CMMC Practice IR.4.101

Establish and maintain a security operations center capability that facilitates a 24/7 response capability.


CMMC Version 1.02, pg. 156

Bold Coast Security Guidance

Employing a 24x7 security operations center can be an expensive proposition reserved for the largest of companies. There is a large staffing and training component. There is a potential for on-site staffing to not be required, but someone is then on call at all hours and must be awake enough to respond to an alert! If you choose to create a SOC, please read the guidance and suggested NIST readings carefully to ensure its capabilities are fully understood and documented. A more budget friendly approach is to work with a third party which monitors several organizations at once. In addition to monitoring your systems all day and all night, the third party will provide a level of shared intelligence which can be useful in detecting attacks across a large base of customers. The SOC service will likely need some remote system access in order to provide response capabilities. At the most basic level they may need to shut down devices or network components, or even your internet connection.

Discussion From Source

DRAFT NIST SP 800-171B (MODIFIED) A security operations center (SOC) is the focal point for security operations and computer network defense for an organization. The purpose of the SOC is to defend and monitor an organization’s systems and networks (i.e., cyber infrastructure) on an ongoing basis . The SOC is also responsible for detecting, analyzing, and responding to cybersecurity incidents in a timely manner. The SOC is staffed with skilled technical and operational personnel (e.g., security analysts, incident response personnel, systems security engineers); and implements technical, management, and operational controls (including monitoring, scanning, and forensics tools) to monitor, fuse, correlate, analyze, and respond to threat and security-relevant event data from multiple sources. Sources include perimeter defenses, network devices (e.g., gateways, routers, switches) and endpoint agent data feeds. The SOC provides a holistic situational awareness capability to help organizations determine the security posture of the system and organization. A SOC capability can be obtained in a variety of ways. Larger organizations may implement a dedicated SOC while smaller organizations may employ third-party organizations to provide such capability.