SOC Maturity Model: Assessing Where Your Security Operations Center Stands and Building the Roadmap to the Next Level
Most SOC maturity assessments produce one of two useless outcomes: a consultant tells you that you are a Level 2 SOC and should aspire to Level 4, or an executive receives a maturity score that has no connection to the specific changes needed to improve it. This guide is built around the practitioner question that actually matters: what specific capabilities are we missing, and what is the highest-impact investment we can make right now to improve our detection and response effectiveness? The five-level model used here maps to observable, measurable characteristics across people, process, and technology -- not aspirational statements about intelligence programs.
The Five-Level SOC Maturity Model
SOC maturity models vary by framework (Gartner, CISA C2M2, SANS), but the underlying progression is consistent. The five-level model below maps the characteristics most relevant to practical assessment.
| Level | Label | Core Characteristic | MTTD Typical Range |
|---|---|---|---|
| Level 1 | Reactive | Ad-hoc, tool-driven alerts, no documented process | Days to weeks |
| Level 2 | Basic Monitoring | SIEM deployed, documented runbooks, defined escalation paths | Hours to days |
| Level 3 | Defined | Threat hunting, SOAR automation, defined detection coverage | 1-4 hours |
| Level 4 | Intelligence-Led | CTI integration, custom detection rules, continuous improvement loop | Minutes to 1 hour |
| Level 5 | Adaptive | Predictive, automated remediation, continuous red team validation | Near real-time |
Most commercial organizations with a functioning SOC operate between Level 2 and Level 3. The transition from Level 2 to Level 3 is where the largest measurable improvements in detection and response time occur and where most investment should be focused. Level 5 is aspirational for all but the largest and most security-mature organizations.
The three assessment dimensions: Each level should be assessed across three dimensions independently, as organizations are often asymmetric -- mature in technology but immature in process, or vice versa.
- People: Analyst headcount, skill levels, shift coverage, career development, retention
- Process: Documented runbooks, escalation paths, SLAs, post-incident reviews, detection engineering workflow
- Technology: SIEM, SOAR, EDR, NDR, threat intelligence feeds, case management, log coverage
Level 1 to Level 2: From Reactive to Basic Monitoring
Level 1 characteristics (what you see in Level 1 organizations):
- Security events are investigated reactively, after a user reports a problem or a tool generates an alert
- No centralized log aggregation -- analysts must log in to individual systems to investigate
- Alert handling is undocumented; different analysts follow different processes for the same alert type
- There is no defined escalation path for high-severity incidents
- Mean time to detect is measured in days or weeks because active monitoring is absent
- Institutional knowledge lives in specific individuals, not documented processes
The highest-impact investments to reach Level 2:
The foundational Level 2 capability is centralized log collection and correlation in a SIEM. This single investment closes the largest MTTD gap: moving from investigating alerts in isolation on individual systems to correlating events across the environment. The SIEM platform choice matters less than getting the right log sources in. Priority log sources in order of detection value:
- Windows Security Event Logs (4624, 4625, 4648, 4768, 4769, 4776, 4720, 4728, 4732)
- Endpoint Detection and Response (EDR) telemetry
- Firewall and network perimeter logs
- DNS query logs
- Cloud platform logs (CloudTrail, Entra ID Sign-In Logs, GCP Audit Logs)
- Email gateway logs
Document 10-15 runbooks for the most common alert types before moving on. An analyst who handles a phishing alert 20 times a week using an undocumented process introduces inconsistency and errors that a runbook eliminates.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.
Level 2 to Level 3: Adding Proactive Detection and Automation
Level 2 characteristics (the starting point for this transition):
- SIEM deployed with core log sources ingested
- Analysts respond to SIEM alerts using documented runbooks
- Escalation paths defined for Priority 1 incidents
- Basic metrics collected: alert volume, MTTR, escalation rate
- No proactive threat hunting -- analysts only respond to tool-generated alerts
- SOAR is either absent or minimally used
- Detection rules are SIEM vendor defaults, not tuned to the environment
The capability gaps that define the Level 2 to Level 3 transition:
Detection engineering: At Level 2, the detection library is the vendor default rule set. The transition to Level 3 requires building a detection engineering practice: analysts (or a dedicated detection engineer) write custom detection rules in response to threat intelligence, incident findings, and TTPs relevant to the organization's threat profile. Sigma rules provide a platform-agnostic detection format that can be maintained in version control and converted to platform-specific query languages.
