NetNam news

60-Minute Response Process: Inside NetGuardX's 24/7 SOC

Tablets display data graphs in a modern server room.

Discover the NIST CSF 2.0 standard incident response process at NetGuardX SOC. A 60-minute workflow and 24/7 proactive monitoring help optimize MTTR and protect enterprise data absolutely. 

In the modern cybersecurity landscape, attacks are becoming increasingly sophisticated and occur at breakneck speeds. Therefore, response time determines the difference between a minor incident and a comprehensive security disaster. For enterprises, the ability to detect and prevent threats relies not only on technology but also heavily on response speed.  At NetGuardX’s 24/7 Security Operations Center (SOC), we standardize the incident response process strictly with a key objective: "Initial response under 60 minutes",  from the moment of detection to full situational control.

Alerts Are Emergency Signals: The Race Against Time in the 24/7 SOC

TIn the digital era, security acts as more than just defense; it has become a competitive weapon determining an enterprise's survival. 

The Importance of Mean Time to Respond (MTTR) 

For the NetGuardX SOC system, each triggered alert is not merely a technical notification but a signal of potential risk to the client's digital assets. Processing speed at this moment determines success or failure in data protection. 

Defining MTTR and the Significance of Low MTTR in Cybersecurity 

Mean Time To Respond (MTTR) is the most critical metric in cybersecurity. Research shows that low MTTR directly correlates with significantly reduced damage. Every minute an attack persists can mean thousands of stolen records, encrypted critical systems, or leaked sensitive data. 

MTTR starts from the moment the system detects a threat until the SOC team begins implementing response measures. 

  • Reduced attack window: Hackers have less time to spread within the system.
  • Better data protection: Prevents leakage of sensitive information.
  • Reduced recovery costs: Resolves incidents before they cause major damage.
  • Maintained business operations: Minimizes downtime. 

At NetGuardX, we understand that MTTR is not just a number; it is a commitment to protecting the client's digital assets. 

The Difference Between Passive Defense and Proactive Monitoring (NetGuardX) 

Unlike traditional models that only react after consequences occur, NetNam applies a Proactive Monitoring model. Our engineering team does not wait for incidents but continuously hunts for abnormal signs, enabling threat detection from the initiation stage. 

Traditional Passive Monitoring Model 

NetGuardX Proactive Monitoring Model 

  • Automatic alerts are not thoroughly analyzed
  • Reaction occurs after damage is done
  • Lacks continuous 24/7 tracking
  • Relies on users to report incidents 

  • Continuous monitoring by cybersecurity experts
  • Real-time behavior analysis and anomaly detection
  • Proactive Threat Hunting
  • Automation combined with cybersecurity experts 

 

NetGuardX’s Initial Response Goal: < 60 Minutes 

NetNam establishes an initial response standard of under 60 minutes as a Service Level Agreement (SLA) commitment. This goal ensures we receive, analyze, and contain every incident within the "golden time," preventing the risk of escalation into a disaster. 

NetGuardX’s commitment remains clear and consistent: we assess, classify, and begin responding to every critical alert within 60 minutes. 

  • Minutes 0-15: Detection and verification of the threat.
  • Minutes 15-30: Analysis of impact and scope.
  • Minutes 30-45: Implementation of initial containment measures.
  • Minutes 45-60: Isolation and commencement of remediation. 

The First 60 Minutes: Standardized 6-Step NIST Response Process

The NetGuardX incident response process complies with the NIST framework, the global gold standard in cybersecurity incident handling. The first 60 minutes represent the most critical phase to activate the NIST process and execute urgent actions to contain, limit damage, preserve evidence, and prepare for in-depth investigation steps. 

We implement all steps in NIST (Govern → Identify → Protect → Detect → Respond → Recover), but the first 60 minutes focus only on the most urgent parts of each step. This includes establishing roles (Govern), determining initial impact scope (Identify), applying emergency controls (Protect), advanced detection (Detect), and activating the response process (Respond). The remaining in-depth parts continue in the following hours and days.

GOVERN (GV) - Governance, Policy, Strategy, and Risk Monitoring 

The Govern function of NIST CSF 2.0 requires organizations to establish cybersecurity strategies, policies, roles, responsibilities, and execution monitoring. NetGuardX applies this fully through risk governance mechanisms, Authorization to Operate (ATO), and continuous monitoring processes. 

Governance Framework & Responsibilities

NetGuardX clearly establishes roles between the enterprise and NetNam SOC: 

  • System Owner
  • IT/Admin
  • SOC L1 Monitoring
  • SOC L2 Analyst
  • SOC L3 Threat Hunter
  • Incident Commander (Activated during major incidents) 

We assign all incident response activities according to the RACI matrix to ensure no overlap or omission occurs during processing. 

Authorization to Operate (ATO)

Security Controls Review

Before bringing the system back into operation after an incident, NetGuardX performs: 

  • Validation: Quick pen-tests and sanity checks to ensure vulnerabilities are no longer exploitable.
  • Compensating Controls Assessment: When vulnerabilities cannot be patched immediately, we apply Firewall hardening, geo-blocking, and enhanced SIEM rules. 

Residual Risk Assessment

  • Quantify remaining risks after eradication.
  • Compare against the enterprise's Risk Appetite.
  • Evaluate the Worst-case Scenario if operations resume immediately. 

ATO Decision 

The authorized person chooses: 

  • Full ATO: System is safe, normal operation.
  • ATO-C (Conditional): Limited opening, 72-hour monitoring.
  • DTO: Deny operation if risks are too high. 

Continuous Monitoring

To ensure a long-term safe environment and maintain the effectiveness of control measures, NetGuardX applies a continuous monitoring mechanism according to NIST standards. The goal involves detecting newly arising risks early, tracking system changes, and timely adjusting security strategies. 

  • Maintain the effectiveness of control measures.
  • Periodic security assessments.
  • Vulnerability scanning & configuration checks.
  • Log and behavior analysis.
  • Rapid response to violation signs.
  • Continuous RMF cycle iteration (adjusting when new risks arise). 

 IDENTIFY (ID) - Identifying Assets, Systems, and Risks

Identification & Classification of Systems, Assets, and Data

As a first step, NetGuardX experts determine the impact scope, focusing on the enterprise's critical information assets and sensitive data for priority protection. 

Identification steps: 

  • Asset Mapping: Identify all critical systems, applications, and data.
  • Risk Assessment: Rank the importance of each asset.
  • Data Classification: Identify sensitive information requiring priority protection.
  • Dependency Mapping: Understand relationships between systems. 

This allows the NetGuardX team to respond faster when incidents occur because we know exactly which assets need protection first.   

Critical Asset Tiering

In this phase, we define: 

  • Tier 1 Critical Assets: Production systems, customer databases, revenue applications.
  • Tier 2 Critical Assets: Support systems, internal data, management tools.
  • Tier 3 Critical Assets: Development systems, testing environments. 

Each tier has a different response process and processing time. 

Severity Classification

NetGuardX uses a 4-level classification system based on severity and business impact to coordinate processing resources appropriately. 

Critical  

High 

Medium

Low 

  • Impact on production systems and core business operations
  • Customer data leakage
  • Spreading Ransomware Attack
  • Response time: < 15 minutes
  • Successfully penetrated into the internal system
  • Detected malware on multiple devices
  • Response time: < 30 minutes
  • Suspicious activity requiring investigation   
  • Security policy violation   
  • Response time: < 60 minutes 
  • Technical warning with no immediate impact   
  • Response time: < 4 hours

 

PROTECT (PR) - Protection, Access Control, and Risk Mitigation

Selecting Risk-Based Security Controls

Based on the incident's severity, NetGuardX activates appropriate protection measures following Risk-based Protection and Defense-in-Depth principles to minimize impact and prevent spread. 

IAM Controls

  • Lock/Suspend suspicious accounts
  • Revoke session tokens; enforce MFA 
  • Restrict access or temporarily reduce privileges

Enhanced SIEM Rules

  • Enable incident-specific rules
  • Increase alert sensitivity; incorporate IOCs
  • Activate advanced correlation for attack chain detection

Activate EDR Policy 

  • Elevate endpoint protection level
  • Block suspicious processes; isolate endpoints if necessary
  • Perform full system scan for malware indicators

Block Malicious IPs/Domains

  • Block IPs, Domains, or C2 servers based on IOCs
  • Update blocklists on Firewalls, Proxies, and EDR systems
  • Automate execution via SOAR (if configured)

Patch Management

  • Patch incident-related vulnerabilities
  • Apply compensating controls if patches are unavailable
  • Verify system integrity to prevent reinfection

Applying Zero Trust

Zero Trust serves as the foundation of the NetGuardX security strategy with the core principle: "Never trust, always verify." When detecting an alert, the NetGuardX expert team immediately isolates the suspicious area, preventing the attacker's lateral movement within the network.   

In incident response, Zero Trust helps: :  

  • Micro-segmentation: Subdivide the network to limit lateral movement.
  • Continuous Authentication: Check every connection, even from within.
  • Least Privilege: Grant only necessary permissions.
  • Rapid Isolation: Disconnect affected segments in seconds. 

Protection Measures by Attack Type

Depending on the attack type (Ransomware, Malware, DDoS, etc.), NetGuardX activates corresponding Containment Strategies to isolate the threat most effectively. 

Ransomware 

  • Immediately isolate infected devices from the network
  • Stop cloud synchronization
  • Protect backups

Phishing thành công 

  • Disable compromised accounts
  • Revoke session tokens
  • Review recent activity

Malware 

  • Disconnect device internet
  • Block C&C domains
  • Scan the entire system.   

Insider Threat 

  • Suspend access rights
  • Monitor detailed activity
  • Preserve digital evidence.

DETECT (DE) - Detecting Attacks, IOCs, Anomalies

The Detect phase allows NetGuardX to discover intrusion signs, abnormal behaviors, and Indicators of Compromise (IOC) early. NetGuardX uses a combination of SIEM, UEBA, Threat Intelligence, and AI to ensure timely, accurate detection with full context for investigation. 

24/7 SIEM Monitoring

NetGuardX operates a SIEM system monitoring continuously 24/7, collecting and analyzing logs from the entire infrastructure. The goal involves identifying attack signs before they cause damage to the enterprise. 

IOC Detection

  • Match malicious IPs/Domains/Hashes from Threat Intelligence.
  • Detect abnormal connections, suspicious C2 traffic. 
  • Alert on behaviors resembling known malware patterns.

Detection Rules based on MITRE ATT&CK

  • Map behaviors to common attack techniques (phishing, lateral movement, privilege escalation).
  • Correlation rules help detect behavioral chains related to a complete attack.

User and Entity Behavior Analytics (UEBA)

  • Abnormal logins by time/location
  • Spikes in resource access
  • Behaviors exceeding user/server baselines

Comprehensive Log Analysis

  • Network: firewall, VPN, proxy, IDS/IPS
  • Endpoint: processes, file changes, registry
  • Application: AAPI logs, DB queries, data access

Detection by Attack Type

The goal is to detect attacks by their true nature, not just relying on signatures, helping the SOC respond faster and more accurately. NetGuardX possesses in-depth rules for each common attack type: 

Spreading Ransomware

  • Detect mass encryption behaviors
  • Creation of strange file extensions
  • CPU/IO spikes from suspicious processes
  • Signs of C2 access serving ransomware.

Abnormal Login

  • Unauthorized logins after hours
  • Logins from abnormal IPs/geographies
  • Brute-force and password spraying
  • Account abuse following phishing.

Multi-device Malware

  • Multiple endpoints alerted simultaneously
  • Signs of lateral movement via SMB/WinRM
  • Abnormal traffic to C2 servers
  • Malicious hashes appearing on multiple machines.

Spam / Successful Phishing

  • Users clicking on malicious links
  • Downloading files containing payloads
  • Mailboxes creating strange forwarding rules
  • Accounts used to send internal spam

 Insider Threat

  • Large data downloads violating procedures
  • Accessing systems outside of duties
  • Deleting/modifying logs to hide behavior
  • Privilege escalation

RESPOND (RS) - Response, Containment, Eradication

NetGuardX 6-Step Response Process

NetGuardX standardizes the incident response process according to NIST, ensuring speed, accuracy, and recovery capabilities. We execute each step following a professional SOC flow (L1 → L2 → L3): 

Step 

Name 

Brief Description 

1 

Alert Ingestion 

SIEM/EDR/Firewall sends alerts to the 24/7 SOC. L1 receives, validates, and determines priority (severity). 

2 

Triage 

L1 quickly assesses severity, determines impact scope, eliminates noise alerts, and escalates real incidents to L2. 

3 

Investigation 

L2 analyzes logs, IOCs, and abnormal behaviors; reconstructs the timeline; identifies entry points; evaluates the potential spread of the incident. 

4 

Threat Hunting 

L3 proactively reviews the entire system to find other signs of compromise or undetected threats. 

5 

Containment & Eradication 

Activate SOAR or manually process to isolate devices, block malicious IPs/Domains, remove malware, patch vulnerabilities, and thoroughly address root causes. 

6 

Lessons Learned 

SOC analyzes Root Causes, evaluates response effectiveness (MTTD/MTTR), updates playbooks/rules, and proposes preventive measures to avoid recurrence. 

 

Technical Deployment Phase

All deployment actions adhere to the following principles: 

  • Configuration & Integration: Ensure new control measures integrate correctly into existing systems (EDR, Firewall, SIEM) so they "talk" to each other. 
  • Testing & Validation: We immediately check every new rule and configuration to confirm effectiveness (e.g., a blocked malicious IP truly cannot be accessed). 
  • Documentation & Maintenance: Detailed recording of configuration changes and building monitoring processes for those controls. 

NetGuardX applies these principles in three main action phases: 

Phase 

Configuration / Integration 

Testing / Validation 

Documentation / Monitoring 

1. Containment 

SOAR automates adding blocking rules for IP/Domain on Firewall and EDR. Temporarily isolate affected endpoints and stop malicious processes. 

Attempt to ping or access the malicious IP/Domain from the internal network to confirm successful blocking. 

Immediately update blocking rules to the central repository to serve similar future incidents. 

2. Eradication 

Configure the Patching System and deploy specialized Malware removal tools. 

Perform Lateral Movement Checks: Simulate attacker behavior to ensure they can no longer spread in the network. Confirm Root Cause has been patched. 

Record the list of deleted malicious files and patched vulnerabilities to prepare for the Post-Incident Analysis phase. 

3. Recovery 

Reconfigure network and security settings changed during Containment. Set more sensitive alert thresholds on SIEM and EDR. 

Verify the integrity of data restored from Immutable Backup. Check the functionality of restored business services. 

Activate Enhanced Monitoring mode for 24-72 hours after the incident. NetNam assigns Analysts for centralized monitoring to ensure infrastructure operates normally without remaining risks. 

 

Assessing Security Controls

We synthesize the results of this appraisal phase into a detailed technical report, including: 

  • Validation Evidence: Proof via images/logs that Eradication actions were successful. 
  • List of Gaps/Weaknesses: List remaining weaknesses or vulnerabilities (Residual Risk), such as vulnerabilities needing patches where no manufacturer patch exists yet. 

We immediately transfer this data to the final stage: Risk Approval and Decision Making (ATO), where Management makes the final decision on accepting remaining risks and allowing the system to resume operation. 

Supporting Technology: Increasing Speed and Accuracy 

Behind every fast and accurate action of the NetGuardX service lies a powerful technology system designed to accelerate detection, analysis, and response. 

SOC Integrated with AI, SIEM, EDR, and Continuous Monitoring Sensors 

  • AI/ML Integrated SOC: NetGuardX applies artificial intelligence and machine learning to identify threats based on behavior (Behavior-based), not just relying on signatures. This enables detection of Zero-day attacks and sophisticated attack techniques. 
  • SIEM & Sensors: The SIEM system collects logs from the entire infrastructure, performing event correlation analysis to detect threats on a broad scale. Sensors ensure deep and comprehensive data collection. 
  • EDR (Endpoint Detection and Response): Provides deep monitoring and immediate response capabilities at each endpoint, allowing isolation, malware removal, and direct investigation at the source of the incident.

SOAR Automating Alerts and Endpoint Isolation 

  • SOAR (Security Orchestration, Automation, and Response): Acting as the automation "brain," SOAR coordinates security tools and automatically executes repetitive tasks. This minimizes human error and shortens response time to seconds. 
  • Application: Automatically create Tickets, execute Network Isolation commands, and block malicious IP addresses as soon as an alert is confirmed. 

Threat Intelligence and MISP 

  • Threat Intelligence: Provides comprehensive context on attack campaigns and Hacker TTPs (Tactics, Techniques, and Procedures), helping NetNam understand adversaries and prepare proactive defense measures. 
  • MISP (Malware Information Sharing Platform): NetNam shares and receives intelligence in real-time to enhance community defense capabilities and fight against the latest threats

AI Assistant Accelerating Incident Handling 

  • Big Data Analysis Support: AI helps process and analyze massive volumes of log data, accelerating Investigation and finding the Root Cause faster. 
  • Reducing False Positives: AI helps filter and minimize false alerts, allowing the SOC team to focus on truly important threats. 

The Role of Experts – Why AI Cannot Replace Humans

Despite powerful technological support, SOC experts at NetGuardX remain the final deciding factor in making strategic decisions and handling complex situations. 

SOC Experts Remain the Ultimate Decision Makers 

  • Human-in-the-Loop: SOC experts, with combat experience, are responsible for making final decisions on risks and intervention measures. 
  • Assessing Context and Complex Intent: The ability to analyze context, predict next steps, and understand the attacker's complex intent (Intent Analysis) is something current AI cannot achieve. 

L1-L3 Team and Threat Hunters on Duty 24/7 

The NetGuardX SOC team follows a clear hierarchy to ensure flexible and in-depth processing capabilities: 

  • L1 (Analyst): Performs continuous monitoring, screens alerts, and executes initial response actions (Containment). 
  • L2 (Engineer/Investigator): Conducts deep investigation, malware analysis, searches for Root Cause, and optimizes security systems. 
  • L3 (Expert/Threat Hunter): Assumes the role of proactively searching for potential threats (Proactive Hunting) and handling the most complex incidents (e.g., APT attacks). 

Combat Experience 

Practical experience from various situations helps the NetGuardX team accurately determine severity and appropriate processing plans, avoiding mechanical decisions that could disrupt business operations. 

Những con số biết nói: Chỉ số MTTR thực tế của NetGuardX

Metric 

Time 

Detection and Alerting 

< 5 minutes 

Initial Response 

< 60 minutes 

Completion of Handling 

Within 2-4 hours for common incidents 

Total Average MTTR 

5-10 times faster than traditional processes 

 

In the digital era, speed is a competitive advantage. With the NetGuardX 24/7 information security monitoring service (SOC/MSSP), NetNam brings absolute peace of mind to medium and large enterprises. NetNam commits to becoming a "one-stop shop" providing comprehensive Managed Services in Vietnam. 

Do not let time decide your risk. 

  • Do you want to lower your enterprise's MTTR to under 60 minutes? 
  • Are you ready to switch from passive defense to 24/7 proactive security monitoring? 

Contact NetNam today to receive in-depth consultation on the NetGuardX 24/7 information security monitoring service (SOC/MSSP), ensuring infrastructure is protected comprehensively, continuously, and professionally. 

Contact NetNam: 

Submit your request
We respond within one hour!