Enterprise Guide

SOC/SIEM Playbook: Building Enterprise Detection & Response

Comprehensive guide to building a Security Operations Center (SOC) with SIEM, SOAR, and XDR. Covers threat detection, incident response, vendor selection, staffing, and automation playbooks for 24/7 operations.

By Basim Ibrahim, OSCP Certified Senior Presales Consultant
Dubai, UAE
18 min read
3,600 words

SIEM vs. SOAR vs. XDR: Understanding the Stack

Enterprise threat detection and response rely on three complementary technologies. Understanding the differences is critical for building an effective SOC:

Aspect SIEM SOAR XDR
Purpose Log aggregation, analysis, alerting Automate incident response workflows Endpoint-centric threat detection
Data Sources Logs from entire infrastructure SIEM alerts, ticketing, APIs Endpoint agents, telemetry, behavior
Automation Level Correlation rules, basic alerting Full playbook orchestration Behavioral blocking, response actions
Skill Required SIEM engineer, SOC analyst Security architect, Python/automation Threat intelligence, threat hunting
Cost $300K-$1M+ (licensing, infra, staffing) $100K-$500K (licenses, customization) $50K-$300K (per endpoint)
Typical ROI Timeline 12-18 months 6-12 months (reduces SIEM staffing) 3-6 months (prevents breaches)

Which Should You Deploy First?

Recommended progression for enterprise: Start with SIEM (log collection, baseline detections), add XDR (endpoint protection), then layer SOAR (response automation) on top. This ensures you have data, detection, and response capabilities across all layers.

Phased Deployment: Detect → Respond → Hunt

Phase 1: Detection Infrastructure (Months 1-3)

  • Deploy SIEM Core: Palo Alto Networks Cortex XSOAR, Splunk, or Microsoft Sentinel. Configure log ingestion from network devices, firewalls, DNS, proxies, and servers.
  • Establish Log Retention: Configure appropriate retention policies (90 days hot, 1 year cold storage). Ensure compliance with NESA and archival requirements.
  • Deploy Agents: Install log shippers (Filebeat, Splunk UF, Logstash) on critical servers to centralize logs.
  • Create Baseline Dashboards: Build visibility dashboards for traffic volume, failed logins, antivirus alerts, firewall blocks.
  • Define Metrics: Establish KPIs (mean time to detect, false positive rate, alert volume).

Phase 2: Detection Rules & Alerting (Months 2-6)

  • Deploy XDR/EDR: CrowdStrike Falcon, Microsoft Defender, or Elastic EDR on all endpoints. Ingests telemetry into SIEM.
  • Build Correlation Rules: Create SIEM rules for common attacks (brute force, privilege escalation, data exfiltration). Start with high-fidelity rules to minimize false positives.
  • Alert Tuning: Test and refine rules. Reduce noise by whitelisting legitimate activities (scheduled backup scripts, automated scans).
  • MITRE ATT&CK Mapping: Map detection rules to MITRE ATT&CK framework for visibility into attack coverage.
  • Alert Escalation: Define alert severity levels and escalation paths. Critical alerts page on-call analyst; medium alerts go to queue.

Phase 3: Response Automation & Playbooks (Months 4-9)

  • Deploy SOAR: Integrate SOAR (Palo Alto Networks XSOAR, Splunk SOAR, or Rapid7 InsightConnect) with SIEM and ticketing system.
  • Build Playbooks: Create automated response playbooks for common incidents (malware detected, brute force attack, data exfiltration). Playbooks execute containment actions without human intervention.
  • Case Management: Implement structured incident case workflow. Analysts triage, investigate, and close cases in SOAR.
  • Runbook Documentation: Document investigation procedures, escalation paths, and communication templates for analysts.
  • Integration with Other Tools: Connect SOAR to cloud providers, proxies, firewalls for automated blocking, credential rotation, and isolation.

