Siem
Siem
SIEM
1. Introduction:
The term Security Information Event Management (SIEM), coined by Mark Nicolett and Amrit
Williams of Gartner in 2005.
Describes the product capabilities of gathering, analyzing and presenting information from
network and security devices; identity and access management applications; vulnerability
management and policy compliance tools; operating system, database and application logs;
and external threat data.
1.1 Importance of SIEM in Cybersecurity: SIEM plays a critical role in the cybersecurity
defense strategy of organizations for several reasons:
(a) Threat Detection and Response: SIEM enables organizations to detect potential
security threats and vulnerabilities by continuously monitoring and analyzing the
event data in real time.
(b) Compliance and Regulatory Requirements: SIEM helps organizations comply with
these regulations by providing comprehensive logging, alerting, and reporting
features.
(c) Centralized Visibility: SIEM provides a centralized platform for security monitoring,
which is essential for managing the complex and distributed nature of modern IT
environments.
(d) Efficient Incident Management: With SIEM, organizations can streamline their
incident response processes. The system can prioritize alerts based on severity,
reducing the time and resources required to address security incidents.
(e) Forensic Analysis: In the event of a security breach, SIEM tools offer forensic
capabilities that allow security analysts to investigate and understand the scope and
impact of an incident, which is crucial for recovery and prevention of future attacks.
(g) SIEM should be proposed as a hardware appliance or virtual appliance with the
capability to scale up using a distributed architecture.
(a) Log Generators: These are the systems and applications that automatically produce
logs, such as operating systems, web servers, databases, and security devices like
firewalls and intrusion detection systems.
(b) Agents: Software agents may be installed on hosts to facilitate the collection of log
data.
1
SIEM
(c) Sensors: Network sensors and probes can be deployed to monitor network traffic and
to detect anomalies or malicious activities that might not be logged by other devices.
2.2 Data Aggregation and Normalization: Centralized Data Storage and Management
(a) Aggregation: SIEM systems consolidate data from multiple sources to provide a
cohesive dataset for analysis.
(b) Normalization: The data is then normalized, which means converting different log and
event formats into a common format.
(a) Rules: SIEM systems use predefined and customizable rules to identify patterns and
relationships between events that may indicate a security incident.
(c) Analytics: Behavioural analytics and machine learning are increasingly used to
identify deviations from normal activity that could signify a threat.
(a) Real-time Notifications: SIEM systems can be configured to send immediate alerts
when certain thresholds are met, or suspicious patterns are detected.
(b) Historical Reporting: SIEMs also provide comprehensive reporting capabilities for
historical analysis, compliance audits, and post-incident reviews.
2.5 Dashboards and Visualization: User Interfaces for Monitoring and Analysis
(a) Dashboards: Customizable dashboards provide security teams with real-time visibility
into their network's security status.
(b) Visualization: Graphs, charts, and heat maps help in interpreting complex datasets
and identifying trends and outliers.
2.6 Incident Response and Forensics: Tools for Investigation and Remediation
(a) Incident Response: SIEMs can integrate with incident response platforms to
automate certain actions when a threat is detected, such as isolating affected
systems.
(b) Forensics: SIEM tools offer forensic capabilities that allow for detailed investigation
into the timeline and scope of an incident, which is essential for understanding the
attack vectors and for preventing future breaches.
(c) Open Standards Support: The solution should support CEF (Common Event Format)
or equivalent open technology for integration with third-party analytics solutions,
avoiding proprietary formats.
(d) Raw & Parsed Log Storage: The SIEM solution must store both raw event logs and
normalized logs for a period of one year.
2
SIEM
(e) Agent-based & Agentless Log Collection: The SIEM should collect logs in real-time
from any IP device, using both agent-based and agentless methods.
(f) Local Storage for Log Collector: The SIEM log collector must store data locally if
communication with the central database is unavailable.
