Sample SOC Standard Operating Procedure (SoP)
📘 1. Introduction
• Purpose: Define roles, responsibilities, and processes for SOC operations.
• Scope: Covers 24x7 monitoring, incident detection, response, and
escalation.
• Audience: SOC analysts, incident responders, management, IT, compliance
teams.
2. SOC Roles & Responsibilities
Role Responsibility
Tier 1 Analyst Monitor alerts, triage incidents, escalate as needed
Tier 2 Analyst Investigate escalated incidents, perform threat hunting
Tier 3 / IR Lead incident response, coordinate with stakeholders
SOC Manager Oversee operations, reporting, and team performance
🚦 3. Incident Lifecycle & Classification
Incident Categories:
• Unauthorized access
• Malware detection
• Insider threat
• DoS/DDoS attacks
• Data exfiltration
Severity Levels:
Severity Description Response Time
Critical Active breach/data loss Immediate
High Threat detected with impact <30 mins
Medium Suspicious behavior <4 hours
Low Informational Next business day
📡 4. Detection & Monitoring
• Use [SIEM tool] for real-time log analysis.
• Set up correlation rules for known threat patterns.
• Integrate threat intelligence feeds.
🔍 5. Investigation Process
1. Validate the alert (false positive check).
2. Correlate with logs (firewall, EDR, proxy, etc.).
3. Check for known indicators of compromise (IOCs).
4. Assign severity and document findings.
📈 6. Escalation Protocol
• Tier 1 ➡ Tier 2 ➡ Tier 3 ➡ CISO or IR team
• Use internal ticketing (e.g., ServiceNow/JIRA)
• Notify stakeholders via email/chat for critical incidents.
🧪 7. Containment & Eradication
• Isolate affected endpoints
• Revoke compromised accounts
• Remove malware using EDR/AV tools
• Patch vulnerabilities
🧾 8. Post-Incident Activities
• Root Cause Analysis (RCA)
• Lessons learned workshop
• Update detection rules/playbooks
• Submit incident report (within 24-72 hours)
9. Shift Handover Process
• Daily briefing: key incidents, pending investigations
• Use handover template with:
○ Ongoing tickets
○ Critical system status
○ Upcoming maintenance
🧰 10. Tools & Technologies
• SIEM: [Splunk / QRadar / Sentinel]
• SOAR: [Cortex XSOAR / IBM Resilient]
• Threat Intel: [AlienVault OTX / MISP]
• EDR/XDR: [CrowdStrike / SentinelOne]
🧾 11. Documentation & Reporting
• Incident logbook
• Daily summary reports
• Weekly trend dashboards
• Compliance logs (for audits)
12. Compliance Mapping (Optional)
Map each SoP element to:
• NIST 800-61
• ISO/IEC 27035
• MITRE ATT&CK tactics