Phase 4: Threat Hunting & Optimization (Months 8+)

  • Hire Threat Hunter: Bring on a dedicated threat hunter to proactively search for advanced threats SIEM might miss.
  • Threat Intelligence Integration: Feed external threat intelligence (IP feeds, file hashes, domains) into SIEM for context enrichment.
  • Continuous Improvement: Weekly reviews of detection gaps, false positives, and missed detections. Iterate on rules and playbooks.
  • Tabletop Exercises: Conduct quarterly simulated incident response exercises to validate playbooks and team readiness.
  • Metrics & Reporting: Monthly SOC metrics dashboard for leadership (detections, incidents, MTTR, automation rate).

Detection Use Cases for Enterprise

1. Breach Detection (Ransomware & Data Exfiltration)

Detect indicators of compromise before damage occurs:

  • Lateral Movement: Monitor for unusual RDP, SSH, or SMB traffic between servers. Ransomware spreads via lateral movement before encrypting data.
  • File Encryption Activity: Detect rapid file modification across many systems (hallmark of ransomware). Alert on suspicious processes creating encrypted files.
  • Data Exfiltration: Monitor DNS queries to known file-sharing services (Mega, Transfer.sh). Alert on bulk data uploads to cloud services outside approved SaaS.
  • Command & Control (C2) Traffic: Block/alert on outbound connections to known malicious domains and IPs using threat intelligence feeds.

2. Compliance Monitoring

Maintain visibility into compliance posture for audits and regulations:

  • Access Logging: Collect all access to sensitive systems (PCI-DSS cardholder data, PHI health records, NESA critical infrastructure). Audit changes to access controls.
  • Configuration Monitoring: Alert on unapproved changes to firewalls, databases, or security appliances. Track compliance against hardening baselines.
  • Privileged Activity Monitoring: Log all admin activities for SOX, HIPAA, PCI compliance. Generate attestation reports for auditors.
  • Data Residency Compliance: Verify data is stored and processed in approved geographic locations (UAE for NESA-regulated entities).

3. Insider Threat Detection

Identify malicious or negligent insiders before damage:

  • Unusual Access Patterns: Off-hours logins, access to systems outside normal job function, access to competitor files.
  • Data Exfiltration: Abnormal downloads of sensitive files, USB drive usage, cloud upload activity.
  • Privilege Escalation: User requesting admin access inappropriately or accounts suddenly gaining elevated permissions.
  • Termination Workflows: Alert when departing employees access sensitive data, disable accounts immediately, audit their final actions.

Integration Patterns: APIs, Agents, Log Shippers

Log Ingestion Methods

  • Syslog/CEF: Traditional protocol for log forwarding. Lightweight, widely supported. Use for network devices, firewalls, proxies.
  • API Polling: Pull logs directly from cloud services (AWS CloudTrail, Azure Activity Log, Office 365 audit logs). Real-time or near-real-time ingestion.
  • Log Shippers (Filebeat, Fluentd): Agents deployed on servers that parse and forward logs in structured format. Parse, enrich, and filter before sending to SIEM.
  • Cloud-Native Connectors: SIEM vendors provide pre-built connectors for AWS, Azure, GCP, Salesforce, etc. One-click integration with proper permissions.

API Integrations for Response

  • Firewall Block Lists: SOAR API calls to firewall to add malicious IPs to blocklist automatically.
  • Endpoint Isolation: API call to EDR/XDR to isolate compromised endpoint from network during incident investigation.
  • Account Lockout: Suspend user account via IAM API if suspicious activity detected (multiple failed logins, privilege escalation).
  • Ticket Integration: Auto-create Jira/ServiceNow tickets for each alert; auto-close when incident resolved.

Alert Tuning & Reducing False Positives

A major complaint from SOC teams: too many alerts, too many false positives. Tuning is an ongoing process:

Common False Positives & Solutions

  • Scheduled Backup Activity: Backups generate bulk file reads, network traffic. Whitelist backup servers and backup windows to avoid false "data exfiltration" alerts.
  • Antivirus Quarantine: Antivirus scanning generates many file-open events. Exclude antivirus processes from file access rules.
  • Patch Management: Monthly patch Tuesday generates many process executions and service restarts. Schedule rules to be less sensitive on patch days.
  • Testing & QA: QA environments mimic production attacks for testing. Exclude QA systems from breach detection rules.
  • Legitimate Admin Activity: DBAs running bulk queries, engineers deploying code. Whitelist known legitimate scripts and processes.

