Awesome-SOC

Awesome-SOC

55 Stars

A collection of sources of documentation and best practices to build and run a SOC

SOC-Community
May 25, 2025
55 stars
Category
Resources
GitHub Stars
55
Project Added On
May 25, 2025
Contributors
1

Awesome SOC

A collection of sources of documentation, and field best practices, to build and run a SOC (including CSIRT).

Those are my view, based on my own experience as SOC/CSIRT analyst and team manager, as well as well-known papers. Focus is more on SOC than on CERT/CSIRT.

NB: Generally speaking, SOC here refers to detection activity, and CERT/CSIRT to incident response activity. CERT is a well-known (formerly) US trademark, run by CERT-CC, but I prefer the term CSIRT.

Must read

For a CERT/CSIRT

Globally (SOC and CERT/CSIRT)

Fundamental concepts

Concepts, tools, missions, attack lifecycle, red/blue/purple teams

See: SOC/CSIRT Basic and fundamental concepts.

SOC and CSIRT core

From logs to alerts: global generic workflow

Quoted from this article:

image

Following the arrows, we go from log data sources to data management layer, to then data enrichment layer (where detection happens), to end-up in behavior analytics or at user interaction layer (alerts, threat hunting…). All of that being enabled and supported by automation.

SOC/CSIRT architecture of detection

Based on CYRAIL’s paper drawing, that I’ve slightly modified, here is an example of architecture of detection (SIEM, SIRP, TIP interconnections) and workflow:
image

  • Sensors log sources are likely to be: audit logs, security sensors (antimalware, FW, NIDS, proxies, EDR, NDR, CASB, identity threat detection, honeypot…).

Mission-critical means (tools/sensors)

Critical tools for a SOC/CSIRT

Critical sensors for a SOC

... Content truncated. Click "See More" to view the full README.

Tool Information

Author

SOC-Community

Project Added On

May 25, 2025

License

Open Source

Tags

security tool