuine using logs, process trees,
or network patterns."
R– What are your immediate "I isolate the host from the network to prevent
Respond containment actions? further damage."
I– What logs, artifacts, or "I pivot on the source IP, review Sysmon logs
Investigate forensics do you check (event ID 1, 3), and analyze related
and how? commands/processes."
L – Learn & How do you wrap up, "I document everything in a report, extract
Log document, and learn IOCs, create new detection rules, and share
from the incident? learnings with the team."
Summary:
Received an alert indicating lateral SMB traffic from host 10.1.1.23 to
10.1.1.45.
Investigation Steps Taken:
- Validated alert in Splunk.
- Checked Sysmon Event ID 3 (network connection).
- Process tied to legitimate IT update process (patch system).
Conclusion:
False positive. Legitimate internal patch activity.
Recommendations:
- Tuning SIEM to whitelist known IT maintenance IPs.