Tuning Best Practices

  • Baseline Normal: Run rules for 2-4 weeks in "learning mode" to establish baseline. Identify and whitelist legitimate activity.
  • Severity Stratification: Critical = immediate page. High = queue within 1 hour. Medium = queue within 4 hours. Low = daily review. Don't alert on everything.
  • Context Enrichment: Enrich alerts with user info, asset criticality, threat intelligence. Context helps analysts quickly assess severity.
  • Feedback Loop: Weekly reviews of false positives. Update whitelist and tuning rules. Measure false positive rate (target: <5%).

Correlation Rules for Common Attacks

Ransomware Attack Chain Detection

Indicators to Detect:

  1. Exploit Kit / Initial Access (vulnerable web server, RDP brute force) → Alert on successful login after failed attempts
  2. Lateral Movement (SMB traffic, PSExec commands) → Alert on unusual RDP/SSH between servers
  3. Privilege Escalation (Mimikatz, credential theft) → Alert on process execution of known attack tools
  4. Defense Evasion (disable Windows Defender, delete logs) → Alert on security tool tampering
  5. Encryption Activity (bulk file writes, file extensions changing) → Alert on suspicious process creating many encrypted files
  6. Command & Control / Exfiltration (C2 beaconing, data upload) → Alert on outbound connections to suspicious domains

Privilege Escalation Detection

Detection Rules:

  • Detect execution of privilege escalation exploits (kernel exploits, UAC bypass, token impersonation)
  • Alert on unexpected sudo/runas commands with SYSTEM/root privileges
  • Monitor for changes to user group membership (adding user to admin group)
  • Detect credential dumping tools (Mimikatz, SecretsDump, hashdump)

Data Exfiltration Detection

Detection Rules:

  • Bulk DNS queries to file-sharing services (Mega, Transfer.sh, Firebase)
  • Large outbound data transfer to untrusted destinations (non-whitelisted cloud, personal emails)
  • Email with unusual attachment or external recipients (especially to competitors, threat actors)
  • Database dump files transferred out of firewall (SQL dumps, database backups)
  • VPN/Proxy logs showing large downloads during off-hours

Building Playbooks: Response Runbooks

Sample Playbook: Ransomware Incident Response

Trigger:

Alert: "Suspicious file encryption activity detected on server PROD-DB-01"

Automated Actions (SOAR Playbook):

  1. Quarantine Endpoint: SOAR API call isolates PROD-DB-01 from network (network isolation, disable network interface).
  2. Snapshot Evidence: Capture memory dump and disk snapshot for forensics before data loss.
  3. Create Incident Case: Auto-create incident ticket with hostname, user, timestamp, and affected data.
  4. Notify Security Team: Page incident commander and SOC lead via PagerDuty.
  5. Preserve Logs: Lock down logs in SIEM (immutable) to prevent attacker deletion.

Manual Investigation (Analyst Follow-up):

  1. Determine scope: What data was encrypted? When did encryption start? What user/process initiated it?
  2. Check for lateral movement: Are other systems affected? Is attacker still active?
  3. Check for exfiltration: Was data stolen before encryption? Check DNS, proxy logs.
  4. Preserve evidence: Create forensic image, preserve memory, collect logs.
  5. Notify stakeholders: Legal, PR, customers (if needed), law enforcement.
  6. Recovery: Restore from clean backups (if available), verify no backdoors, reimage systems.

Vendor Selection Criteria & Top Platforms

SIEM Platform Evaluation Checklist

  • ✓ Ingest 10K+ events per second without bottleneck
  • ✓ Pre-built correlation rules for common attacks (MITRE ATT&CK coverage)
  • ✓ Advanced analytics (ML-based anomaly detection, behavioral analytics)
  • ✓ Cloud-native (AWS, Azure, GCP) or on-premises (choose based on compliance)
  • ✓ Integrated threat intelligence feeds
  • ✓ API-first architecture for integration with SOAR, EDR, cloud services
  • ✓ Advanced search capabilities (not just basic log search)
  • ✓ Compliance reporting (NESA, ISO 27001, PCI DSS, HIPAA)
  • ✓ Pricing model that scales (per-GB, per-event, or subscription)
  • ✓ 24/7 support with local UAE/GCC presence

