Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Security Operations Center (SOC) and SIEM: monitor cybersecurity 24/7

SOCs and SIEMs form the foundation of any professional threat detection system. This article explains how to set up and operate an SOC, SIEM architecture, use cases, alert triage, and addresses the question: In-house SOC or MSSP?

Table of Contents (8 sections)

A Security Operations Center (SOC) is the control center for cybersecurity monitoring and incident response. The SOC combines people, processes, and technology—with the SIEM as its technological core. Without a functioning SOC, companies detect attacks on average only after 194 days (IBM Cost of a Data Breach 2024)—often not on their own, but through external reports.

What is a SOC?

A SOC is a centralized function (team + infrastructure) that continuously:

  1. Monitors – all IT systems, networks, and cloud environments
  2. Detects – attacks, anomalies, and policy violations
  3. Analyzes – the context, relevance, and severity of an alert
  4. Responds – containment, forensics, recovery
  5. Improves – lessons learned, fine-tuning detection rules

SOC Roles

SOC Tier 1 – Alert Triage Analyst
  ├── Monitors the alert queue 24/7
  ├── Classifies: True Positive / False Positive?
  └── Escalates complex cases to Tier 2

SOC Tier 2 - Incident Responder
  ├── In-depth analysis of escalated incidents
  ├── Forensics: What happened? To what extent?
  └── Coordinates remediation

SOC Tier 3 - Threat Hunter / Senior Analyst
  ├── Proactively searches for hidden attackers
  ├── Develops new detection rules
  └── Threat intelligence integration

SOC Manager
  ├── KPIs and reporting
  ├── Team development
  └── Process optimization

What is a SIEM?

A Security Information and Event Management (SIEM) is a platform that centralizes and correlates all security-related logs.

Log sources aggregated by a SIEM:

  • Firewalls, IDS/IPS, WAF
  • Active Directory / Entra ID (logon events)
  • Endpoint Security / EDR
  • Cloud logs (AWS CloudTrail, Azure Activity Log, GCP Audit)
  • Application logs (web server, database, SAP)
  • DNS logs
  • Email gateway logs
  • VPN logs

SIEM Architecture

Log Sources                  SIEM                     Analyst Interface
──────────                  ────                     ─────────────────
Firewall ──────────────→   Collector                         ↑
EDR ────────────────────→  Normalizer  →  Correlation    Dashboards
Active Directory ───────→  Enrichment     Engine     →  Alert Queue
Cloud Logs ─────────────→  Storage        UEBA          Threat Hunting
Endpoints ──────────────→                ML Engine      Investigations

UEBA - User and Entity Behavior Analytics

Modern add-on module for SIEM:

  • Creates baseline behavior for every user and host
  • Detects anomalies: "User never accesses finance server—now suddenly does"
  • Useful for insider threats and stolen credentials

SIEM Use Cases: What Is Detected?

Use Case 1: Brute Force / Credential Stuffing

Rule: More than 10 failed login attempts for an account within 5 minutes
       AND a subsequent successful login

→ Alert: "Possible Brute Force + Successful Login"
→ Immediate action: Lock account, contact user

Use Case 2: DCSync Attack (Active Directory)

Rule: Replication request from DRSUAPI to domain controller
       FROM a machine that is not a domain controller

→ Alert: "Possible DCSync Attack (Golden Ticket Preparation)"
→ Immediate action: Isolate system, initiate forensics

Use Case 3: Kerberoasting

Rule: More than 20 TGS requests for different SPNs
       within 2 minutes
       from a single account

→ Alert: "Possible Kerberoasting Activity"
→ Immediate action: Analyze account, check affected service accounts

Use Case 4: Lateral Movement

Correlation across 3 log sources:
1. EDR: "Mimikatz-like activity on Host A"
2. AD log: "Account X" impersonating another user (pass-the-hash)
3. Firewall log: SMB connection from Host A to DC01

→ Alert: "Confirmed Lateral Movement to Domain Controller"
→ Immediate Action: P1 Incident, enable network segmentation

Use Case 5: Data Exfiltration

Rule: More than 500MB of outbound data
       to a domain that is < 30 days old
       between 2:00 AM and 5:00 AM

→ Alert: "Possible Data Exfiltration"
→ Context: Affected host, user, data volume

