Security Operations Center (SOC): The Complete Guide for Compliance and Security Teams
2026-03-08
By Emre Salmanoglu

Security Operations Center (SOC): The Complete Guide for Compliance and Security Teams

Learn how to build and operate a Security Operations Center that satisfies ISO 27001, SOC 2, NIS2, and DORA requirements. Covers SOC models, SIEM integration, incident detection, threat hunting, and compliance evidence.

SOC
security operations
threat detection
incident response
compliance

What Is a Security Operations Center?

A Security Operations Center (SOC) is the centralised function responsible for continuously monitoring an organisation's IT environment, detecting cybersecurity threats, and coordinating incident response. It brings together security analysts, detection technologies, and defined processes to provide round-the-clock protection against cyberattacks.

For compliance-driven organisations, the SOC serves a dual purpose: protecting the business from threats and generating the continuous monitoring evidence that auditors and regulators require under ISO 27001, SOC 2, NIS2, and DORA.

SOC Operating Models

ModelDescriptionBest ForCost
In-house SOCFully internal team and infrastructureLarge enterprises with mature security programmesHigh
Managed SOC / MDROutsourced to managed security service providerSMEs needing 24/7 coverage without building a teamMedium
Hybrid SOCInternal team augmented by external servicesMid-size organisations needing specialised skillsMedium-High
Virtual SOCDistributed team without physical facilityRemote-first organisations, multi-location businessesMedium
SOCaaSCloud-based SOC as a ServiceStartups and scale-ups with limited security headcountLow-Medium

SOC Team Structure

RoleTierResponsibilitiesKey Skills
SOC AnalystTier 1Alert triage, initial investigation, routine incident handlingSIEM operation, basic forensics
Incident ResponderTier 2Deep investigation, threat hunting, complex incident handlingAdvanced forensics, malware analysis
Threat HunterTier 3Proactive threat hunting, adversary emulation, tool developmentThreat intelligence, scripting, reverse engineering
SOC ManagerManagementOperations oversight, metrics, compliance reporting, staffingLeadership, compliance frameworks, budgeting
SOC EngineerEngineeringTool deployment, detection rule development, automationSIEM engineering, SOAR development, scripting

SOC Technology Stack

LayerTechnologyPurpose
Log managementSIEM (Splunk, Microsoft Sentinel, Elastic)Aggregate, correlate, and analyse security logs
EndpointEDR/XDR (CrowdStrike, SentinelOne, Microsoft Defender)Monitor and respond to endpoint threats
NetworkNDR (Darktrace, Vectra, Zeek)Detect network-based threats and anomalies
AutomationSOAR (Palo Alto XSOAR, Splunk SOAR, Tines)Automate playbooks and orchestrate response
Threat intelTIP (MISP, Anomali, Recorded Future)Enrich alerts with threat intelligence context
VulnerabilityVulnerability scanners (Qualys, Tenable, Rapid7)Identify and prioritise vulnerabilities
TicketingITSM (ServiceNow, Jira, PagerDuty)Track incidents, document response, generate evidence

Detection and Response Process

PhaseActivitiesOutput
CollectionAggregate logs from endpoints, network, cloud, applicationsCentralised log repository
DetectionCorrelation rules, anomaly detection, threat intelligence matchingSecurity alerts
TriageValidate alerts, determine severity, check for false positivesPrioritised incident queue
InvestigationAnalyse scope, identify affected assets, determine root causeInvestigation report
ContainmentIsolate affected systems, block indicators of compromiseContained threat
EradicationRemove malware, patch vulnerabilities, close attack vectorsClean environment
RecoveryRestore systems, verify integrity, monitor for recurrenceRestored operations
Lessons learnedPost-incident review, detection rule improvements, process updatesUpdated playbooks and rules

SOC Metrics

MetricTargetWhy It Matters
Mean Time to Detect (MTTD)< 24 hoursMeasures detection speed
Mean Time to Respond (MTTR)< 4 hoursMeasures response effectiveness
False positive rate< 30%Indicates detection quality
Alert-to-incident ratio10:1 or betterShows alert tuning effectiveness
Dwell time< 14 daysTime threats persist undetected
Coverage ratio> 95%Percentage of assets monitored
Analyst utilisation60-80%Ensures capacity for surges

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORA
Continuous monitoringA.8.15-A.8.16CC7.2Art. 21(2)(b)Art. 10(1)
Incident detectionA.5.25CC7.3Art. 21(2)(b)Art. 10(1)
Log managementA.8.15CC7.2Art. 21(2)(g)Art. 10(2)
Incident responseA.5.26CC7.4Art. 23Art. 17
Threat intelligenceA.5.7CC3.2Art. 21(2)(a)Art. 13
ReportingA.5.27CC7.3Art. 23Art. 19

Audit Evidence

Evidence TypeDescriptionFramework
SOC operating proceduresDocumented processes for monitoring, detection, and responseAll frameworks
Alert and incident logsRecords of alerts generated, investigated, and resolvedAll frameworks
Detection rule inventoryCatalogue of active correlation rules and their coverageISO 27001, SOC 2
Incident response reportsDocumented investigations with timeline and resolutionAll frameworks
SOC metrics dashboardMonthly metrics showing MTTD, MTTR, alert volumesAll frameworks
Shift handover recordsDocumentation of coverage continuity and pending itemsISO 27001, DORA
Threat intelligence reportsEvidence of threat feed integration and analysisNIS2, DORA

Common Mistakes

MistakeRiskFix
Alert fatigue from untuned rulesAnalysts miss real threats among noiseContinuously tune detection rules, aim for < 30% false positive rate
No 24/7 coverageThreats go undetected during off-hoursImplement follow-the-sun, managed SOC, or on-call rotation
Collecting logs but not analysing themCompliance checkbox without security valueBuild correlation rules and conduct regular threat hunting
No incident playbooksInconsistent, slow response to incidentsCreate and test playbooks for top 10 incident types
Siloed SOC and IT operationsDelayed containment and remediationIntegrate SOC with IT operations and cloud teams
No metrics or reportingCannot demonstrate SOC value or complianceImplement monthly SOC metrics dashboard and trend reporting

How Orbiq Supports SOC Compliance

Orbiq helps you demonstrate security operations effectiveness:

  • Evidence collection — Centralise SOC procedures, incident reports, and metrics dashboards
  • Continuous monitoring — Track SOC coverage and incident response performance
  • Trust Center — Share your security monitoring posture via your Trust Center
  • Compliance mapping — Map SOC capabilities to ISO 27001, SOC 2, NIS2, and DORA
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading