
Microsoft Sentinel in Action
By :

For the final section of this chapter, we are going to look at an important part of SOC development: scenario mapping. This process is carried out on a regular basis to ensure that tools and procedures are tuned for effective analysis and have the right data flow and that responses are well defined to ensure appropriate actions are taken upon detection of potential and actual threats. To make this an effective exercise, we recommend involving a range of different people with diverse skill sets and viewpoints, both technical and non-technical. You can also involve external consultants with specific skills and experience in threat hunting, defense, and attack techniques.
The following process is provided as a starting point. We encourage you to define your own approach to scenario mapping and improve it each time the exercise is carried out.
In this first step, we articulate one scenario at a time; you may want to use a spreadsheet or other documentation methods to ensure information is gathered, reviewed, and updated as required:
For each scenario, we recommend providing a high-level category to help group similar scenarios together. Some categories that may be used include the following:
The kill chain is a well-known construct that originated in the military and was later developed as a framework by Lockheed Martin (see here for more details: https://en.wikipedia.org/wiki/Kill_chain). Other frameworks are available, or you can develop your own.
Use the following list as headers to articulate the potential ways in which resources can become compromised in each scenario and at each stage of the kill chain:
Review the information from earlier in this chapter to map which component of your security solutions architecture will be able to detect the threats for each scenario:
As we aim to maximize the automation of detection and response, consider what actions should be carried out immediately, and then focus on enabling the automation of these actions.
Actions may include the following:
In this step, you should be able to assign a number to associate with the severity level, based on the impact analysis in the previous steps. For each severity level, define the appropriate output required:
Whereas the Step 5 – what actions will occur instantly? section was an automated action, this step is a definition of what the security analysts should do. For each scenario, define what actions should be taken to ensure an appropriate response, remediation, and recovery.
The following diagram is a simple reference chart that can be used during the scenario-mapping exercise:
Figure 1.4 – The scenario-mapping process
By following this seven-step process, your team can better prepare for any eventuality. By following a repeatable process, and improving that process each time, your team can share knowledge with each other, and carry out testing to ensure that protection and detection are efficient and effective as well as identifying new gaps in solutions that must be prioritized.
You should commit to taking time away from the computer and start to develop this type of tabletop exercise on a regular basis. Some organizations only do this once per year, while others will do it on a weekly basis or as needed based on the demands they see in their own systems and company culture.
Change the font size
Change margin width
Change background colour