Understanding Assets & Identities in SOC: A Guide for L1 Analysts


Understanding Assets & Identities in SOC: A Guide for L1 Analysts

Meta Description:
Streamline your SOC alert triage with asset and identity inventory. Learn how to quickly investigate user activity, servers, and corporate resources.


Introduction

Alert triage is a critical task in any Security Operations Center (SOC). Imagine you’re on a night shift and receive an alert:
“G.Baker logged into HQ-FINFS-02 and shared ‘Financial Report US 2024.xlsx’ with R.Lund.”

To investigate effectively, you need answers to key questions:

  • Who is G.Baker? What are their working hours and role?

  • What is HQ-FINFS-02? Who has access?

  • Why would R.Lund need access to financial records?

This is where identity and asset inventory come in.


Identity Inventory

Identity inventory is a catalogue of corporate users, services, and accounts with details like privileges, contact info, and roles. It helps SOC analysts quickly determine if activity is expected.

Example of Identities

Full NameUsernameRoleLocationAccess
Gregory BakerG.BakerChief Financial OfficerUKVPN, HQ, FINANCE
Raymond LundR.LundUS Financial AnalystTexasVPN, FINANCE
Kate DannerK.DannerChief Technology OfficerUKVPN, DA, HQ, AWS

Sources of Identities

  • Active Directory (AD) – On-premises AD or Entra ID

  • SSO Providers – Okta, Google Workspace

  • HR Systems – BambooHR, SAP, HiBob

  • Custom Solutions – CSV or Excel sheets

Identity inventory is essential for understanding user context, making triage faster and more accurate.


Asset Inventory

Asset inventory, or asset lookup, lists all computing resources such as servers and workstations. It provides context about the systems involved in an alert.

Example of Assets

HostnameLocationOSOwnerPurpose
HQ-FINFS-02UK DatacenterWindows Server 2022Central ITFile server for financial data
HQ-ADDC-01UK DatacenterWindows Server 2019Central ITPrimary AD domain controller
PC-891DLondon OfficeWindows 11 ProTech SupportAccountant workstation

Sources of Assets

  • Active Directory – also serves as a solid asset database

  • SIEM / EDR – Elastic, CrowdStrike

  • MDM Solutions – MS Intune, Jamf MDM

  • Custom Solutions – CSV or Excel sheets


Putting It Together

Using identity and asset inventories, you can answer critical SOC questions quickly:

  • Role of R.Lund: USFinancialAnalyst

  • Data on HQ-FINFS-02: Financial records

  • File sharing legitimacy: ✅ Expected

This structured approach ensures accurate alert triage, reduces mistakes, and helps SOC teams operate efficiently.


Conclusion

For L1 SOC analysts, mastering asset and identity inventory is essential. By leveraging existing resources, you can triage alerts faster, make informed decisions, and maintain security across the organization.




Comments

Popular Posts