SOAR for tier-1 automation: The highest-value SOAR automation at Level 3 is not sophisticated -- it is automating the mechanical steps tier-1 analysts perform on every alert: enriching an IP address with VirusTotal and Shodan, looking up a hash in MalwareBazaar, checking whether a user has had previous incidents, and creating a case ticket. These 5-10 minute manual steps per alert, automated, free analyst capacity for investigation rather than enrichment.
Threat hunting: Level 3 SOCs run structured threat hunts: hypothesis-driven searches for attacker TTPs that have not generated alerts. Start with hypotheses derived from MITRE ATT&CK -- pick the top-5 techniques used by threat actors relevant to your industry and build hunts to test whether evidence of those techniques exists in your log data. A hunt that finds nothing is still valuable: it confirms you have visibility into that technique.
Level 3 to Level 4: Intelligence-Led Detection and Continuous Improvement
The defining characteristic of Level 4: The SOC produces and consumes threat intelligence, uses it to drive detection rule development, and continuously measures detection coverage against the MITRE ATT&CK framework.
Cyber threat intelligence integration: At Level 3, threat intel consumption is passive -- analysts read reports and occasionally add IOC feeds to the SIEM. At Level 4, CTI is integrated into the detection engineering workflow. Intelligence analysts (or analysts wearing both hats) translate finished intelligence reports into detection rule requirements: "APT41 is using this specific Cobalt Strike configuration; we need a detection rule for this beacon pattern." The TIP (Threat Intelligence Platform) feeds IOCs directly into SIEM watchlists and SOAR enrichment playbooks.
ATT&CK coverage measurement: Use the MITRE ATT&CK Navigator to map your current detection rules against ATT&CK techniques. This visualization immediately reveals coverage gaps -- techniques for which you have no detection -- and guides prioritization of new rule development. A Level 4 SOC reviews this coverage map monthly and sets quarterly targets for coverage improvement.
Metrics that signal Level 4 maturity:
- Detection rule coverage rate by ATT&CK tactic (measure and improve monthly)
- False positive rate per rule (tune rules with FP rate above 5%)
- MTTD for confirmed incidents by severity tier
- Hunt-to-detection conversion rate (percentage of threat hunts that produce a new detection rule)
- Mean time from threat intelligence publication to detection rule deployment
Post-incident review (PIR) as a continuous improvement driver: Every significant incident should produce a PIR within 5 business days. The PIR must answer: how was the attacker present before detection? What log source or rule would have detected them earlier? What changes to detection coverage or process would have reduced MTTD? These findings feed directly back into the detection rule backlog.
SOC Maturity Assessment Questionnaire
Use this assessment to identify your current maturity level across the three dimensions.
People dimension:
- Do you have 24x7 shift coverage, or are there gaps in monitoring coverage (nights, weekends)?
- Is there a defined career path for SOC analysts (Tier 1 to Tier 2 to Tier 3)?
- Do analysts have documented role-specific training plans?
- What is your analyst-to-alert ratio? (More than 20 alerts per analyst per shift at Tier 1 is a signal of alert fatigue)
- Is institutional knowledge documented in runbooks, or does it reside in specific individuals?
Process dimension:
- Do you have documented runbooks for your top-20 alert types?
- Is there a defined SLA for P1, P2, P3 incident response (target: P1 15 min initial response, P2 2 hours, P3 8 hours)?
- Do you run post-incident reviews after every major incident?
- Is there a formal process for promoting a hunt finding into a permanent detection rule?
- Do you track detection coverage against a framework (ATT&CK or equivalent)?
Technology dimension:
- Which log sources are ingested into your SIEM? (Score by coverage against the priority list)
- Do you have EDR deployed on what percentage of endpoints? (Target: 95%+)
- Do you have SOAR, and what percentage of tier-1 alert handling is automated?
- Do you have NDR or network-layer visibility?
- Do you have a threat intelligence platform (TIP) with feeds integrated into SIEM watchlists?
