The costs of founding a Security Operations Centre come mainly from the following 3 factors:

  • Procuring and furnishing a physical location
  • Hiring staff
  • Tools and hosting costs

Procuring and Furnishing A Physical Location

Some organisations may choose not a have a physical location for their SOC, particularly if they are primarily remote. The SIEM, ITSM, MISP and other core components can be made accessible from anywhere, after all. Or they may choose to start commence deployment remotely, and then procure a facility when possible. Some deciding factors include:

  • If the number of SOC staff will be small, they could share the space of the IT department.
  • Consider who will be responsible for responding to different kinds of incidents- usually either the SOC itself or the IT. For instance, an account compromise can be resolved remotely, but if a computer is infected with a bootkit malware, this would require someone to find the machine in-person and re-image it.
  • A physical location will always foster better team relationships, knowledge sharing and collaboration between analysts.
  • Consider, also, whether the sensitivity of the data that the analysts will be dealing with warrants separation.

Once/if a physical location is selected, aside from the standard office requirements (desks, chairs, laptops), below are some additional design considerations:

  • Open desk plans are superior to cubicles for communication.
  • A monitor wall is beneficial for displaying any dashboards with important data, such as the health of data sources and open incidents (see Workplace Ninja’s guide for setting up a monitor wall).
  • Physical access control systems, such as RFID card-based door locks and biometrics, are usually implemented to restrict access to select employees with authorisation to view the data in the room.
  • While you don’t have to lock your analysts away in a dungeon, unglazed windows are a vulnerability. If you can see other buildings or people from your window, an ultra-zoom camera can see what’s on your screen.

Hiring Staff

The various factors affecting the scope of responsibilities and functions discussed on the last page will determine how many you will need to hire. In addition to the SOC manager (who is assumed to be the one taking the lead in this deployment process), it is recommended to start with at least one analyst for a 9/5 operation. Then, once the logs are flowing, some detections are configured and alerts are initially tuned, the SOC can run in ‘evaluation mode’ and decide how many analysts they need. I will go more in depth into hiring and SOC organisation structure, but below is an overview of typical roles within a SOC.

RoleResponsibilitiesSalary (AUD)
Level 1 AnalystTriaging alerts, investigating basic incidents (e.g. Phishing).60-80k
Level 2 AnalystInvestigating more complex incidents.80-110k
Level 3 AnalystComplex threat hunting and digital forensics.90-130k
SOC EngineerDetection engineering, developing playbooks, designing the SOC.90-140k
SOC ManagerOverall SOC strategy and management. Consulting with executives.150k+

For valuable hiring guidance, see also the NICE Framework (the Workforce Framework for Cybersecurity), which provides definitions of tasks, knowledge and skills that are required to fulfill various cyber security roles, and also prescribes training/certification recommendations.

Tools and Hosting Costs

Now comes the stage where you need to list out the infrastructure components of your SOC.

ComponentDescriptionSelectionCapEx (AUD)OpEx (AUD)
SIEM (Security Incident & Event Manager)The heart of the SOC into which all logs are fed to be analysed for anomalies and threats, and generates alerts.Azure Sentinel0See log analytics workspace ingest cost plans Default pay-as-you-go is $5.16 per GB per month
ITSM (IT service management)Also known as the IT ticketing system. Alerts generated in the SIEM will be fed into here for easier tracking and collaboration with the IT department.SnipeIT (it’s free, okay)00
SOAR (Security Orchestration, Automation and Response)Platform used to coordinate automated response to alerts generated by the SIEM. Improves response times and reduces labour.Azure Logic Apps, Defender XDR 0License costs for various Defender products
+
Logic app compute costs (difficult to calculate but usually only a few dollars per month)
Archive StorageCold log storage for data retention purposes. May be required for compliance, and may be used for older incidents.Amazon S3 Storage0See S3 pricing Standard infrequent access tier is $0.0138 per GB per month
Detection-as-Code PlatformUsed for the controlled development, deployment and managing of detection rules, workbooks, playbooks and other contents.GitHub00
MISP (Managed Information Sharing Platform)Used to collect, filter and process threat intel data in a controlled manner before ingesting into the SIEM.MISP Threat Sharing0Self-hosting costs
Data control platformUsed to collect, filter, enrich and normalise log data before it reaches the SIEM, reducing ingest cost and improving query performance.Cribl Stream01 TB throughput per day free, then see pricing

To use the above chart to create a total costing estimate, we need to know what our log throughput will be (gigabytes per day). Thankfully, as mentioned above, our intermediary data platform Cribl allows for 1 TB free throughput per day, and will tell us exactly how many gigabytes our log sources are producing. Follow on the next page.