العربية
HOME
SOC FEATURES
SOC COST CALCULATOR
SOC MATURITY ASSESSMENT
CONTACT US
العربية
SOC Maturity
Assessment
Initial Stage
Q1.
Which of the following scenarios best describe the functioning of your SOC elements such as reporting, governance, incident management, security analytics, log management, training and education, threat hunting, etc.
The elements or services are delivered in an ad-hoc fashion or are incomplete
The elements are documented and delivered consistently across business, people, process, and technology
The elements are managed and responded to based on ad-hoc feedback on the quality and timeline of deliverables
The services are being systematically measured based on quality, quantity, and timeline of deliverables
The services are continuously being optimized and improved upon
Q2.
How does your SOC correlate and analyze event data, IoCs and other security- and threat-related data?
Through SIEM
Through a threat intelligence platform
Through our log management platform
Through our automation and orchestration platform
Through internally-developed APIs and dashboards
Vulnerable
Q3.
What best describes the type of SIEM platform your team uses?
SaaS
Commercial on-prem
Open-source
Cloud provider solution
Custom internal solution
Q4.
How are metrics tracked and reported within your SOC?
No metrics tracking or reporting in place, or ad-hoc, informal methods are used that lack consistency and accuracy
Completely manual process requiring extraction of data from multiple sources and mostly manual calculation
Partially automated data extraction, with substantial manual effort required, and partially automated calculation
Primarily automated, with minimal manual effort to complete reporting
Fully automated via an integrated dashboard, with complete, ongoing visibility into SOC performance metrics
Secure
Q5.
How frequently is your SOC staff trained?
Semi-annually or annually
Quarterly
Monthly
Weekly
Daily
Q6.
How is human capital addressed in your SOC environment?
Management does not pay any mind to the unique staffing needs of a SOC and does little to encourage hiring skilled, experienced staff or retain them
Management thinks hiring multiple, less-skilled employees to stare at alerts is an acceptable strategy for mitigating cybersecurity threats in their environment
Management listens to the requests of SOC leads/managers regarding hiring skilled, experienced staff but does not understand the urgency to retain these skilled people.
Management is in the process of transitioning to a more value-added SOC with high-priority to talented and skilled people within.
Management pays close attention to the needs of SOC leads/managers with regard to hiring and retaining skilled, experienced staff to defend their environment.
Respond
Q7.
How would you define your incident response capability?
Incident response is a fully integrated part of our internal SOC strategy and have plans to implement
We use internal incident responders who perform response as an ad hoc duty when needed
We use dedicated internal incident responders, but they are separate from the SOC, with no plans to integrate
We use internal incident responders with whom we are trying to integrate our internal SOC but haven’t yet done so
We use internal incident responders who work with our external SOC services provider
Q8.
Which of the following technology scenarios best represent your security operations center?
Use of advanced analytics for vulnerability management, investigation, and detection. (E.g.: Attack path modeling to predict potential path of attack vector or behavioral analytics for detecting suspicious behavior)
Use of access control such as two-factor authentication and data encryption to ensure data and network security
Use of biometric authentication
Use of security orchestration automation, and authentication tools to get real-time security alerts and coordination of information
All of the above
Recovery
Q9.
What is your SOC’s relationship with your IT operations?
We don’t have an IT/NOC team
Our SOC and IT/NOC teams have very little direct communication
Our SOC and IT/NOC teams work together only when there are emergencies
Our IT/NOC team is an integral part of our detection and response, although our SOC and IT/NOC activities are not technically integrated
Our IT/NOC team and SOC team are kept well-informed through integrative dashboards with shared information, APIs, and workflows where needed
Q10.
What is your approach towards converging security operations with other functions?
We are converging aspects of security and IT operations
We are converging aspects of security operations and digital experience
We are converging aspects of security operations and application development
We are converging aspects of security operations and observability
All of the above
Submit
Provide your information below to receive your full security maturity report in your inbox.
First Name
Last Name
Business Email
Mobile Number
Organization Name
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia and Herzegowina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Congo
Congo, the Democratic Republic of the
Cook Islands
Costa Rica
Cote d'Ivoire
Croatia (Hrvatska)
Cuba
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
France, Metropolitan
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guinea
Guinea-Bissau
Guyana
Haiti
Heard and Mc Donald Islands
Holy See (Vatican City State)
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran (Islamic Republic of)
Iraq
Ireland
Israel
Italy
Jamaica
Japan
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia, The Former Yugoslav Republic of
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States of
Moldova, Republic of
Monaco
Mongolia
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Kitts and Nevis
Saint LUCIA
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Seychelles
Sierra Leone
Singapore
Slovakia (Slovak Republic)
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
Spain
Sri Lanka
St. Helena
St. Pierre and Miquelon
Sudan
Suriname
Svalbard and Jan Mayen Islands
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Taiwan, Province of China
Tajikistan
Tanzania, United Republic of
Thailand
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Turks and Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United Kingdom
United States
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
Western Sahara
Yemen
Serbia
Zambia
Zimbabwe
;
Country
By proceeding, you acknowledge and understand that the report/assessment provided is an initial approximation derived solely from the data you have furnished about your organization. You expressly recognize that the actual costs and maturity stages associated with SOC services may exhibit variation, influenced by the distinct nuances and external factors related to your organization. Consequently, this report/assessment is to be construed solely as a preliminary reference and does not constitute a guarantee, warranty, or representation of any kind by SAMI-AEC regarding the precise financial commitments or outcomes that may ultimately be incurred by your organization. SAMI-AEC expressly disclaims all liability for any security incidents or other adverse events that may occur subsequent to actions taken based on this report. By accepting these terms, you agree that any reliance upon this report will be at your own risk and discretion.
By submitting this request, you agree to the
Website Terms of Use
and SAMI-AEC’s processing of your personal data as described in SAMI-AEC’s
Privacy Policy
.
Captcha validation is required.
Contact Us