Lesson 6 of 6·16 min read·Includes quiz

Compliance & Governance for SOC Analysts

Risk management basics, NIST CSF, ISO 27001, PCI-DSS, security policies and procedures

What You'll Learn

  • Explain why SOC analysts need compliance knowledge beyond just "checking boxes"
  • Apply risk management fundamentals: risk = likelihood × impact, risk acceptance, risk mitigation, risk transfer
  • Map the NIST Cybersecurity Framework's five functions (Identify, Protect, Detect, Respond, Recover) to daily SOC activities
  • Describe ISO 27001 ISMS structure, control categories, and audit requirements at a SOC-relevant level
  • Identify PCI-DSS requirements that directly affect SOC operations (Requirement 10: logging, Requirement 11: testing)
  • Recognize HIPAA data protection requirements and how they shape detection and response procedures
  • Connect security policies (acceptable use, incident response, data classification) to real SOC workflows
  • Understand compliance-driven detection requirements: what you MUST log and for how long

Why SOC Analysts Need Compliance Knowledge

There is a common misconception among junior analysts: "Compliance is for auditors and managers, not for me." This is wrong, and here is why.

Compliance frameworks dictate the minimum security requirements your organization must meet. Those requirements directly translate into what your SIEM must log, how long you retain data, what you must detect, how fast you must respond, and what you must document during an incident. When a compliance audit fails, it is often because the SOC did not have the right logs, the right detections, or the right response documentation — all things that fall squarely on the security operations team.

Compliance RequirementSOC Impact
"Log all authentication events"You must ensure Wazuh agents collect auth logs from every system
"Retain logs for 12 months"Your indexer retention policy must be configured correctly
"Detect unauthorized access within 24 hours"Your detection rules and triage SLAs must meet this timeline
"Document incident response actions"Every investigation needs structured notes, not just "closed as FP"
"Notify affected parties within 72 hours"Your escalation procedures must include notification workflows

Career perspective: Compliance knowledge makes you more valuable. An analyst who can say "this detection rule satisfies PCI-DSS Requirement 10.6.1" to an auditor saves the SOC manager hours of preparation. Analysts who understand compliance get promoted faster because they can speak the language of risk, not just the language of alerts.

Risk Management Basics

Before diving into specific frameworks, you need to understand the foundational concept they all share: risk management.

The Risk Equation

Risk = Likelihood × Impact

Likelihood: How probable is it that a threat will exploit a vulnerability? Ranges from rare (major infrastructure failure) to almost certain (daily internet scanning against public servers).

Impact: How severe are the consequences if the threat materializes? Ranges from negligible (single workstation temporarily offline) to catastrophic (full customer data breach with regulatory penalties).

Risk Response Strategies

When you identify a risk, there are four possible responses:

StrategyDefinitionSOC Example
MitigateReduce likelihood or impactDeploy a detection rule to catch the attack early, reducing impact
AcceptAcknowledge the risk and do nothingLow-severity vulnerability on an isolated test server — cost of patching exceeds the risk
TransferShift the risk to a third partyCyber insurance covers the financial impact of a data breach
AvoidEliminate the activity that creates the riskDecommission the vulnerable legacy application entirely

Risk acceptance is not laziness — it is a deliberate business decision. Every organization accepts some risks because the cost of mitigation exceeds the potential loss. As a SOC analyst, you will encounter accepted risks in your environment. Your job is not to argue with accepted risks — it is to ensure they are documented, reviewed periodically, and that your detections still cover the residual exposure.

Risk Registers and the SOC

Organizations maintain a risk register — a living document that catalogs identified risks, their ratings, response strategies, and owners. SOC analysts interact with the risk register in several ways:

  • When you discover a new vulnerability or attack vector, it may need to be added to the register
  • When triaging alerts, knowing which assets are high-risk (from the register) helps you prioritize
  • When writing detection rules, the risk register tells you which threats the organization considers most important
  • During incidents, the risk register provides context about which systems carry the highest business impact

NIST Cybersecurity Framework (CSF)

The NIST Cybersecurity Framework is the most widely adopted cybersecurity framework in the United States and increasingly worldwide. Published by the National Institute of Standards and Technology, it provides a common language for managing cybersecurity risk.

NIST CSF Framework — The five core functions that structure all cybersecurity activities

The Five Core Functions

FunctionPurposeSOC Relevance
IdentifyUnderstand your environment, assets, and risksAsset inventory, risk assessment, threat modeling
ProtectImplement safeguards to limit impactAccess controls, security awareness training, data protection
DetectDiscover cybersecurity events in a timely mannerSIEM alerting, IDS/IPS, continuous monitoring — this is your primary function
RespondTake action on detected eventsIncident response, investigation, containment, communication
RecoverRestore capabilities after an incidentSystem recovery, lessons learned, improvements

As a SOC analyst, you operate primarily in Detect and Respond, but understanding all five functions gives you context about why certain controls exist and what happens upstream (Identify, Protect) and downstream (Recover) from your work.

NIST CSF and Daily SOC Operations

Detect function in practice:

  • DE.AE-2 (Anomalies and Events): "Detected events are analyzed to understand attack targets and methods." This is literally alert triage — your daily work.
  • DE.CM-1 (Continuous Monitoring): "The network is monitored to detect potential cybersecurity events." This is your Suricata deployment and Wazuh network log collection.
  • DE.CM-4 (Malicious Code Detection): "Malicious code is detected." Your YARA rules, Wazuh FIM, and endpoint detection capabilities.
  • DE.DP-4 (Detection Process): "Event detection information is communicated." Shift handoffs, incident reports, escalation procedures — the soft skills from Lesson 1.5.

Respond function in practice:

  • RS.AN-1 (Analysis): "Notifications from detection systems are investigated." Every alert you triage.
  • RS.AN-3 (Forensics): "Forensics are performed." Velociraptor endpoint investigation, PCAP analysis.
  • RS.CO-2 (Communication): "Incidents are reported consistent with established criteria." Escalation procedures, notification timelines.
  • RS.MI-1 (Mitigation): "Incidents are contained." Blocking IPs, isolating hosts, disabling compromised accounts.
💡

NIST CSF is not a checklist — it is a maturity model. Organizations self-assess their maturity for each function (Partial → Risk Informed → Repeatable → Adaptive). A Tier 1 SOC might have basic detection. A Tier 4 SOC has automated, continuously improving detection with predictive analytics. Know where your organization sits so you can articulate improvement opportunities.

ISO 27001 — Information Security Management

ISO 27001 is the international standard for Information Security Management Systems (ISMS). While NIST CSF provides a framework for organizing security activities, ISO 27001 provides a certifiable management system with mandatory requirements and auditable controls.

ISMS Structure

An ISMS is a systematic approach to managing sensitive information. It includes:

  • Policies: High-level statements of security intent (e.g., "All systems shall log authentication events")
  • Procedures: Step-by-step instructions for implementing policies (e.g., "Configure Wazuh agents to collect Windows Security Event Log")
  • Controls: Technical and administrative safeguards that reduce risk (e.g., "IDS deployment" is a control)
  • Audits: Periodic assessments that verify controls are implemented and effective

ISO 27001 Annex A Controls Relevant to SOC

ISO 27001 Annex A contains 93 controls organized into 4 categories. SOC analysts interact most with:

ControlCategorySOC Relevance
A.8.15 LoggingTechnicalEnsuring all required log sources feed into the SIEM
A.8.16 Monitoring activitiesTechnicalContinuous monitoring and alert triage — your core function
A.5.24 Information security incident management planningOrganizationalIncident response procedures and playbooks
A.5.25 Assessment and decision on information security eventsOrganizationalAlert classification and escalation criteria
A.5.26 Response to information security incidentsOrganizationalContainment, eradication, and recovery procedures
A.8.8 Management of technical vulnerabilitiesTechnicalVulnerability detection alerts and patch verification

Audit Readiness

ISO 27001 audits happen annually. Auditors will:

  • Review your SIEM configuration to verify required logs are collected
  • Examine incident response records to verify documented procedures were followed
  • Check alert response times against SLAs defined in your policies
  • Verify that security events are classified using a consistent methodology

What auditors actually look for from SOC teams: Complete logs from all required sources. Documented triage procedures. Evidence that procedures were followed (timestamps, analyst notes, escalation records). Consistent classification methodology. Response time metrics. Lessons learned from past incidents. If you document your work properly during daily operations, audit preparation becomes trivial.

PCI-DSS Essentials for SOC

The Payment Card Industry Data Security Standard (PCI-DSS) applies to any organization that stores, processes, or transmits credit card data. Even if your organization is not in retail or finance, understanding PCI-DSS is valuable because its requirements represent best practices that many frameworks share.

Requirement 10: Track and Monitor All Access

Requirement 10 is the most SOC-relevant section of PCI-DSS. It mandates:

Sub-RequirementWhat It Means for SOC
10.2.1 Log all individual user access to cardholder dataWazuh must collect access logs from systems storing card data
10.2.2 Log all actions taken by any individual with root/admin privilegesAll admin activity on in-scope systems must generate alerts
10.2.4 Log invalid logical access attemptsFailed authentication attempts must be captured and analyzed
10.2.5 Log use of identification and authentication mechanismsAccount creation, deletion, privilege changes — all logged
10.4 Synchronize all critical system clocksNTP must be configured consistently — timestamp accuracy matters for correlation
10.6.1 Review logs of security events dailyYour daily triage queue is a compliance requirement, not optional
10.7 Retain audit trail history for at least 12 monthsSIEM data retention must meet this minimum

Requirement 11: Regularly Test Security Systems

Sub-RequirementWhat It Means for SOC
11.4 Use IDS/IPS to detect intrusionsSuricata deployment is a compliance requirement for PCI environments
11.5 Deploy a change detection mechanismWazuh FIM (file integrity monitoring) satisfies this control
11.5.1 Respond to change detection alertsFIM alerts must be triaged — you cannot ignore them
🚨

PCI-DSS non-compliance has teeth. Fines range from $5,000 to $100,000 per month until compliance is achieved. After a breach involving card data, the organization faces forensic investigation costs, card brand penalties, and potentially losing the ability to process credit cards entirely. When an auditor asks "do you review security logs daily?" — the correct answer is a documented, timestamped record of your triage activity.

HIPAA and Data Protection

The Health Insurance Portability and Accountability Act (HIPAA) applies to healthcare organizations and their business associates. Its security requirements affect SOC operations in environments that handle Protected Health Information (PHI).

HIPAA Security Rule Highlights for SOC

  • Access Controls (§164.312(a)): Technical policies to allow only authorized access to ePHI. SOC must detect and investigate unauthorized access attempts.
  • Audit Controls (§164.312(b)): Hardware, software, and procedural mechanisms to record and examine access to information systems containing ePHI. This means SIEM logging is mandatory.
  • Integrity Controls (§164.312(c)): Policies to protect ePHI from improper alteration or destruction. FIM on systems storing health data is a HIPAA control.
  • Transmission Security (§164.312(e)): Technical measures to guard against unauthorized access to ePHI during electronic transmission. Network monitoring (Suricata) for unencrypted PHI transmission.
  • Incident Response (§164.308(a)(6)): Policies to identify, respond to, and mitigate security incidents. Documented incident response procedures are mandatory, not optional.

Breach Notification Requirements

HIPAA requires notification within 60 days of discovering a breach affecting PHI:

  • Notification to affected individuals
  • Notification to the Department of Health and Human Services (HHS)
  • For breaches affecting 500+ individuals, notification to media

The SOC's investigation timeline directly affects whether the organization can meet these notification deadlines. Delayed detection means delayed notification, which means regulatory penalties.

Security Policies and Procedures

Frameworks create requirements. Policies turn requirements into organizational commitments. Procedures turn policies into actionable steps. As a SOC analyst, you operate at the procedure level, but understanding the policy layer explains why your procedures exist.

Key Policies That Affect SOC Operations

Acceptable Use Policy (AUP): Defines what employees are permitted and prohibited from doing on company systems. SOC relevance: when you see an alert for a user visiting a prohibited website category or installing unauthorized software, the AUP is what determines whether this is a policy violation requiring action.

Incident Response Policy: Defines the organization's approach to security incidents — classification levels, escalation criteria, response timelines, communication protocols, and roles/responsibilities. This policy is the blueprint for everything you do during an incident.

Data Classification Policy: Defines categories of data sensitivity (Public, Internal, Confidential, Restricted) and handling requirements for each. SOC relevance: when triaging an alert involving data access, the classification of the accessed data determines the severity of the response. Unauthorized access to Public data is a low-priority policy violation. Unauthorized access to Restricted data is a critical incident.

Log Management Policy: Defines what must be logged, how long logs must be retained, who can access logs, and how log integrity is protected. This policy directly shapes your SIEM configuration and determines whether you have the data needed to investigate incidents.

DATA CLASSIFICATION AND SOC RESPONSE

┌────────────────────────────────────────────────────┐
│  RESTRICTED (PII, PHI, PCI, credentials)           │
│  → Unauthorized access = Critical incident         │
│  → Mandatory escalation to L2 + Legal              │
│  → Evidence preservation required                  │
├────────────────────────────────────────────────────┤
│  CONFIDENTIAL (financial reports, source code)     │
│  → Unauthorized access = High-severity incident    │
│  → Escalation to L2, notify data owner             │
├────────────────────────────────────────────────────┤
│  INTERNAL (employee directories, process docs)     │
│  → Unauthorized access = Medium-severity event     │
│  → L1 investigation, document and close            │
├────────────────────────────────────────────────────┤
│  PUBLIC (marketing material, published reports)    │
│  → Unauthorized access = Low-priority, log only    │
└────────────────────────────────────────────────────┘

Compliance-Driven Detection Requirements

The intersection of compliance and detection engineering produces mandatory detection rules — alerts that your SIEM must generate to satisfy regulatory requirements. These are not optional tuning decisions.

What You MUST Log (Across Major Frameworks)

Log SourcePCI-DSSHIPAAISO 27001NIST CSF
Authentication events (success + failure)✓ 10.2.4✓ §164.312(d)✓ A.8.15✓ PR.AC
Privileged account activity✓ 10.2.2✓ §164.312(a)✓ A.8.15✓ PR.AC
File integrity changes on critical systems✓ 11.5✓ §164.312(c)✓ A.8.9✓ PR.DS
Network intrusion detection✓ 11.4✓ A.8.16✓ DE.CM
User account changes (create, modify, delete)✓ 10.2.5✓ §164.312(a)✓ A.8.15✓ PR.AC
Data access to sensitive systems✓ 10.2.1✓ §164.312(b)✓ A.8.15✓ PR.DS
System clock synchronization✓ 10.4✓ A.8.17
Firewall/IDS rule changes✓ 10.2.2✓ A.8.9✓ PR.IP

How Compliance Affects SOC Operations Daily

Compliance Impact on SOC — How frameworks shape detection, retention, and response

Detection SLAs: Many frameworks require detection within a specific timeframe. If your SIEM has a 4-hour parsing delay, you may not meet the "detect within 24 hours" requirement.

Response timelines: PCI-DSS requires daily log review. HIPAA requires breach notification within 60 days. GDPR requires breach notification within 72 hours. Your triage SLAs and escalation procedures must account for these timelines.

Evidence preservation: During a compliance-relevant incident, you must preserve evidence in a forensically sound manner. This means read-only copies of logs, chain of custody documentation, and tamper-evident storage. Deleting logs to "clean up" after an incident is a compliance violation.

Documentation requirements: "We investigated and found nothing" is not sufficient documentation. Compliance requires evidence of what you checked, when you checked it, what you found, and what decision you made. The STAR format from Lesson 1.5 satisfies these requirements when applied consistently.

💡

Practical application: When you write detection rules in Modules 7 and 8 (YARA and Sigma), tag each rule with the compliance requirements it satisfies. For example: tags: [pci-dss-10.2.2, iso27001-a.8.15]. This creates an auditable mapping between your detection capabilities and your compliance obligations, and it makes audit preparation effortless.

Key Takeaways

  • Compliance is not optional knowledge for SOC analysts. Frameworks dictate what you must log, how long you retain data, how fast you respond, and what you document. Understanding compliance makes you more effective and more promotable.
  • Risk = Likelihood × Impact. The four risk responses (mitigate, accept, transfer, avoid) explain why some vulnerabilities get patched immediately and others are accepted. Your job is to ensure accepted risks are documented and monitored.
  • NIST CSF organizes security into five functions: Identify, Protect, Detect, Respond, Recover. SOC analysts primarily operate in Detect and Respond, but understanding all five provides essential context.
  • ISO 27001 is auditable. Your SIEM configuration, incident response records, and triage documentation are all audit evidence. Proper daily documentation eliminates audit preparation stress.
  • PCI-DSS Requirement 10 mandates comprehensive logging. Authentication events, privileged actions, failed access attempts, and account changes must all be logged and reviewed daily. Requirement 11 mandates IDS and FIM.
  • HIPAA requires breach notification within 60 days. Detection speed and investigation thoroughness directly determine whether your organization meets notification deadlines.
  • Policies translate frameworks into procedures. Acceptable use, incident response, data classification, and log management policies shape every decision you make during triage and investigation.
  • Tag detection rules with compliance requirements. When you write Sigma and YARA rules in later modules, mapping rules to framework controls creates an auditable detection inventory.

What's Next

Module 1 is now complete. You have built the foundation: SOC operations, the ATT&CK framework, alert classification, the CyberBlueSOC toolset, soft skills, career paths, and compliance frameworks. In Module 2: SIEM Mastery with Wazuh, you will move from theory to practice. You will learn to navigate the Wazuh dashboard like a veteran analyst, write KQL queries that pinpoint threats in millions of events, understand how Wazuh rules detect attacks in real time, and build custom dashboards that surface the signals you care about. Module 2 is where your SOC muscle memory starts forming. Get ready to triage alerts at speed.

Knowledge Check: Compliance & Governance for SOC Analysts

10 questions · 70% to pass

1

Why do SOC analysts need to understand compliance frameworks like NIST CSF and PCI-DSS?

2

Using the risk equation (Risk = Likelihood × Impact), how would you categorize daily automated SSH scanning against a public-facing web server with no successful logins?

3

A vulnerability is discovered on an isolated test server that is not connected to production networks and stores no sensitive data. The patch requires 8 hours of downtime and engineer time costing $2,000. The organization decides not to patch. Which risk response strategy is this?

4

In the NIST Cybersecurity Framework, which two core functions represent the primary operational domain of SOC analysts?

5

PCI-DSS Requirement 10.6.1 states that security event logs must be reviewed daily. How does this compliance requirement affect SOC operations?

6

Which PCI-DSS requirement mandates the deployment of an Intrusion Detection System (IDS) like Suricata?

7

Under HIPAA, what is the maximum timeframe for notifying affected individuals after discovering a breach of Protected Health Information (PHI)?

8

An analyst discovers that an unauthorized user accessed a database classified as 'Restricted' (containing PII and credentials). According to the data classification response model, what is the appropriate response?

9

During an ISO 27001 audit, an auditor asks to see evidence that the SOC follows documented incident response procedures. Which of the following would satisfy this audit requirement?

10

An analyst is writing a new Sigma detection rule for privilege escalation attempts. Following the compliance-tagging best practice, how should they document its compliance relevance?

0/10 answered