What Is the SOC Visibility Triad?
Learn how a combination of EDR, NDR, and SIEM/UEBA provides a comprehensive view of an ever-changing threat landscape.
The security operations center (SOC) serves as the nerve center of the enterprise’s presence in the digital world. With a dedicated cadre of security experts, proven technology, robust processes and specific metrics, the SOC monitors the organization’s digital infrastructure and responds to indications of malicious activity from any threat vector.
Given today’s infinite threat landscape, SOCs must rise to that challenge to oppose attackers using novel tactics. In some cases, by deploying stealthy methods such as hiding in normal or encrypted traffic (such as Solarwinds or Log4j), attackers’ presence may go unnoticed for weeks, or even months. Moreover, stealthy attackers will often persist with a low-level foothold within the digital infrastructure for weeks or months before escalating and prosecuting their objectives. In this environment, SOCs must keep pace in an asymmetric resource environment where the attackers have the advantage of time, money, automation, and personnel.
In 2015, Anton Chuvakin developed the concept of "SOC nuclear triad.” Repurposed from Cold War-era strategic defense models, it described key elements required to support and empower an organization’s cyber defense capabilities. These core capabilities enable defenders to detect and respond to malicious activity before an attacker can achieve their operational objectives.
Since then, the concept has evolved and is now commonly referenced as the “SOC Visibility Triad.”
The SOC Visibility Triad defines the three key areas an enterprise must implement to project a complete picture of its security posture and operational state:
It focuses on the analysis of the detailed telemetry collected from across an organization’s endpoints and network infrastructure.

This free ESG white paper explains the reasons to consider an open-source solution.

The Triad’s design provides security teams with three resources that are essential to advanced, proactive threat hunting:
Provided with these benefits, SOCs can curate and leverage a collection of capabilities to gain deep visibility into their infrastructure, with and provide real-time responsiveness, measured in minutes rather than days. As such, the SOC utilizing the Triad framework gains a more holistic view of the enterprise’s overall security posture. Threat detection and incident response times improve, making the team more efficient and provide analysis that aids forensics and suggest improvements in the security apparatus of the digital enterprise to bolster defenses.
The Triad represents a proven framework to avoid the serious problems of monitoring overload, alert fatigue, and lack of visibility that are common in SOCs that have not been able to reconcile their toolset, especially those that are understaffed, or lacking sufficient threat hunting expertise.
Enhanced visibility is especially important in an era when zero-trust is becoming a guiding principle for many organizations. The SOC Visibility Triad’s construction is meant to address the limitations of different tool sets, and to eliminate blind spots at the edges of each tool’s monitoring capacity. At a time when organizations are increasingly reliant on remote or hybrid workers, cloud workloads, and third-party access, the SOC needs a framework with breadth and depth.
Security experts consider NDR to be the ultimate source of “ground truth.” While EDR provides the fundamental first line of defense to protect endpoints, and their users, gaps remain in coverage and depth.
Since wire (network layer) data cannot be altered, (i.e., what is communicated on the network is what transpired), NDR provides detailed evidence of past activity that aids forensic analysis as well as threat hunting. Integrated with the SIEM, it provides the analyst with the most comprehensive record of activity and picture of the enterprise’s attack surface. When aligned with a modern EDR and SIEM solution, NDR completes the Triad with the necessary monitoring capabilities to remove gaps in depth and breadth of coverage.
NDR uses passive techniques to generate a real-time view of all entities operating in the digital infrastructure (e.g., users, apps, and IoT devices unmonitored by EDR, email, and cloud controls), and provides essential metadata to the SIEM. It enhances and optimizes real-time detection capabilities by working off anomaly-based analysis. NDR also assists the SOC to detect attacks organized by MITRE ATT&CK TTPs , and provides essential context that can help defenders understand false positive alerts and adjust monitoring parameters.
With the wide adoption of the cloud. Software as a Service, and microservices architectures, most would argue that while the traditional SOC Visibility Triad has stood the test of time, these new architectures suggest the need for at least one additional pillar. Corelight hosted a discussion on this topic with Anton Chuvakin, now with the Office of the CISO at Google, and Jean Schaffer, Corelight’s Federal CTO.
In the extreme case where an organization is using nothing but thin clients and software as a service (SaaS) applications, the Triad evolves to the detailed network telemetry and the various logs captured by the cloud service provider. This overly simplified model, however, is extremely rare, and the more common scenario will continue to be a hybrid or multi-cloud environment. For this, the latest industry thinking points to the Triad expanding from the essential endpoint and network telemetry—including multi-cloud—to application-level and identity data. Join the discussion here.
The SOC Visibility Triad depends on the best metadata to achieve the level of visibility SecOps teams need to detect and respond to attacks. By covering endpoints, logs, and network traffic, threat hunters can comprehensively monitor the enterprise, including cloud, edge, endpoints, ICS/OT, and the critical data found in network packets. The SOC Triad also should provide a level of automation that positively impacts mean time to detection and response.
To pick up on new attack patterns and uncover advanced persistent threats (APT), security teams need the most up-to-date metadata. For this reason, NDR that harnesses high-fidelity transaction logs and community-driven detections provides a cutting-edge advantage.
Corelight’s NDR solution benefits from the widely used Zeek® , an open-source security monitoring platform. Zeek provides the metadata and files that provide the basis for evidence that drives advanced analysis and threat hunting.
The Open Corelight NDR Platform provides a commanding view of all devices that log onto the network, and provides details such as SSH inferences, DNS query/response pairs, file hashes, TLS connection details, and HTTP content. This creates a visibility pillar that provides strong support to EDR and SIEMs—and helps the SOC combat the most persistent and stealthy enterprise attacks. Learn more about Corelight Open NDR.
We’re proud to protect some of the most sensitive, mission-critical enterprises and government agencies in the world. Learn how Corelight’s Open NDR Platform can help your organization tackle cybersecurity risk.