SecOps

SecOps framework involves integrating security practices, principles, and tools to ensure a more proactive and comprehensive approach towards cybersecurity.
Aiming to enhance an organization’s capability to identify, address, and alleviate security incidents and vulnerabilities.
Some of the key components and activities might include
Security information and event management (SIEM)
Network security monitoring (NSM)
Endpoint security
Vulnerability management
Incident response (IR)
Threat intelligence
Access control
Security awareness and training
0
Trillion
Is the inflicted damage by cybersecurity by 2025. From 6 trillion in 2021. 15% yearly growth.
*Cybersecurity Ventures Magazine
SecOps framework involves integrating security practices, principles, and tools to ensure a more proactive and comprehensive approach towards cybersecurity.
Aiming to enhance an organization’s capability to identify, address, and alleviate security incidents and vulnerabilities.
Some of the key components and activities might include
Security information and event management (SIEM)
Network security monitoring (NSM)
Endpoint security
Vulnerability management
Incident response (IR)
Threat intelligence
Access control
Security awareness and training
0%
Trillion
Is the inflicted damage by cybersecurity by 2025. From 6 trillion in 2021. 15% yearly growth.
*Cybersecurity Ventures Magazine

A raised concern

Cybersecurity attacks in numbers

45% small businesses

Organizations of all sizes are target.

Phishing 36% of breach

The technique emphases the need of internal staff training.

$20 billion in 2021

Cost of ransomware could lead to financial distress or bankruptcy in some cases.

$265 billion by 2031

Healthcare 45% increase

Highlights the importance of customer’s data.

30% increase on remote workers

Covid 19’s work from home initiative opened doors for more security vulnerabilities.

Average cost increased 42%

Over the last 3 years. The average cost of cyberattacks increased 42%.

25 billion connect device
By 2025

Indicated more security vulnerabilities and measures.

CEOs 86% responsible

Due to the severe impacts that could emerge.

Respondents of a study held 86% responsible to c-level management.

A raised concern

Cybersecurity attacks in numbers

45% small businesses

Organizations of all sizes are target

Phishing 36% of breach

The technique emphases the need of internal staff training.

$20 billion in 2021

Cost of ransomware could lead to financial distress or bankruptcy in some cases.

$265 billion by 2031

Healthcare 45% increase

Highlights the importance of customer’s data.

30% increase on remote workers

Covid 19’s work from home initiative opened doors for more security vulnerabilities.

Average cost increased 42%

Over the last 3 years. The average cost of cyberattacks increased 42%.

25 billion connect device
By 2025

Indicated more security vulnerabilities and measures.

CEOs 86% responsible

Due to the severe impacts that could emerge.

Respondents of a study held 86% responsible to c-level management.

SecOps

Relationship lies in their shared goals

Also known as team blue & team red
Readiness & 360° view of security posture

SecOps

Relationship lies in their shared goals

Also known as team blue & team red
Readiness & 360° view of security posture

SORINT.lab’s Tailored Journey

High-level overview

SORINT.lab’s Tailored Journey

High-level overview

SORINT.lab’s Tailored Journey

The make it model – Monitoring and detecting

Risk assessment

Identifying, evaluating, and understanding potential threats on infrastructure, systems, network, data, and running apps.

Threat analysis

Deeper understanding of the potential risks, domain, and characteristic.

Threat Intelligence (CTI) platforms Malware analysis tools

Prevention measures

All proactive activities to mitigate potential risks and solidifying the security posture.

EDR, firewalls, multi-factor authentication systems, data encryption systems

Monitoring

Regular monitoring of IT infrastructure

Intrusion Detection Systems (IDS)
Intrusion Prevention Systems (IPS)
Security Event Management Systems (SIEM)
Application Firewalls (WAF)
Cloud and Containers Security

Collaboration

Smooth flow of communication between all stakeholders

Security case management platforms (Ticketing tools),
 Document management systems.

