Security Information and Event Management (SIEM) - A Detailed Explanation
Security Information and Event Management (SIEM) - A Detailed Explanation
Capabilities
Basically, a SIEM tool collects logs from devices present in the Organization’s
infrastructure. Some solutions also collect NetFlow and even raw packets.
With the collected data(mainly logs, packets), the tool provides an insight
into the happenings of the network.
It provides data for each event occurring in the network and thus acts as a
complete centralized security monitoring system.
There are many possibilities. Maybe a person is trying to guess the password
of another user and got it right, which is a breach. Or maybe if the user
forgot his password but got it right at the end and so on. This is where co-
relation comes in.
For such a case, a co-relation rule can be made in such a way that, If an
authentication failure event is happening 3 times consecutively followed by a
success in a specific time period, then alert pops up.
Logs provide feedback on the status of IT resources and all activity going
through them.
How logs reach the SIEM?
Logs are fetched to the SIEM in two different ways. Agent-based & Non-
Agent based. In agent-based approach, a log pushing agent in installed in
the client machine from which the logs are collected.
Then this agent is configured to forward logs into the solution. In the later
type, the client system sends logs on it’s own using a service like Syslog or
Windows Event Collector service etc.
There are also specific applications & devices which can be integrated
through a series of vendor specific procedures.
Analyzing the logs, it will be clear that a number of connection failures are
occurring to different ports in regular intervals.
Seeing packet information if possible, we can detect the SYN requests being
sent from the same IP to the same IP but to different ports in regular
intervals. That concludes that somebody initiated an SYN scan against our
asset.
The SIEM automates this process and raises alerts. Different solutions do
this in different ways but produce same results.
1. Authentication Activities
2. Shared Accounts
Session duration, inactive sessions etc, using login session related data
specifically from Windows server.
4. Connections Details
6. Information Theft
8. Statistical Analysis
Statistical analysis can be done to study the nature of data. Functions like
average, median, quantile, quartile etc can be used for the purpose.
Numerical data from all kind of sources can be used to monitor relations like
ratio of inbound to outbound bandwidth usage, data usage per application,
response time comparison etc.
SIEM can correlate user activity with user rights and roles to detect
violations of least
privilege enforcement, which is required by this control.
Network rule violations, like CCE discoveries, should also be reported to one
central
source (a SIEM) for correlation with authorized inventory data stored in the
SIEM
solution
Control 6 is basically a control about SIEMs, which are a leading means for
collecting
and centralizing critical log data; in fact, there is even a subcontrol for
analysis that
studies SIEM specifically. SIEMs are the core analysis engine that can
analyze log events
as they occur.
When the principles of this control are not met (such as an administrator
running a
web browser or unnecessary use of administrator accounts), SIEM can
correlate access
logs to detect the violation and generate an alert.
SIEM can correlate user activity with user rights and roles to detect
violations of least
privilege enforcement, which is required by this control.
if a system has a running port, protocol, or service that has not been
authorized, it should also be reported to a central source where these
vulnerabilities can be correlated with other events concerning a particular
system. SIEMs can monitor log data to detect traffic over restricted ports,
protocols, and services. Organizations can use these controls to decide which
ports and services are useful for business, which are not, and which types of
traffic and ports to limit
data loss rule violations, like CCE discoveries, should also be reported to one
central source such as a SIEM, which can correlate data loss events with
inventory or asset information as well as other system and user activity to
detect complex breaches of sensitive data.