Top SIEM Platforms for Enterprise

  • Microsoft Sentinel: Cloud-first, integrates natively with Azure/O365. Good for Microsoft-heavy environments. Pricing: pay-per-GB. Fastest deployment for Azure customers.
  • Splunk Enterprise Security: Market leader. Powerful search, extensive apps/integrations. Higher cost ($500K+/year for large deployments). Mature, trusted.
  • Palo Alto Networks Cortex XSOAR: Integrated SIEM + SOAR. Excellent for full detection-to-response workflow. Mid-market sweet spot. Strong automation capabilities.
  • Elastic SIEM: Open-source foundation, excellent for cost-conscious teams. Growing enterprise adoption. Requires skilled engineering team.
  • Datadog Security Monitoring: Modern, cloud-native. Real-time detection. Strong endpoint integration. Growing platform.

Staffing & Skills Needed for 24/7 SOC

Team Structure for Enterprise SOC

Tier 1: Analysts (5-10)

Entry-level: Monitor alerts, triage incidents, escalate to Tier 2. 8-hour shifts, 24/7 rotation.

Tier 2: Senior Analysts (2-4)

Mid-level: Deep investigation, containment, playbook execution. On-call or 8-hour shifts.

Incident Commander (1)

Coordinates response, communicates with leadership, escalates to law enforcement/regulators. On-call 24/7.

Threat Hunter (1-2)

Proactively hunts for advanced threats. Works normal business hours. Improves detection capabilities.

SIEM Engineer (1-2)

Manages SIEM infrastructure, tunes rules, integrations. Works 8-hour shifts, on-call for incidents.

SOC Manager (1)

Oversees team, metrics, hiring, budget, liaison with leadership. Works 8-hour shifts.

Staffing Cost Estimate (Enterprise, 10 Analysts + Support)

Annual Staffing Cost: ~$1.5M-$2M (salaries, benefits, training). This is often more expensive than SIEM/SOAR tools themselves. Justify SOC investment to leadership with risk mitigation: detecting breach early can save $4M+ in response costs.

Related Cluster Articles

Deepen your SOC/SIEM expertise with these complementary guides:

Frequently Asked Questions

SIEM aggregates logs from the entire infrastructure and detects threats through log analysis and correlation. XDR focuses on endpoint-centric detection using behavioral analysis, file execution telemetry, and threat hunting. Both are complementary—SIEM provides broad visibility; XDR provides deep endpoint visibility.

SIEM costs vary widely. Enterprise Splunk: $500K-$2M annually. Microsoft Sentinel: $0.50-$2 per GB ingested. Palo Alto Cortex: $300K-$1M. Budget for licensing + infrastructure + staffing. Expect $600K-$2M year 1 for medium-sized organization.

Typical timeline: 3-6 months for deployment. Add 3-6 months for tuning and optimization. Full SOC maturity (detection, response, hunting) takes 12-18 months.

No. SIEM is a tool. SOC is a team + processes + tools. SIEM enables detection; skilled analysts enable response. You still need 24/7 staffing, incident playbooks, and threat intelligence. SIEM alone is blind without human expertise.

SOAR is not strictly necessary but highly valuable. SIEM detects threats; SOAR automates response. If you have small team and need faster response, SOAR reduces manual work and human error. Start with SIEM, add SOAR once mature.

NESA recommends 1 year minimum; banking typically requires 7 years. Store recent logs (90 days) hot in SIEM for fast search; archive older logs to cold storage (S3, Glacier) for long-term retention at lower cost.

Talent is limited in GCC. Budget for competitive salaries ($80K-$180K/year for analysts). Hire globally and sponsor visas if needed. Invest in training programs and certifications (CEH, OSCP, GIAC) to develop junior talent into senior analysts.

Ready to Build Your SOC?

Get a SIEM/SOC assessment and roadmap. I'll help you evaluate platforms, design architecture, and plan a phased implementation aligned with your compliance requirements and budget.

Schedule a SOC Planning Session
Weekly Cyber Insights

One email per week. UAE/GCC focused. No spam, unsubscribe any time.