Incident response

Protocols designed to effectively manage and reduce the impact of /prevent security incidents as they happen.

Incident response systems
Incident orchestration platforms (SOAR).

Reporting

Reporting tools and documentation practices.

Consulting and support

Continues support in all security related matter.

Ensure stakeholders are aware of the fundamentals/protocols.

Knowledge management systems
Online training tools

Supporting the IT operations team to ensure that security processes are properly integrated into daily operations

SORINT.lab’s Tailored Journey

The make it model – Monitoring and detecting

Risk assessment

Identifying, evaluating, and understanding potential threats on infrastructure, systems, network, data, and running apps.

Threat analysis

Deeper understanding of the potential risks, domain, and characteristic.

Threat Intelligence (CTI) platforms Malware analysis tools

Prevention measures

All proactive activities to mitigate potential risks and solidifying the security posture.

EDR, firewalls, multi-factor authentication systems, data encryption systems

Monitoring

Regular monitoring of IT infrastructure

Intrusion Detection Systems (IDS)
Intrusion Prevention Systems (IPS)
Security Event Management Systems (SIEM)
Application Firewalls (WAF)
Cloud and Containers Security

Collaboration

Smooth flow of communication between all stakeholders

Security case management platforms (Ticketing tools),
Document management systems.

Incident response

Protocols designed to effectively manage and reduce the impact of /prevent security incidents as they happen.

Incident response systems
Incident orchestration platforms (SOAR).

Reporting

Reporting tools and documentation practices.

Consulting and support

Continues support in all security related matter.

Ensure stakeholders are aware of the fundamentals/protocols.

Knowledge management systems
Online training tools

Supporting the IT operations team to ensure that security processes are properly integrated into daily operations

SORINT.lab’s Tailored Journey

The make it model – Penetration

Staying ahead of emerging threats and outpacing intrusion attempts

SORINT.lab’s Tailored Journey

The make it model – Penetration

Staying ahead of emerging threats and outpacing intrusion attempts

SORINT4Security

Mastering cybersecurity since mid-1990s

Dedicated sircles targeting various areas of security

Legend team in the field

Training hours

Fully handling security activities of prominent entities, in various industries,  in Europe, US, and Africa.

Community support & developed various open-source security related tools

24x7x365 days support

Highest field accreditation

Hands-on tools experience and accreditation

SORINT4Security

Mastering cybersecurity since mid-1990s

Dedicated sircles targeting various areas of security

Legend team in the field

Training hours

Fully handling security activities of prominent entities, in various industries,  in Europe, US, and Africa.

Community support & developed various open-source security related tools

24x7x365 days support

Highest field accreditation

Hands-on tools experience and accreditation

Prestigious Certificates

Other sircles and specialisation involved

SecOps
Network & Security
Shift Security Left(SSL)
Cloud Native Security
NGMS

Closer Look

Areas and field of focus

Monitoring & Detecting

360 view around the clock
SOC activities

Consultancy

In-depth analysis of project posture, team awareness, and a customized going forward strategy.
Processes, methodologies, tools, & workshops

Penetration

Executing, reporting, and consultation.
Might include handling reported issues.

All journey

Cybersecurity governance

Closer Look

Areas and field of focus

Monitoring & Detecting

360 view around the clock
SOC activities

Consultancy

In-depth analysis of project posture, team awareness, and a customized going forward strategy.
Processes, methodologies, tools, & workshops

Penetration

Executing, reporting, and consultation.
Might include handling reported issues.

All journey

Cybersecurity governance

Success Stories

Delivered by: SORINTians

Reporting Major XSS Bug Vulnerability To UpdraftPlus

Black-box Penetration Testing – WP extension

1) Challenge

While carrying out penetration test activities to a client’s web solution. Our security team were able to detect a critical XSS bug for the extension WP-Optimize (+1 million active installation). Developed by Team UpdraftPlus. A well-known WordPress plugin.

