SOC, SIEM, SOAR — implementation and Managed SOC compliant with NIS2 and DORA | Virtline

SOC, SIEM and SOAR — from raw logs to automated incident response

SIEM, SOAR and UBA were sold for years as separate tools. In practice, every modern SOC (Security Operations Center) combines these three layers in one platform: SIEM collects and correlates logs, UBA detects behavioural anomalies, and SOAR triggers an automated response — from isolating an endpoint to notifying the team and opening a ticket. A client who buys “just SIEM” ends up with raw alerts that nobody analyses. A client who buys “just SOAR” automates nothing, because there is no input data.

Virtline deploys integrated SOC environments for organisations subject to NIS2 (art. 21(2) — monitoring, detection, response), DORA (art. 10 — detection of anomalies in ICT operations) and ISO/IEC 27001:2023 (Annex A.5.24, A.5.25, A.8.16 — logging and monitoring). We work with enterprise-class platforms (Microsoft Sentinel, Wazuh, OpenSearch, Splunk) and MSP-class solutions for smaller clients (RocketCyber, ConnectWise SIEM). We deliver SOC as a managed service or as an on-premises deployment with competency transfer to the client’s team.

Security Information and Event Management platform — centralised log management
WithSecure XDR — security platform component
BlackBerry Cylance Guard — Managed Detection and Response
Microsoft Sentinel — cloud security platform

What the Virtline SOC consists of

Six layers that together provide visibility and automated response — regardless of the scale of your infrastructure.

 SIEM — log collection and correlation from all sources: AD, firewalls, EDR, application servers, cloud. Correlation rules detect event sequences that appear harmless in isolation.

 UBA — user behaviour analysis detects compromised accounts, logins at unusual hours and privilege escalation. Required by DORA art. 10.

 SOAR — automated incident response: endpoint isolation, account lockdown, ITSM ticket creation, team notification, SLA-based escalation.

 Threat Intelligence — integration with CTI feeds (MISP, AlienVault, commercial providers). Alert enrichment with context on known APT groups and campaigns.

 Industry-specific use cases — finance (DORA), healthcare, energy, manufacturing. Ready-made SOAR playbooks for common scenarios (ransomware, business email compromise, data exfiltration).

 Compliance reporting for NIS2, DORA and ISO 27001 auditors — dashboards with detection metrics, mean time to respond (MTTR) and MITRE ATT&CK coverage.


Three SOC deployment models with Virtline

1. SOC as a Service (Managed SOC) — Virtline provides 24/7 monitoring with its own analyst team. The client does not buy a SIEM licence or hire engineers — they receive a ready service with a response-time SLA. Ideal for organisations of 50–500 seats without an in-house cyber team.

2. On-premises SOC with competency transfer — we deploy the platform (Microsoft Sentinel, Wazuh, Splunk) in the client’s infrastructure and train the IT team. After 3–6 months the client maintains the environment independently; we act as 3rd-line support. For mid-market companies that want data kept in-house.

3. Hybrid SOC — the client maintains the platform; we deliver SOC-as-a-Service at the analysis and response layer. Cost-optimal for organisations that already have corporate licences (e.g. E5) and want to leverage tools they have already paid for.


SIEM and SOAR platform integrations

We work with enterprise-class platforms and open-source solutions. Tool selection depends on scale, the client’s licensing model and regulatory requirements. We most often deploy:

  • Enterprise SIEM — Microsoft Sentinel (cloud-native, M365/Azure integration), Splunk Enterprise Security, IBM QRadar (banking and insurance), Elastic Security (Elastic Stack), LogRhythm (organisations with high compliance requirements).
  • Open-source / MSP SIEM — Wazuh (open source, low TCO for 50–500 endpoints), OpenSearch Security, RocketCyber and ConnectWise SIEM (MSP models for the SMB market).
  • SOAR — Palo Alto Cortex XSOAR (broadest playbook and integration library), Splunk SOAR (formerly Phantom, natural complement to Splunk ES), IBM Security QRadar SOAR (formerly Resilient, for QRadar environments).
  • UBA / UEBA — Microsoft Defender for Identity, Exabeam, Securonix (detection of privileged account abuse and lateral movement).
  • Threat Intelligence — MISP (open source), AlienVault OTX, Recorded Future, Mandiant (commercial feeds with APT group attribution).

Regardless of the chosen platform, we follow the same deployment model: scoping → source onboarding → correlation rules → SOAR playbooks → compliance reporting.