Scoring: Score each question 0-2 (0 = not in place, 1 = partially in place, 2 = fully in place). Total scores by dimension and by maturity level grouping to identify your weakest areas and highest-priority improvements.
The bottom line
SOC maturity advancement is not primarily a technology problem. The most common finding in maturity assessments is that organizations have invested in technology (SIEM, SOAR, EDR) without investing proportionally in the process and people capabilities that make the technology effective. A well-tuned SIEM with documented runbooks and a dedicated detection engineering function outperforms an advanced XDR platform with default rules and undertrained analysts. Identify your current level honestly by measuring against observable characteristics -- not aspirational ones -- and make the single highest-impact process or capability investment before purchasing another platform.
Frequently asked questions
What is the most important transition in the SOC maturity model?
The Level 2 to Level 3 transition -- from reactive SIEM-based monitoring to proactive threat hunting and automation -- produces the largest measurable improvement in detection effectiveness for most organizations. This transition requires adding detection engineering capability (writing custom rules rather than relying on vendor defaults), implementing SOAR automation for tier-1 enrichment, and running structured threat hunts. Organizations at Level 2 typically have the technology foundations in place; the gap is process and analyst skill, not additional tooling.
How do I assess SOC maturity without a formal consultant engagement?
Use the self-assessment framework across people, process, and technology dimensions. For each capability, score 0 (not present), 1 (partially present), or 2 (fully present). Supplement with measurable metrics: what is your current MTTD for confirmed incidents? What percentage of ATT&CK techniques do you have detection coverage for (use the ATT&CK Navigator to map your rule library)? What is your alert-to-confirmed-incident ratio? These objective metrics expose maturity gaps more clearly than self-assessment questions alone.
How many analysts do I need for a Level 3 SOC?
Staffing requirements depend on alert volume, environment complexity, and automation level. A rough baseline for a 24x7 Level 3 SOC handling a mid-sized enterprise: 3-4 tier-1 analysts per shift (minimum 2 per shift to prevent single points of failure), 2-3 tier-2 analysts with investigation skills, 1-2 dedicated detection engineers, 1 SOC manager, and ideally a threat intelligence analyst. This totals 10-15 people for full 24x7 coverage. Organizations that cannot staff this fully often use a hybrid model: internal tier-2 and detection engineering supplemented by an MDR provider for 24x7 tier-1 monitoring.
What metrics should I report to leadership to demonstrate SOC maturity progress?
Report three categories of metrics to leadership. Efficiency metrics: mean time to detect (MTTD) and mean time to respond (MTTR) by incident severity, trending over time. Coverage metrics: percentage of ATT&CK tactics with at least one detection rule, percentage of endpoints with EDR coverage, log source coverage against the defined baseline. Effectiveness metrics: true positive rate (alerts that result in confirmed incidents), false positive rate per tier-1 alert type, and detection rule coverage gaps identified through threat hunting. Present trends over a rolling 90-day window to show trajectory, not just point-in-time scores.
What is the difference between SOC maturity and detection engineering maturity?
Detection engineering maturity is a subset of SOC maturity focused specifically on the capability to develop, test, deploy, and maintain detection rules. A mature detection engineering practice includes version-controlled rule management (Sigma rules in a Git repository), automated testing of detection rules against sample data before deployment, a structured process for translating threat intelligence into detection requirements, and metrics on rule performance (true positive rate, false positive rate, coverage). SOC maturity is broader, encompassing detection engineering plus incident response process, threat intelligence, threat hunting, analyst development, and operational metrics.
How does MDR relate to SOC maturity?
MDR (Managed Detection and Response) is a service that provides SOC capabilities externally -- 24x7 monitoring, alert triage, and incident response. Organizations use MDR in two ways relative to maturity: as a substitute for building a Level 2-3 SOC (common in SMB and mid-market organizations that cannot staff a full SOC), or as a supplement to an internal SOC (providing 24x7 coverage for after-hours shifts while internal analysts handle day-shift investigation and detection engineering). MDR does not advance your SOC maturity -- it substitutes for specific capabilities. Organizations that want to build internal maturity should focus on retaining detection engineering and threat hunting capabilities internally while potentially outsourcing tier-1 monitoring.
Sources & references
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
The Mythos Brief is free.
AI that finds 27-year-old zero-days. What it means for your security program.