2) Goind forward

The bug was documented & reported to the  providers.

3) Accepting the challenge – Solution and Implementation

As a summary, the challenge was complicated to proof. It required tools/extensions (WPScan, WordFence Security, and others) several attempts, injecting payloads, probing the search function using Burp Intruder as an attack type, plus refining the tactics of the  attacks. After few attempts, we were able to get the XSS-reflected payload.

The team was able to analyse how the WebP-Conversion option causes a flow during the process of converting HTML entities to the reserved HTML characters. Clearly an issue. Attackers can inject malicious input encoded using HTML entities and str_get_html function. The function will convert it back to actual HTML tags, where the browser will be able to render it. Bypassing Wordfence filtering, which happens before the str_get_html function.

Result & delivery

  • Bug was documented and reported to the providers immediately after Sorint’s internal security review process.
  • Vendor immediately responded to handling the bug and included it in the next release.
  • The provider issued a CVE ID (2023-1119) as a gesture of appreciation to the effort and the finding.
Technology Industry

EDR Solution, Design, & Implementation for All Endpoints

1) Challenge

Find, configure, and deploy an EDR (Endpoint Detection & Response) tool. For hundreds of thousands of endpoints.

2) Goind forward

Investigation phase focused deeply on analysing client’s
infrastructure & evaluating possible relevant tools.
Resulting in a group of POCs and tests. Along with a clear
deployment proposal.

3) Accepting the challenge – Solution and Implementation

After the tool selection phase. The deployment phase included activities such as:

  • Automation system to convert detections into a streamlined ticketing process.
  • Developed scripts to accelerate forensic collection & forensic analysis of the endpoint.
  • Configuring the EDR in compliance to client’s standards/policies.

Activities aiming to provide real-time visibility of the detected threats and isolating them from the network. Providing accurate analysis.

  • Introduced a streamline process on how threats are handled through automation. Elements including identification, scanning, where and how to operate on the threat(isolation/on the network), malicious pattern against YARA rules, incident timeline, recovery resetting/rebuilding, etc..

Result & delivery

  • Successful deployment.
  • Documentation & reporting activities.
  • Testing activities not only to validate, but also to prototype to the client.
  • SecOps sircle has been granted long-term support maintenance, and monitoring to the solution.
Technology Industry

Implementation and Management of a SIEM Solution

1) Challenge

A SIEM tool able to:

  • Handle huge number of logs arriving from client’s endpoints.
  • Automate tasks to support client’s SOC and NOC workflows.
2) Goind forward

Evaluating client’s SOC and NOC workflow during the

tool selection phase. Closely aligning with client’s internal team.

3) Accepting the challenge – Solution and Implementation

Following the evaluation process and the agreement on the proposal submitted. SIEM Elastic was the go-to- choice due to the capability of being a modular/unified, scalable, and on top, being an open-source solution. Importantly, allowing SOC analysts to conduct swiftly analytical security events. Furthermore, the implementation phase carried out activities like:

  • Identifying the data source.
  • Implementation of data ingestion.
  • Monitoring volume alerts during staging phase.
  • Built-in detection rules and the addition of IoC through integration of one or more TI feed.

Result & delivery

Within the agreed timeframes, a high-quality software product that fully complied to all pre-planned requirements. E.g.

  • Multi-functional user role system.
  • Improved user interface.
  • Optimized performance.
  • Quality code due to code reviews strategy.

Success Stories

Delivered by: SORINTians

Reporting Major XSS Bug Vulnerability To UpdraftPlus

Black-box Penetration Testing – WP extension

1) Challenge

While carrying out penetration test activities to a client’s web solution. Our security team were able to detect a critical XSS bug for the extension WP-Optimize (+1 million active installation). Developed by Team UpdraftPlus. A well-known WordPress plugin.

2) Goind forward

The bug was documented & reported to the  providers.

3) Accepting the challenge – Solution and Implementation

As a summary, the challenge was complicated to proof. It required tools/extensions (WPScan, WordFence Security, and others) several attempts, injecting payloads, probing the search function using Burp Intruder as an attack type, plus refining the tactics of the  attacks. After few attempts, we were able to get the XSS-reflected payload.

The team was able to analyse how the WebP-Conversion option causes a flow during the process of converting HTML entities to the reserved HTML characters. Clearly an issue. Attackers can inject malicious input encoded using HTML entities and str_get_html function. The function will convert it back to actual HTML tags, where the browser will be able to render it. Bypassing Wordfence filtering, which happens before the str_get_html function.

Result & delivery

  • Bug was documented and reported to the providers immediately after SORINT’s internal security review process.
  • Vendor immediately responded to handling the bug and included it in the next release.
  • The provider issued a CVE ID (2023-1119) as a gesture of appreciation to the effort and the finding.
Technology Industry

EDR Solution, Design, & Implementation for All Endpoints

1) Challenge

Find, configure, and deploy an EDR (Endpoint Detection & Response) tool. For hundreds of thousands of endpoints.

2) Goind forward

Investigation phase focused deeply on analysing client’s
infrastructure & evaluating possible relevant tools.
Resulting in a group of POCs and tests. Along with a clear
deployment proposal.

3) Accepting the challenge – Solution and Implementation

After the tool selection phase. The deployment phase included activities such as:

  • Automation system to convert detections into a streamlined ticketing process.
  • Developed scripts to accelerate forensic collection & forensic analysis of the endpoint.
  • Configuring the EDR in compliance to client’s standards/policies.

Activities aiming to provide real-time visibility of the detected threats and isolating them from the network. Providing accurate analysis.

  • Introduced a streamline process on how threats are handled through automation. Elements including identification, scanning, where and how to operate on the threat(isolation/on the network), malicious pattern against YARA rules, incident timeline, recovery resetting/rebuilding, etc..

Result & delivery

  • Successful deployment.
  • Documentation & reporting activities.
  • Testing activities not only to validate, but also to prototype to the client.
  • SecOps sircle has been granted long-term support maintenance, and monitoring to the solution.
Technology Industry

Implementation and Management of a SIEM Solution

1) Challenge

A SIEM tool able to:

  • Handle huge number of logs arriving from client’s endpoints.
  • Automate tasks to support client’s SOC and NOC workflows.
2) Goind forward

Evaluating client’s SOC and NOC workflow during the

tool selection phase. Closely aligning with client’s internal team.

3) Accepting the challenge – Solution and Implementation

Following the evaluation process and the agreement on the proposal submitted. SIEM Elastic was the go-to- choice due to the capability of being a modular/unified, scalable, and on top, being an open-source solution. Importantly, allowing SOC analysts to conduct swiftly analytical security events. Furthermore, the implementation phase carried out activities like:

  • Identifying the data source.
  • Implementation of data ingestion.
  • Monitoring volume alerts during staging phase.
  • Built-in detection rules and the addition of IoC through integration of one or more TI feed.

Result & delivery

Within the agreed timeframes, a high-quality software product that fully complied to all pre-planned requirements. E.g.

  • Multi-functional user role system.
  • Improved user interface.
  • Optimized performance.
  • Quality code due to code reviews strategy.
More Actions
Share on social media
LinkedIn
More Actions
Share on social media
LinkedIn

Related Solutions and Tools by SORINTians

Related Solutions and Tools by SORINTians

We are all ears!

Welisten
24x7x365

Whether you have any doubts, interested to know more about our offerings, want more relevant case studies, would like to arrange a consultation, or don’t see what you are looking for here, we’d love to hear from you.

    We are all ears!

    Welisten
    24x7x365

    Whether you have any doubts, interested to know more about our offerings, want more relevant case studies, would like to arrange a consultation, or don’t see what you are looking for here, we’d love to hear from you.