This curriculum spans the design and operation of identity theft detection and response in a security operations center, comparable to a multi-workshop program for building and refining SOC capabilities around identity-centric threats.
Module 1: Understanding Identity Theft in the SOC Context
- Selecting which identity-related data sources (e.g., Active Directory logs, SSO events, MFA attempts) to ingest based on detection coverage and log retention policies.
- Defining thresholds for anomalous authentication patterns, such as logins from unusual geographies or after hours, without generating excessive false positives.
- Integrating identity theft indicators from threat intelligence feeds into SIEM correlation rules while filtering out irrelevant or outdated IOCs.
- Mapping identity theft attack stages to MITRE ATT&CK techniques (e.g., T1078 Valid Accounts, T1110 Brute Force) for consistent detection logic.
- Establishing criteria for escalating suspicious identity activity from monitoring queues to formal incident response procedures.
- Documenting the difference between credential misuse and full identity takeover in incident classification protocols.
Module 2: Identity Data Collection and Log Management
- Configuring log forwarding from identity providers (e.g., Okta, Azure AD) to SIEM with appropriate field parsing and normalization.
- Deciding which authentication events to prioritize for real-time ingestion versus batch processing based on risk and volume.
- Implementing secure transport (TLS) and access controls for identity logs moving between cloud services and on-premises systems.
- Handling schema drift when identity platforms update their logging formats, requiring parser rule adjustments.
- Allocating storage for identity logs based on compliance requirements (e.g., 90-day minimum) and forensic readiness needs.
- Validating log completeness by comparing expected event counts from identity systems against received events in the SIEM.
Module 4: Detection Engineering for Identity-Based Threats
- Developing correlation rules to detect pass-the-hash or overpass-the-hash attacks using Windows Security Event IDs 4624 and 4672.
- Creating behavioral baselines for user privilege usage to flag abnormal access to sensitive roles or entitlements.
- Implementing detection logic for impossible travel scenarios using geolocation data from login events.
- Tuning detection thresholds for concurrent session anomalies to reduce noise from legitimate shared accounts or service logins.
- Building alerts for repeated failed MFA prompts followed by a successful login, indicating potential MFA fatigue attacks.
- Integrating UEBA outputs with SOAR playbooks to automate validation steps for high-risk identity anomalies.
Module 5: Incident Triage and Forensic Investigation
- Extracting Kerberos ticket-granting ticket (TGT) request details from domain controller logs during suspected Golden Ticket attacks.
- Correlating user sign-in logs across cloud and on-premises systems to determine the scope of account compromise.
- Using PowerShell module logging (Event ID 4103) to trace post-exploitation activity performed under a stolen identity.
- Preserving identity-related artifacts such as browser cookies, session tokens, and device fingerprints for chain-of-custody purposes.
- Interviewing helpdesk logs to verify whether password reset requests during an incident were legitimately initiated by the user.
- Documenting lateral movement paths enabled by compromised service accounts in incident timelines.
Module 6: Response Orchestration and Containment
- Automating account disablement in Active Directory and cloud directories via SOAR when high-confidence identity theft is detected.
- Revoking active OAuth tokens and browser sessions through API integrations with identity providers during containment.
- Coordinating with HR and physical security teams when identity theft involves access badge cloning or impersonation.
- Implementing temporary access restrictions for peer group members when a shared privileged account is compromised.
- Generating audit reports of all actions taken during identity incident response for legal and compliance review.
- Testing failover procedures for critical services dependent on compromised managed service accounts.
Module 7: Identity Governance and Post-Incident Review
- Conducting access certification reviews to identify and remove excessive privileges that contributed to identity exposure.
- Updating role-based access control (RBAC) policies based on lessons learned from identity misuse incidents.
- Requiring step-up authentication for users accessing high-value assets after a detected compromise.
- Implementing just-in-time (JIT) privilege elevation to reduce standing access for privileged identities.
- Revising incident response playbooks to reflect new identity attack patterns observed during recent events.
- Measuring mean time to detect (MTTD) and mean time to respond (MTTR) for identity theft incidents to assess SOC performance.
Module 8: Cross-Functional Coordination and Compliance Alignment
- Aligning identity theft detection thresholds with regulatory requirements such as GDPR or HIPAA breach notification timelines.
- Coordinating with legal teams to determine notification obligations when employee or customer identities are compromised.
- Integrating identity risk data into enterprise risk registers for executive reporting and audit purposes.
- Collaborating with HR to enforce separation of duties in identity provisioning workflows for critical systems.
- Providing forensic evidence packages to external auditors during compliance reviews involving identity incidents.
- Establishing SLAs with IT operations teams for restoring user access after false positive identity theft alerts.