Plaidnox InfoSec
PLX-2025-021 . Confidential
Security EnablementSOC-CMM FrameworkMaturity 2.2 / 5

SOC Maturity Assessment
[REDACTED]

SOC maturity and readiness assessment for [REDACTED] covering detection coverage, mean-time-to-detect, analyst tooling, threat intel integration, and SOC Capability Maturity Model scoring. Engagement ref. ENG-2025-0561.

Report IDPLX-2025-021
Client[REDACTED]
SOC Maturity2.2 / 5.0
AssessedQ1 2025
01 . Overview

SOC Maturity Assessment

Plaidnox assessed the Security Operations Centre capability for [REDACTED] against the SOC Capability Maturity Model. The current organisation operates a part-time internal SOC (2 analysts, business hours only) with no dedicated SIEM platform, relying on manual review of Windows Event Logs and firewall syslog. Overall maturity score is 2.2 out of 5, placing the SOC in the Developing tier.

Critical gaps include no 24/7 coverage for an organisation processing 2.4M payment card transactions per month, no threat intelligence feed, a 6.2-hour mean-time-to-detect, and no documented incident response playbooks for ransomware or POS compromise scenarios.


02 . Maturity Scores

SOC-CMM domain scores

2.2
Overall Maturity
6.2hr
Avg MTTD
0
Active Threat Intel
0%
24/7 SOC Coverage
SOC-CMM DomainScoreTargetKey Gap
Process2.1 / 53.5No formal playbooks, triage is ad-hoc
Technology1.8 / 53.5No SIEM . manual log review only
People2.4 / 53.52 analysts, business hours, 1 FTE gap
Business Functions2.6 / 53.5No SLA for detection or escalation
Threat Intel1.6 / 53.5No feeds . reactive detection only

03 . Coverage Gaps

Key capability gaps

IDGapPriority
SOC-G01No SIEM . 0% correlation capability, cannot detect multi-stage attacks across log sourcesCritical
SOC-G02No out-of-hours coverage . 18hrs/day and weekends completely unmonitoredCritical
SOC-G03No POS/payment system monitoring . cards processed but no SOC visibility into POS environmentCritical
SOC-G04No threat intelligence . IOC feeds, adversary TTPs unavailable to analystsHigh
SOC-G05No incident response playbooks . ransomware, POS compromise response undocumentedHigh

04 . Enablement Roadmap

SOC maturity improvement plan

ActionTimelineExpected Outcome
Deploy Microsoft Sentinel SIEM . ingest all log sources within 8 weeksWk 1-8Correlation + automatic alerting
Engage managed SOC provider for 24/7 after-hours coverage (Tier 1 triage)Wk 2-6Full coverage within 6 weeks
Integrate POS syslog and Windows Event Logs from 412 store endpointsWk 4-10POS compromise detection
Subscribe to MISP threat intel feed . integrate with Sentinel TI connectorWk 3-6Proactive IOC blocking /detection
Develop 12 IR playbooks (ransomware, POS skimming, phishing, insider threat)Wk 6-10Repeatable, measurable response

Conclusion
No SIEM and no after-hours coverage are the two defining risks
An organisation processing 2.4M card transactions per month with zero after-hours SOC coverage and no SIEM is operating below minimum cyber hygiene thresholds for PCI DSS SAQ D compliance. Sentinel deployment and managed SOC are the two investments that deliver the most immediate reduction in breach risk. Post-SIEM deployment, the SOC maturity score is projected to reach 3.4/5 within 6 months.
Plaidnox InfoSec . soc
Confidential . Authorised Distribution Only