3. Working of SIEM
The operation of a Security Information and Event Management (SIEM) system is a complex
process that involves several stages, from data collection to incident response. Here's a
detailed look at each step in the working of SIEM:
3.1 Data Collection Process: Gathering Logs and Events from Various Sources
(a) SIEM systems start by collecting data from various sources within an organization's
IT environment. This includes logs from servers, network devices, security
appliances, databases, and applications.
(b) Data collectors, agents, or sensors are deployed across the infrastructure to gather
this information and send it to the SIEM system.
(a) Upon receiving the data, the SIEM system begins processing it. This involves filtering
out noise, such as irrelevant information or known benign events, to reduce the
volume of data.
3
SIEM
(b) Parsing is the next step, where the SIEM extracts useful information from the raw
data.
(c) Normalization involves converting different log formats into a standardized format
that can be used for analysis. This allows the SIEM to process and compare data
from heterogeneous sources.
(a) The SIEM system uses correlation engines to analyse the normalized data. It applies
rules, patterns, and algorithms to identify relationships between events across
different systems and timeframes.
(b) This process helps in detecting complex threats, such as multi-stage attacks, by
correlating seemingly unrelated events that together indicate a security incident.
(c) Advanced SIEMs may also use behavioural analytics and machine learning to detect
anomalies that deviate from established baselines of normal activity.
(a) When the SIEM identifies a potential security incident, it generates an alert based on
predefined criteria and severity levels.
(b) These alerts are prioritized to help security analysts focus on the most critical issues
first.
(c) Notifications can be sent through various channels, such as email, SMS, or
integration with other management systems, to ensure that the relevant personnel
are informed promptly.
(a) In response to alerts, the SIEM can initiate automated actions, such as blocking an
IP address at the firewall or disabling a compromised user account.
(b) For incidents that require further investigation or complex remediation, the SIEM
provides detailed information to security analysts for manual intervention.
(c) The SIEM system also supports forensic analysis by retaining detailed event data,
which is crucial for investigating the cause and impact of a breach and for taking
steps to prevent similar incidents in the future.
(d) Risk-Based Correlation: The SIEM should provide risk-based correlation across
multiple security data sources.
(e) Dedicated Correlation Appliance: The solution must allow correlation of security data
using a dedicated appliance for performance enhancement.
(f) Threat Intelligence Integration: The SIEM must support integration with Threat
Intelligence feeds manually and via STIX/TAXII or REST API.
4
SIEM
Extract Presentati
Data Intelligent Add Value on
Collection Informatio dashboard
n s and
Real-time
Log Collection
alerting
User activity
Log Analysis
monitoring
Event Dashboards
Correlation
Log Forensic
SIEM Reporting
File Integrity
IT Compliance monitoring
System and
Application Log Device Log
Monitoring
5
SIEM
(a) SIEM systems are primarily used for early detection of potential security threats by
monitoring, analysing, and correlating events across various sources in real time.
(b) They can identify a wide range of threats, from malware infections and insider threats
to unauthorized access and data exfiltration attempts.
(c) SIEM enables organizations to manage and mitigate risks by providing actionable
intelligence and prioritizing alerts based on the severity of the threat.
(a) Many industries are governed by regulatory standards that require organizations to
monitor, log, and report security-related events. Examples include the Health
Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry
Data Security Standard (PCI DSS), and the General Data Protection Regulation
(GDPR).
(b) SIEM systems help organizations maintain compliance by providing the necessary
tools to collect, store, and analyze security data, as well as generate reports for
auditing purposes.
(c) The ability to demonstrate continuous monitoring and incident response capabilities
is often a key requirement of these regulations, and SIEM plays a critical role in
fulfilling this need.
(d) The SIEM should support log retention policies as per the organization's compliance
and security guidelines.
(a) Advanced Persistent Threats (APTs) are sophisticated, covert, and targeted attacks
that can evade traditional security measures and remain undetected for long periods.
