SIEM
Updated Jan 30, 2024 ·
Overview
SIEM or Security Information and Event Management, is a comprehensive approach to security management that combines SIM (Security Information Management) and SEM (Security Event Management) functions into a single, integrated solution.
SIEM can provide details such as:
- Source of the attack
- System or data it's targeting
- Method being used.
Key Features
-
Log Management
- Collects, normalizes, and correlates log data from various sources.
- Sources include network devices, servers, applications, and security tools.
-
Event Correlation
- Analyzes and correlates security events in real-time.
- Identify patterns and detect potential security threats.
-
Incident Response
- Facilitates incident detection, investigation, and response.
- Provide actionable insights and automated response capabilities.
-
Compliance Reporting
- Regulatory compliance through reporting and auditing capabilities.
- Demonstrate adherence to security policies and standards.
-
Threat Intelligence Integration
- Incorporates threat intelligence feeds.
- Enhance detection capabilities and prioritize security events.
-
User Activity Monitoring
- Monitors user activity and behavior.
- Detects insider threats and unauthorized access attempts.
Deployment
A SIEM can be implemented in a couple of ways:
- Software
- Hardware Appliances
- Outsourced Managed Service
It can also be agent-based or agent-less.
- Agent - installed on each system, from which the SIEM needs to collect log data.
- Agentless - SIEM relies on standard protocols such as SNMP or WMI.
Considerations
-
Sensor
- Actual endpoint being monitored.
- The sensors can feed the data up into the SIEM.
-
Sensitivity
- Focused on how much or how little you are logging.
- Based on how you configure the sensor.
- Note that the SIIEM can also be overloaded with too much information.
-
Trends
- By configuring the SIEM, we can see trends in the traffic.
- Increasing number of failed authentication attempts can be a sign of attack.
-
Alerts
- We can set alerts based on certain parameters.
- Example, alerts can be sent after five failed login attempts.
-
Correlations
- Information needs to be correlated to build a better picture.
- Example, ensuring that all devices are using the same timezone.
Recommendations
It is important to establish clear procedures and use reliable tools for effective threat detection and response.
- Log all relevant events and filter irrelevant data.
- Establish and document scope of events.
- Develop use cases to define a threat.
- Plan incident response for a threat or event.
- Establish a ticketing system to track events.
- Schedule regular threat hunting.
- Provide auditors and analysts an evidence trail.
Available SIEM solutions:
- Splunk
- ELK or Elastic Stack
- ArcSight
- QRadar