Security Operations
Security Operations Center (SOC) - bu tashkilotning kiberxavfsizlik holati ustidan 24/7 nazorat qiluvchi jamoa va jarayon. Ular tahdidlarni monitoring qiladilar, hujumlarni aniqlab, ularga javob qaytaradilar.
SOC jamoasi
Tier 1 Analyst
Birinchi qator - Triage
- • Ogohlantirishlarni monitoring
- • Oddiy xavflarni aniqlash
- • Ticket yaratish
- • Eskalatsiya qilish
Tier 2 Analyst
Chuqur tahlil
- • Murakkab tergovlar
- • Zaifliklarni baholash
- • Hujumlarni tahlil qilish
- • Tuzatish tavsiyalari
Tier 3 - Expert
Mutaxassis
- • Threat hunting
- • Malware tahlil
- • Zaifliklarni topish
- • Arxitektura tavsiyalar
SOC asosiy vazifalari
Doimiy monitoring
24/7 tarmoq, tizimlar va ilovalarni kuzatish. Shubhali faoliyatni darhol aniqlash.
Threat Detection
Tahdidlarni aniqlash - SIEM, IDS/IPS, va boshqa vositalar yordamida.
Incident Response
Xavfsizlik hodisalariga tez va samarali javob berish.
Reporting va Metrics
Xavfsizlik holati haqida hisobotlar va ko'rsatkichlar tayyorlash.
SOC vositalari
SIEM - Security Information and Event Management
Barcha log'larni yig'adi, tahlil qiladi va anomaliyalarni aniqlaydi.
Misollar: Splunk, IBM QRadar, ArcSight
IDS/IPS
Intrusion Detection/Prevention System - kirish urinishlarini aniqlash va bloklash.
Misollar: Snort, Suricata, Cisco Firepower
EDR - Endpoint Detection and Response
Endpoint qurilmalardagi xavflarni aniqlash va javob berish.
Misollar: CrowdStrike, Carbon Black, SentinelOne
SOAR - Security Orchestration, Automation and Response
Xavfsizlik jarayonlarini avtomatlashtirish va orkestrlash.
Misollar: Palo Alto Cortex XSOAR, Splunk Phantom
Incident darajalari
P4 - Past (Low)
SLA: 24-48 soatKichik anomaliya, ta'sir minimal
P3 - O'rta (Medium)
SLA: 4-8 soatPotensial xavf, monitoring kerak
P2 - Yuqori (High)
SLA: 1-2 soatFaol hujum, tezkor harakat kerak
P1 - Kritik (Critical)
SLA: 15-30 daqiqaKatta ta'sir, darhol javob talab qiladi
Threat Hunting
Threat Hunting - bu proaktiv ravishda tarmoqda yashirin tahdidlarni qidirish. Faqat ogohlantirishlarga kutmasdan, faol tarzda izlash.
Threat Hunting jarayoni:
Qayerda tahdid bo'lishi mumkin?
Log'lar, trafik, anomaliyalar
Pattern'lar va shubhali faoliyat izlash
Topilgan tahdidlarni bartaraf etish
Asosiy xulosalar
- SOC - 24/7 xavfsizlik monitoring va javob
- 3 daraja analyst - Tier 1 (Triage), Tier 2 (Tahlil), Tier 3 (Mutaxassis)
- SIEM, IDS/IPS, EDR, SOAR - asosiy vositalar
- Threat Hunting - proaktiv tahdid qidirish