(b) SIEM systems are equipped to detect the subtle indicators of compromise associated
with APTs by correlating low-level events that individually may not raise alarms but
collectively suggest a coordinated attack.
(c) By leveraging advanced analytics, SIEM can uncover the stealthy techniques used
by APTs, such as lateral movement within the network, data exfiltration channels, and
command and control communications.
(d) Once an APT is detected, SIEM facilitates a swift and effective response to contain
the threat and minimize damage.
In addition to these use cases, SIEM systems are also valuable for other security-related
activities, such as:
6
SIEM
(c) Insider Threat Detection: SIEM can identify unusual patterns of behavior that may
indicate malicious activity by insiders, such as employees or contractors.
(e) Integration with Security Tools: The SIEM must collect logs from various security and
network devices, including:
(ii) Security solutions (Firewalls, IPS, Anti-Virus, Patch Management, NAC, VPN)
(a) As organizations grow and their IT environments become more complex, the volume
of log data generated increases exponentially. SIEM systems must be able to scale
accordingly to handle this influx of data without performance degradation.
(b) Ensuring that the SIEM can process and analyze data in real time is crucial for timely
threat detection and response.
(c) Considerations for scalability include the SIEM's architecture, data storage solutions,
and the ability to distribute processing across multiple nodes or into the cloud.
7.2 Integration with Existing Infrastructure: Compatibility with Other Security Tools
(a) SIEM systems need to integrate seamlessly with a wide range of existing security
tools and IT infrastructure components to collect and correlate data effectively.
(b) Challenges arise when dealing with legacy systems, proprietary formats, or
specialized security solutions that may not readily integrate with the SIEM.
(c) Organizations must ensure that the SIEM can communicate with all necessary
components, possibly requiring custom connectors or APIs.
7.3 False Positives and Alert Fatigue: Managing the Accuracy of Alerts
(a) One of the biggest challenges with SIEM implementation is tuning the system to
minimize false positives—alerts that incorrectly indicate malicious activity.
(b) High volumes of false positives can lead to alert fatigue, where security analysts
become desensitized to alerts and may overlook genuine threats.
7
SIEM
(c) Regularly refining correlation rules, employing advanced analytics, and continuously
adjusting the system based on feedback are essential to maintaining the accuracy of
alerts.
(a) SIEM systems are complex and require skilled personnel to manage and operate
them effectively.
(b) There is a significant need for trained security analysts who can interpret SIEM data,
respond to incidents, and tune the system to the organization's unique environment.
(c) The shortage of cybersecurity professionals in the industry can make it challenging
for organizations to find and retain the necessary talent to manage their SIEM
systems.
(a) Implementing and maintaining a SIEM system can be costly, requiring significant
investment in hardware, software, and personnel.
(b) Organizations must balance the costs against the benefits of improved security
posture and compliance.
(a) SIEM systems collect and store sensitive data, which must be protected in
accordance with privacy laws and regulations.
(b) Organizations must ensure that their SIEM implementation complies with data
protection requirements and that access to SIEM data is appropriately controlled.
(a) Cyber threats are constantly evolving, and SIEM systems must be updated regularly
to keep pace with new tactics and techniques used by attackers.
(b) Ongoing maintenance, updates, and training are necessary to ensure that the SIEM
remains effective over time.
(a) SIEM should be integrated into the organization's broader incident response plan to
ensure a coordinated response to security incidents.
(b) This involves defining processes and workflows for how alerts are escalated,
investigated, and resolved.
Cost & Resource Allocation for SIEM Scaling: SIEM implementations require significant
investment in hardware, software, storage, and security analysts.
Integration with Legacy Systems & APIs: The SIEM must integrate with legacy
infrastructure and provide custom API connectors if necessary.
Continuous Threat Updates & System Improvement: SIEM must continuously update its
rules, threat feeds, and detection algorithms to counter evolving threats.