{"id":22417,"date":"2025-07-09T12:00:52","date_gmt":"2025-07-09T10:00:52","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=22417"},"modified":"2025-07-21T13:46:48","modified_gmt":"2025-07-21T11:46:48","slug":"soc-rufbereitschaft","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2025\/07\/09\/soc-rufbereitschaft\/","title":{"rendered":"SOC On-Call Service: IT Security Around the Clock"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_22417 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_22417')){$('.twoclick_social_bookmarks_post_22417').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2025\\\/07\\\/09\\\/soc-rufbereitschaft\\\/\",\"post_id\":22417,\"post_title_referrer_track\":\"SOC+On-Call+Service%3A+IT+Security+Around+the+Clock\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_22421\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-22421\" class=\"size-medium wp-image-22421\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/07\/SOC-Web-1-300x169.png\" alt=\"A protective shield with the text \u201cSOC - Security Operation Center\u201d on it; network structures in the background\" width=\"300\" height=\"169\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/07\/SOC-Web-1-300x169.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/07\/SOC-Web-1-1024x576.png 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/07\/SOC-Web-1-768x432.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/07\/SOC-Web-1-1536x864.png 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2025\/07\/SOC-Web-1-2048x1152.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-22421\" class=\"wp-caption-text\">Source: Own illustration<\/p><\/div><\/p>\n<p>Whether it&#8217;s suspicious activity on the network, compromised user accounts, or acute cyber attacks \u2013 every minute counts in an emergency. In order to be able to respond to security incidents at RWTH even faster and more effectively in the future, the IT Center&#8217;s <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/services\/it-sicherheit\/~bddgog\/security-operations-center\/?lidx=1\">Security Operation Center (SOC)<\/a> has had an on-call service since June 1, 2025. This means that the SOC team can now also be reached outside regular working hours if necessary, ensuring greater security in the university network around the clock.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">What Does the SOC Team Do?<\/span><\/h3>\n<p>The SOC&#8217;s central task is to ensure IT security at RWTH. The team&#8217;s activities range from monitoring network security and analyzing log data to actively preventing damage. The SOC&#8217;s daily work also includes maintaining firewall rules, processing DFN-CERT reports, and providing advice on security issues.<\/p>\n<p>Specifically, the team is responsible for the following tasks:<\/p>\n<ul>\n<li>Monitoring communication network security<\/li>\n<li>Detecting and analyzing security incidents<\/li>\n<li>Initiating measures against cyber attacks<\/li>\n<li>Performing vulnerability analyses<\/li>\n<li>Providing advice and training on IT security issues<\/li>\n<li>Acting as a point of contact for security and law enforcement agencies<\/li>\n<li>Actively preventing damage by blocking accounts, devices, networks, and services<\/li>\n<li>Operating IT security systems<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Advice and Support<\/span><\/h3>\n<p>Whether you are an employee or a student: Anyone can contact the SOC at any time if they notice suspicious activity on devices, servers, virtual machines, or user accounts.<\/p>\n<p>The SOC team provides technical support in responding to security incidents. If you need advice on IT security issues in order to take preventive measures or improve existing security strategies, the SOC will be happy to help.<\/p>\n<p>If you have general questions about IT security issues, the <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/b734502cd73e4201b1f763a65a61bf9c\/article\/cbf1b80232b34626bbd53dda48578c09\/\">IT Service Desk<\/a> is available to advise you.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Why Is the SOC On-Call Service So Important?<\/span><\/h3>\n<p>IT security incidents do not only occur during office hours. They often occur in the evening, at night, or on weekends. With the new on-call service, the SOC team can now respond quickly outside of regular working hours, minimize damage, and ensure the security of IT systems at RWTH around the clock.<\/p>\n<p>This is an important step in meeting the increasing demands on IT security, especially at a university with sensitive data and complex infrastructure.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How to Reach the SOC<\/span><\/h3>\n<p>In emergencies, you can now reach the SOC team around the clock by <a href=\"mailto:soc@rwth-aachen.de\">email<\/a>. The team is available by phone during business hours at +49 241 80-29505. Outside business hours, you can be connected to the SOC on-call service at +49 241 80-2924680.<\/p>\n<p>&nbsp;<\/p>\n<p>Not sure whether you are dealing with a security incident? Then please contact your IT network contact person or the <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/b734502cd73e4201b1f763a65a61bf9c\/article\/cbf1b80232b34626bbd53dda48578c09\/\">IT-ServiceDesk<\/a> first.<\/p>\n<p>&nbsp;<\/p>\n<p>Further information about the SOC, its tasks, and the new on-call service can be found on our <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/services\/it-sicherheit\/~bddgog\/security-operations-center\/?lidx=1\">website<\/a> and our documentation portal <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/09a393a9490c41bf83e49338ad2bba08\/\">IT Center Help<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p>Responsible for the content of this article are <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-campus-\/?allou=1&amp;gguid=PER-QNL6YXJ&amp;lidx=1\">Hannah Loock<\/a> and <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-campus-\/?allou=1&amp;gguid=PER-FSX9U9J&amp;lidx=1\">Malak Mostafa<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":6500,"featured_media":22418,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[306,312,314,315,310],"tags":[1496,61,1497,1495],"class_list":["post-22417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ankuendigungen","category-insight-it-center","category-it-sicherheit","category-services-support","category-studium-lehre","tag-cyber-angriffe","tag-it-sicherheit","tag-rufbereitschaft","tag-soc"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/22417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/6500"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=22417"}],"version-history":[{"count":8,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/22417\/revisions"}],"predecessor-version":[{"id":22491,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/22417\/revisions\/22491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/22418"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=22417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=22417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=22417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}