SIEM Market: Leading Solutions

SolutionVendorPositioning
Microsoft SentinelMicrosoftCloud-native, excellent for M365/Azure
Splunk Enterprise SecurityCisco/SplunkPowerful enterprise standard, expensive
IBM QRadarIBMEnterprise, on-premises strength
Google ChronicleGoogleCloud-native, AI integration
Elastic SIEMElasticOpen-source foundation, highly flexible
LogRhythmLogRhythmMid-market SIEM + SOAR
WazuhWazuh (Open Source)Free, very suitable for SMBs

SOAR - Security Orchestration, Automation, and Response

SOAR complements SIEM with automated response:

# Example SOAR Playbook: Phishing Alert
trigger: SIEM Alert "Phishing email detected"
actions:
  1. Automatically quarantine the email
  2. Search for and delete all similar emails in mailboxes
  3. Blacklist sender domain
  4. Notify affected users
  5. Create ticket in ITSM
  6. Notify SOC analyst via Slack
# Manual: Analyst confirms and closes ticket

SOAR reduces Mean Time to Respond (MTTR) from hours to minutes.

SOC Models: In-House SOC vs. MSSP

In-House SOC

Advantages:

  • Full control and data sovereignty
  • Deep organizational knowledge (systems, processes, business context)
  • No data sharing with third parties

Disadvantages:

  • High costs: 3–5 full-time analysts for 24/7 coverage, plus SIEM license
  • Difficult recruitment (skills shortage)
  • High false positive rate in the early years (tuning required)

Annual costs (estimate, Germany):

  • 3 Tier-1 analysts (24/7 in shifts): ~€300,000/year
  • 1 Tier-2/3 analyst: ~€90,000/year
  • SIEM license (Microsoft Sentinel / Splunk): €50,000–€500,000/year
  • Total: €500,000 – €1 million/year

MSSP – Managed Security Service Provider

Advantages:

  • Operational immediately (weeks instead of months)
  • 24/7 coverage without in-house recruitment challenges
  • Comprehensive threat intelligence (multi-tenant visibility)
  • Predictable monthly costs

Disadvantages:

  • Data sharing with third-party providers (consider data protection)
  • Less company-specific knowledge at the outset
  • Dependence on the provider

Market leaders in Germany, Austria, and Switzerland (DACH): Telekom Security, NTT Security, Atos, Controlware, DXC.

Hybrid Model (SOC-as-a-Service supplemented internally)

Often ideal for mid-sized businesses:

  • Internal IT/Security: Configuration, asset management, business context
  • MSSP: 24/7 monitoring and Tier 1 triage
  • Escalation to internal experts or MSSP Tier 2

KPIs for SOC Performance

KPIDescriptionTarget Value
MTTDMean Time to Detect (How long until an attack is detected?)< 1 hour
MTTRMean Time to Respond (How long until a response?)< 4 hours
False Positive RatePercentage of alerts that are not actual issues< 10%
Alert BacklogUnprocessed alerts in queue0
Coverage% of systems sending logs> 95%
Dwell TimeHow long was the attacker undetected?< 7 days

Compliance Requirements

NIS2 Art. 21: Monitoring and anomaly detection explicitly required for critical infrastructure.

ISO 27001 A.8.15 (Logging): Activity logging; A.5.25 (Incident Response) – SOC is the organizational implementation.

BSI IT-Grundschutz DER.1: Detection of security incidents – detailed requirements for monitoring.

DORA (Financial Sector): Art. 11 – continuous ICT monitoring is mandatory for financial institutions.

Implementation Roadmap: SOC in 12 Months

Months 1–2:  SIEM deployment, connect log sources (AD, firewall, EDR)
Months 3–4:  Develop basic use cases (15–20 rules), reduce false positive rate
Months 5–6:  SOAR integration, initial automations
Months 7–9:  Introduce threat hunting, activate UEBA
Months 10–12: 24/7 operation, Tier 1 team trained

Alternative: MSSP for the first 12–24 months, while building internal expertise in parallel.

Sources & References

  1. [1] NIST SP 800-61r3: Incident Response - NIST
  2. [2] MITRE ATT&CK for Enterprise - MITRE Corporation
  3. [3] Gartner Magic Quadrant for SIEM 2024 - Gartner
  4. [4] BSI: Empfehlungen zum Aufbau eines SIEM - BSI

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
This article was last edited on 04.03.2026. Responsible: Chris Wojzechowski, Geschäftsführender Gesellschafter at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung