7
Most read
10
Most read
16
Most read
Dr. Anton Chuvakin Office of the CISO, Google Cloud
SOC, SecOps, Security
Operations Reminder
01
A security operations center provides centralized
and consolidated cybersecurity incident
prevention, detection and response capabilities.
Gartner
First Things First: A SOC is Still …
a SOC :-)
SOC is first a team.
Next a process.
And it uses
technology too.
2003 or 2023? Sec Ops is Ripe
for Transformation
We can’t store and analyze
all data, resulting in
blindspots
It’s cost prohibitive to
ingest all the data we need
It takes too long to
investigate alerts
We struggle to build
effective detection and
have too many false
positives/negatives
Our processes are too
manual, we are too slow to
respond to and remediate
threats
We don’t have enough
skilled engineers to make
everything work
SRE, DevOps
and Modern IT
02
BARD SAYS: What is the essence
of the DevOps revolution in IT?
DevOps is a set of practices that combines software development
(Dev) and IT operations (Ops). It aims to shorten the systems
development life cycle and provide continuous delivery with high
quality. DevOps is a culture, movement, or practice
that emphasizes the collaboration and communication of both
software developers and other information technology professionals
while automating the process of software delivery and infrastructure
changes.
The DevOps revolution in IT is about breaking down the silos
between development and operations teams and creating a more
collaborative and efficient way of working. It’s about automating
tasks, reducing manual errors, and improving communication and
collaboration.
DevOps can help organizations deliver software faster, more
reliably, and with higher quality. It can also help
organizations reduce costs and improve efficiency.
Google vs Enterprise “SecOps”
Problem What does Google do? What do most enterprises do?
Efficiency Automation/SRE is a mindset – part of the hiring
process, part of OKRs, and performance reviews
Experimenting with SOAR, full adoption is tough due
to minimal automation culture
Employee Shortage Requires coding interviews, high pay, attracts the
best, invests in growth
Hires traditional roles, no coding, rarely outsources,
less pay, less growth, more stress
Employee Burnout 40/40/20 between eng, operations, and learning Utilization is almost always >100%
Expensive Investment in efficiency solves for human costs Cost-prohibitive data ingestion, oftentimes paying
SIEM + DIY, increasing $ from complexity
Efficacy TI strongly embedded in D&R, mostly utilized
towards proactive work, strong collaboration across
Alphabet & benefits from developer hygiene
CTI team produces great reports, SOC doing fire
drills, >90% false positive rate, uneven distribution of
skill (Tier 3)
5 SRE Lessons for SOC
03
Let’s focus on
5 key areas today
Eliminate Toil
Use SLOs
Evolve Automation
Practice Release Engineering
Strive for Simplicity
Causes of Toil Less Gathering, More Analysis –
basics to automate
Key Activities To Implement
1. Too much technical debt
2. Priorities or goals are not aligned
3. Lack of training or support
4. Lack of collaboration
5. The business value to fix is too hard to
realize
● Gathering machine information
● Gathering user information
● Process executions
● All context needed to help get to final
(human) judgement
Activity
Train your team on toil & automation
Create an Automation Queue
Implement Blameless Postmortems
Conduct Weekly Incident Reviews
Implement SOAR
Hire Automation Engineer(s)
Implement CD/CR pipelines with metrics
Eliminate Toil
“...manual, repetitive, automatable, tactical, devoid of
enduring value, and that scales linearly as a service grows.”
01
● Analyst utilization gets optimized
● More creative work, less toil
● Time back to do more proactive work
● Deeper operationalization of intel
● SecOps can scale with the business!
Unit
costs
per
event
Evolve
Automation
02
10X is an Underestimate!
Use SLOs
Tips, gotchas, and core metrics to consider
03
Core metrics
Metric
event volume
event source counts
pipeline latency
triage time median
triage time at 95%
Incident resolution times
Common metrics (false positives, # of
incidents, etc)
Key tips Gotchas
1. Optimize metrics for optimal value
2. Manage with indicators + objectives
3. Metrics matter (in context)
4. Defeating attackers beats SLOs
5. Choose metrics that actually matter
6. Make your SLO’s open (within your
company)
● Fast =/= better – don’t incentivize
speed, incentivize thoroughness
● More =/= better – solving 5000 cases
manually is not better than automating
of that; #NoHeroes
Practice Release Engineering
04
Ad Hoc
Visibility
Significant Development
effort up front to implement
playbooks
Review playbooks when a
major problem occurs
Response
Orchestration
Security
Analytics
Significant Development
effort up front to implement
use cases
Add/Update detections in
response to major new threat
Onboard log sources as part
of major tech transformation
Review logs for new sources
when a problem comes up
Periodic
Quarterly review of playbook
performance and effectiveness
Dev Sprint to update playbooks
Quarterly review of detection efficacy
Update/Deprecate ineffective
detections
Add/Update detections in response to
major threat
Onboard log sources annual or
quarterly planned schedule
Review data monthly for new log
sources and to identify issues/outages
Continuous
Real-time alerts for detection efficacy drift
Update/Deprecate ineffective detections
at point of discovery
Active Threat Monitoring to proactively
identify new threats to build detections for
Onboard new log sources as they are
ready.
Real-time identification of new log sources
or log drops
Automatic creation of alerts for handling
Live Dashboards showing performance
and accuracy metrics for playbooks
Update/Deprecate ineffective playbooks
at point of discovery
Daily Review of SecOps work queues to
identify automation opportunities
"Complex systems require substantial human expertise in
their operation and management. This expertise changes in
character as technology changes but it also changes because
of the need to replace experts who leave. In every case,
training and refinement of skill and expertise is one part of the
function of the system itself. At any moment, therefore, a given
complex system will contain practitioners and trainees with
varying degrees of expertise.
Critical issues related to expertise arise from (1) the need to
use scarce expertise as a resource for the most difficult or
demanding production needs and (2) the need to develop
expertise for future use."
Human expertise in complex systems is
constantly changing
Strive for Simplicity
05
One consequence of not striving for simplicity
https://how.complexsystems.fail/
Actions
Reduce toil in your SOC -
shift toil to machines
Use SLOs / metrics
to drive change
Evolve automation in SIEM,
SOAR, threat intel, etc
Practice release engineering
for consistent improvement
Strive for simplicity with
processes, technology stack, etc
Improvement
The Power of
Continuous
Improvement
Exponential growth happens faster
when compounded more frequently
Organizing your people and processes
around continuous improvement means
more agility and less resources
Periodic improvement strategies leave
capability gaps between sprints Time
Resources
“Achieving Autonomic Security
Operations: Reducing toil”
“Achieving Autonomic Security
Operations: Why metrics matter (but
not how you think)”
“More SRE Lessons for SOC:
Release Engineering Ideas”
“Achieving Autonomic Security
Operations: Automation as a Force
Multiplier”
“More SRE Lessons for SOC:
Simplicity Helps Security”
safer together
thank you

More Related Content

PPTX
DevOps-as-a-Service: Towards Automating the Automation
PPTX
Devops as a service
PPTX
Accenture DevOps: Delivering applications at the pace of business
PPTX
How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...
PDF
Next Gen ADM: The future of application services.
 
PPTX
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
PDF
DevSecOps: The DoD Software Factory
PPTX
Introducing PagerDuty Process Automation
DevOps-as-a-Service: Towards Automating the Automation
Devops as a service
Accenture DevOps: Delivering applications at the pace of business
How We Do DevOps at Walmart: OneOps OSS Application Lifecycle Management Plat...
Next Gen ADM: The future of application services.
 
AppSec & DevSecOps Metrics: Key Performance Indicators (KPIs) to Measure Success
DevSecOps: The DoD Software Factory
Introducing PagerDuty Process Automation

What's hot (20)

PPTX
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
PPTX
SOCstock 2021 The Cloud-native SOC
PPTX
Insight into SOAR
PDF
IBM QRadar Security Intelligence Overview
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PPTX
QRadar, ArcSight and Splunk
PPTX
IBM Security QRadar
PDF
DTS Solution - Building a SOC (Security Operations Center)
PPTX
Effective Security Operation Center - present by Reza Adineh
PPTX
MSSP - Security Orchestration & Automation
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
resilient_training_labs v12 copy.pptx
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
The ATT&CK Philharmonic
PPTX
Cyber threat intelligence: maturity and metrics
PDF
AI and Cybersecurity - Food for Thought
PPTX
SOAR and SIEM.pptx
PDF
Introduction to MITRE ATT&CK
PDF
Building A Security Operations Center
PDF
Rothke secure360 building a security operations center (soc)
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
SOCstock 2021 The Cloud-native SOC
Insight into SOAR
IBM QRadar Security Intelligence Overview
Bridging the Security Testing Gap in Your CI/CD Pipeline
QRadar, ArcSight and Splunk
IBM Security QRadar
DTS Solution - Building a SOC (Security Operations Center)
Effective Security Operation Center - present by Reza Adineh
MSSP - Security Orchestration & Automation
From SIEM to SOC: Crossing the Cybersecurity Chasm
resilient_training_labs v12 copy.pptx
INCIDENT RESPONSE NIST IMPLEMENTATION
The ATT&CK Philharmonic
Cyber threat intelligence: maturity and metrics
AI and Cybersecurity - Food for Thought
SOAR and SIEM.pptx
Introduction to MITRE ATT&CK
Building A Security Operations Center
Rothke secure360 building a security operations center (soc)
Ad

Similar to SOC Lessons from DevOps and SRE by Anton Chuvakin (20)

PPTX
Future of SOC: More Security, Less Operations
PPTX
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
PDF
Modern Security Operations - Building and leading modern SOC
PPTX
Meet the Ghost of SecOps Future by Anton Chuvakin
PDF
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
PPTX
ISACA Ireland Keynote 2015
PDF
Incident Management in the Age of DevOps and SRE
PPTX
DevSecCon KeyNote London 2015
PPTX
DevSecCon Keynote
PPTX
Cybersecurity Operations: Examining the State of the SOC
PDF
DevSecOps What Why and How
PDF
Strengthen and Scale Security for a dollar or less
PDF
Incident Management in the Age of DevOps and SRE
PDF
ATT&CKcon 5.0 Keynote - From Ticket Closers to Practitioners- How Great Secu...
PDF
Bridging the Gap Between Alert and Action with SOAR Services India
PDF
SRE Organizational Framework
PDF
Scale security for a dollar or less
PDF
S.R.E - create ultra-scalable and highly reliable systems
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PDF
Incident Management in the Age of DevOps and SRE
Future of SOC: More Security, Less Operations
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Modern Security Operations - Building and leading modern SOC
Meet the Ghost of SecOps Future by Anton Chuvakin
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
ISACA Ireland Keynote 2015
Incident Management in the Age of DevOps and SRE
DevSecCon KeyNote London 2015
DevSecCon Keynote
Cybersecurity Operations: Examining the State of the SOC
DevSecOps What Why and How
Strengthen and Scale Security for a dollar or less
Incident Management in the Age of DevOps and SRE
ATT&CKcon 5.0 Keynote - From Ticket Closers to Practitioners- How Great Secu...
Bridging the Gap Between Alert and Action with SOAR Services India
SRE Organizational Framework
Scale security for a dollar or less
S.R.E - create ultra-scalable and highly reliable systems
Why Security Engineer Need Shift-Left to DevSecOps?
Incident Management in the Age of DevOps and SRE
Ad

More from Anton Chuvakin (20)

PPTX
SecureWorld 2025 Keynote Déjà Vu All Over Again_ Learning from Cloud's Early...
PPTX
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
PPTX
SOC Meets Cloud: What Breaks, What Changes, What to Do?
PPTX
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
PPTX
20 Years of SIEM - SANS Webinar 2022
PPTX
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
PPTX
Modern SOC Trends 2020
PPTX
Anton's 2020 SIEM Best and Worst Practices - in Brief
PPTX
Generic siem how_2017
PPTX
Tips on SIEM Ops 2015
PPTX
Five SIEM Futures (2012)
PPTX
RSA 2016 Security Analytics Presentation
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
PPTX
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
PPTX
SIEM Primer:
PPTX
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
PPTX
On Content-Aware SIEM by Dr. Anton Chuvakin
PPTX
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
PPTX
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
SecureWorld 2025 Keynote Déjà Vu All Over Again_ Learning from Cloud's Early...
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
20 Years of SIEM - SANS Webinar 2022
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
SIEM Primer:
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin

Recently uploaded (20)

PDF
STKI Israel Market Study 2025 version august
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
WOOl fibre morphology and structure.pdf for textiles
PPT
What is a Computer? Input Devices /output devices
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
August Patch Tuesday
PPT
Geologic Time for studying geology for geologist
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Modernising the Digital Integration Hub
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Assigned Numbers - 2025 - Bluetooth® Document
STKI Israel Market Study 2025 version august
Module 1.ppt Iot fundamentals and Architecture
WOOl fibre morphology and structure.pdf for textiles
What is a Computer? Input Devices /output devices
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A review of recent deep learning applications in wood surface defect identifi...
Benefits of Physical activity for teenagers.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
1 - Historical Antecedents, Social Consideration.pdf
A comparative study of natural language inference in Swahili using monolingua...
Chapter 5: Probability Theory and Statistics
Zenith AI: Advanced Artificial Intelligence
August Patch Tuesday
Geologic Time for studying geology for geologist
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Modernising the Digital Integration Hub
O2C Customer Invoices to Receipt V15A.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Getting started with AI Agents and Multi-Agent Systems
Assigned Numbers - 2025 - Bluetooth® Document

SOC Lessons from DevOps and SRE by Anton Chuvakin

  • 1. Dr. Anton Chuvakin Office of the CISO, Google Cloud
  • 3. A security operations center provides centralized and consolidated cybersecurity incident prevention, detection and response capabilities. Gartner First Things First: A SOC is Still … a SOC :-) SOC is first a team. Next a process. And it uses technology too.
  • 4. 2003 or 2023? Sec Ops is Ripe for Transformation We can’t store and analyze all data, resulting in blindspots It’s cost prohibitive to ingest all the data we need It takes too long to investigate alerts We struggle to build effective detection and have too many false positives/negatives Our processes are too manual, we are too slow to respond to and remediate threats We don’t have enough skilled engineers to make everything work
  • 6. BARD SAYS: What is the essence of the DevOps revolution in IT? DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high quality. DevOps is a culture, movement, or practice that emphasizes the collaboration and communication of both software developers and other information technology professionals while automating the process of software delivery and infrastructure changes. The DevOps revolution in IT is about breaking down the silos between development and operations teams and creating a more collaborative and efficient way of working. It’s about automating tasks, reducing manual errors, and improving communication and collaboration. DevOps can help organizations deliver software faster, more reliably, and with higher quality. It can also help organizations reduce costs and improve efficiency.
  • 7. Google vs Enterprise “SecOps” Problem What does Google do? What do most enterprises do? Efficiency Automation/SRE is a mindset – part of the hiring process, part of OKRs, and performance reviews Experimenting with SOAR, full adoption is tough due to minimal automation culture Employee Shortage Requires coding interviews, high pay, attracts the best, invests in growth Hires traditional roles, no coding, rarely outsources, less pay, less growth, more stress Employee Burnout 40/40/20 between eng, operations, and learning Utilization is almost always >100% Expensive Investment in efficiency solves for human costs Cost-prohibitive data ingestion, oftentimes paying SIEM + DIY, increasing $ from complexity Efficacy TI strongly embedded in D&R, mostly utilized towards proactive work, strong collaboration across Alphabet & benefits from developer hygiene CTI team produces great reports, SOC doing fire drills, >90% false positive rate, uneven distribution of skill (Tier 3)
  • 8. 5 SRE Lessons for SOC 03
  • 9. Let’s focus on 5 key areas today Eliminate Toil Use SLOs Evolve Automation Practice Release Engineering Strive for Simplicity
  • 10. Causes of Toil Less Gathering, More Analysis – basics to automate Key Activities To Implement 1. Too much technical debt 2. Priorities or goals are not aligned 3. Lack of training or support 4. Lack of collaboration 5. The business value to fix is too hard to realize ● Gathering machine information ● Gathering user information ● Process executions ● All context needed to help get to final (human) judgement Activity Train your team on toil & automation Create an Automation Queue Implement Blameless Postmortems Conduct Weekly Incident Reviews Implement SOAR Hire Automation Engineer(s) Implement CD/CR pipelines with metrics Eliminate Toil “...manual, repetitive, automatable, tactical, devoid of enduring value, and that scales linearly as a service grows.” 01
  • 11. ● Analyst utilization gets optimized ● More creative work, less toil ● Time back to do more proactive work ● Deeper operationalization of intel ● SecOps can scale with the business! Unit costs per event Evolve Automation 02 10X is an Underestimate!
  • 12. Use SLOs Tips, gotchas, and core metrics to consider 03 Core metrics Metric event volume event source counts pipeline latency triage time median triage time at 95% Incident resolution times Common metrics (false positives, # of incidents, etc) Key tips Gotchas 1. Optimize metrics for optimal value 2. Manage with indicators + objectives 3. Metrics matter (in context) 4. Defeating attackers beats SLOs 5. Choose metrics that actually matter 6. Make your SLO’s open (within your company) ● Fast =/= better – don’t incentivize speed, incentivize thoroughness ● More =/= better – solving 5000 cases manually is not better than automating of that; #NoHeroes
  • 13. Practice Release Engineering 04 Ad Hoc Visibility Significant Development effort up front to implement playbooks Review playbooks when a major problem occurs Response Orchestration Security Analytics Significant Development effort up front to implement use cases Add/Update detections in response to major new threat Onboard log sources as part of major tech transformation Review logs for new sources when a problem comes up Periodic Quarterly review of playbook performance and effectiveness Dev Sprint to update playbooks Quarterly review of detection efficacy Update/Deprecate ineffective detections Add/Update detections in response to major threat Onboard log sources annual or quarterly planned schedule Review data monthly for new log sources and to identify issues/outages Continuous Real-time alerts for detection efficacy drift Update/Deprecate ineffective detections at point of discovery Active Threat Monitoring to proactively identify new threats to build detections for Onboard new log sources as they are ready. Real-time identification of new log sources or log drops Automatic creation of alerts for handling Live Dashboards showing performance and accuracy metrics for playbooks Update/Deprecate ineffective playbooks at point of discovery Daily Review of SecOps work queues to identify automation opportunities
  • 14. "Complex systems require substantial human expertise in their operation and management. This expertise changes in character as technology changes but it also changes because of the need to replace experts who leave. In every case, training and refinement of skill and expertise is one part of the function of the system itself. At any moment, therefore, a given complex system will contain practitioners and trainees with varying degrees of expertise. Critical issues related to expertise arise from (1) the need to use scarce expertise as a resource for the most difficult or demanding production needs and (2) the need to develop expertise for future use." Human expertise in complex systems is constantly changing Strive for Simplicity 05 One consequence of not striving for simplicity https://how.complexsystems.fail/
  • 15. Actions Reduce toil in your SOC - shift toil to machines Use SLOs / metrics to drive change Evolve automation in SIEM, SOAR, threat intel, etc Practice release engineering for consistent improvement Strive for simplicity with processes, technology stack, etc
  • 16. Improvement The Power of Continuous Improvement Exponential growth happens faster when compounded more frequently Organizing your people and processes around continuous improvement means more agility and less resources Periodic improvement strategies leave capability gaps between sprints Time
  • 17. Resources “Achieving Autonomic Security Operations: Reducing toil” “Achieving Autonomic Security Operations: Why metrics matter (but not how you think)” “More SRE Lessons for SOC: Release Engineering Ideas” “Achieving Autonomic Security Operations: Automation as a Force Multiplier” “More SRE Lessons for SOC: Simplicity Helps Security”

Editor's Notes

  • #4: “SOCless SOC” and “Fusion center”
  • #5: And security operations is definitely ripe for transformation - many of the challenges that secops teams are faced with have been around for years.
  • #9: Project deep dive
  • #10: Add speaker notes or “Paste without formatting” (⌘+Shift+V on Mac) to retain this optimal font size for presenting in MP7 Maximum 5-6 bullets per slide If presenting someplace other than SVL-MP7-Valley Oak, reduce the speaker notes font size
  • #12: Shelly Advanced API security is an add on to Apigee which is focused on premium security services. It helps users design and build secure APIs. As being part of the API management platform, we are embedded in the entire API lifecycle and are able to provide visibility and controls to API security configurations Operate securely means how do you secure your APIs in runtime. We detect any abuse on your APIs logic or sensitive information and provide in-product dashboards or integration with SIEM for further analysis and alerting. Lastly, we bring to Apigee the experience we have in Google with security and Machine Learning in order to improve their security posture.
  • #13: Project deep dive
  • #14: We went through a significant modernization effort ourselves, especially in the years after the Aurora attack In 2015, we had minimal automation in place, and there was a high unit cost to managing D&R events Over the course of years, Alphabet’s estate grew exponentially, but we were able to achieve a 90% level of efficiency, thanks to our program grounded in SRE-based approaches Through the years, this radical focus on automation freed up time to allow our engineers to focus on higher order events More creative work, less toil based work More proactive work and threat hunting Better consumption, creation, and operationalization of threat intelligence across our workflows And most importantly, our engineers have significant influence with upstream development teams, where entire classes of threats can be mitigated before it hits the D&R workflow We’ve taken these learnings and paired them with our commercial capabilities to help our customers transform their SOC
  • #17: https://medium.com/anton-on-security/more-sre-lessons-for-soc-simplicity-helps-security-1f8a739ca422