SOC mapping to NIS2, DORA and ISO 27001 requirements

The SOC is the central evidence mechanism in an audit — it demonstrates that the organisation actively monitors, detects and responds to incidents. In a typical audit we highlight the following mappings:

  • NIS2 art. 21(2)(b) and (e) — monitoring, detection and incident response. SOC as the organisational and technical implementation of the obligation.
  • NIS2 art. 23 — incident reporting to the national CSIRT within 24 hours (early warning) and 72 hours (incident notification). SOAR automates report preparation.
  • DORA art. 10 — detection of anomalies in ICT operations. UBA and SIEM correlation rules as evidence of compliance.
  • DORA art. 17 — ICT incident management process (classification, escalation, post-incident review). SOAR playbooks and SOC runbooks cover the required lifecycle.
  • DORA art. 18 — incident classification by impact and reporting to the competent supervisory authority (EBA, ESMA, EIOPA). SOC provides classification data.
  • ISO/IEC 27001:2023 Annex A.5.24 — planning and preparation of information security incident management.
  • ISO/IEC 27001:2023 Annex A.5.25 — assessment of and decisions on information security events.
  • ISO/IEC 27001:2023 Annex A.5.26 — response to information security incidents (SOAR playbooks).
  • ISO/IEC 27001:2023 Annex A.5.27 — learning from information security incidents (lessons learned, post-incident review).
  • ISO/IEC 27001:2023 Annex A.5.28 — collection of evidence (forensic-grade logs from SIEM).
  • ISO/IEC 27001:2023 Annex A.5.29 — information security during disruption (SOC continuity even in DR mode).
  • ISO/IEC 27001:2023 Annex A.5.30 — ICT readiness for business continuity.
  • ISO/IEC 27001:2023 Annex A.8.16 — monitoring. SOC as the operational implementation of the control.

For whom we implement SOC

  • Banks, financial institutions, investment firms, insurers (DORA art. 10)
  • Critical infrastructure operators (NIS2 essential entities)
  • ICT service providers serving regulated clients (NIS2 important entities)
  • Manufacturing companies with OT/IT integration requiring monitoring
  • Organisations pursuing ISO 27001:2023 certification that must implement Annex A.5.24–A.5.25
  • SMBs that want a subscription-based SOC service rather than building their own team

Frequently asked questions about SOC, SIEM, SOAR

What is the difference between SIEM and SOAR, and do I need both?

SIEM is a system for collecting, correlating and analysing logs. It generates alerts. SOAR is the layer above it — instead of waiting for an analyst to handle an alert, SOAR runs a playbook (e.g. lock account, isolate endpoint, open ticket). Without SIEM you have no data; without SOAR you have thousands of alerts requiring manual handling. For small environments a SIEM with basic automation is sufficient; above 500 endpoints or in regulated sectors SOAR becomes essential.

Is a managed SOC service sufficient to meet NIS2 requirements?

Yes, provided the service provider documents processes in line with NIS2 art. 21 (monitoring, detection, response, incident reporting within 24 hours to the national CSIRT) and the SLA covers 24/7 availability with defined response times. Virtline as a SOC provider for NIS2 entities supplies full auditor documentation and monthly compliance reports.

How much log data do I need to collect for SIEM to make sense?

Minimum: domain controllers (logon events, GPO changes), firewall (deny/allow), EDR (process events), application servers. For a 100-person company that means approximately 30–60 GB of logs per day. With cloud sources (Azure AD, M365) — up to 200 GB. SIEM licensing models are based on GB/day (Splunk, Sentinel) or endpoint count (Wazuh open source).

How quickly does the Virtline SOC respond to an incident?

Virtline Managed SOC SLA: critical incidents (P1) — first response within 15 minutes, isolation decision within 30 minutes. Standard incidents (P2–P3) — response within one hour. Reporting to the national CSIRT is handled within the 24-hour window required by NIS2. All MTTR metrics are reported monthly.

Can I start small and scale up?

Yes. The standard deployment model: phase 1 — onboarding critical sources (AD, EDR, firewall) and a baseline rule set; phase 2 — extending to business applications and cloud; phase 3 — adding UBA, threat intelligence and SOAR playbooks. We can begin with a 4–6 week pilot on selected systems.

Does the SOC work with our existing EDR and firewall?

Yes. SIEM/SOAR are source-agnostic — we integrate with all major solutions: Microsoft Defender, CrowdStrike, SentinelOne, WithSecure, ESET, Sophos (EDR); FortiGate, Palo Alto, Check Point, WatchGuard, MikroTik (firewalls); AD, Azure AD, Okta (identity). For less common tools we confirm integration during the scoping phase.


Contact us to discuss SOC, SIEM or SOAR implementation for your organisation.

Build visibility and automated incident response — in a model that fits the scale of your business.


 ISO/IEC 27001:2023 Certification

Virtline certified by TÜV NORD

Virtline holds the PN-EN ISO/IEC 27001:2023-08 certificate issued by TÜV NORD. Certificate number: AC090 121/2469/6137/2026, valid until 02.2029.

Talk to a Virtline expert

We will scope your project, propose an architecture and prepare a fixed quote within 5 working days. No obligations, no junior reps — you talk to engineers from day one.