Security Information & Event Management
Security Information & Event Management
Security Information & Event Management
Management
Background on Network Components 2
Router
IPS/IDS
Firewall
Monitored Events
Event Collection
Core Engine
User Interface
Typical Features of SIEM 14
BIG 3 for SIEM 15
Compliance
SIEM
Security Operations
SIEM Process Flow 16
Extract Presentation
Data
Intelligent Add Value Dashboards
Collection
Information & Reports
Typical Working of an SIEM Solution 17
SIEM Architecture
18
System Inputs
Data
SIEM Correlation
Collection Logic/Rules
Normalization Aggregation
System Outputs
Analysis
Reports
Real Time Monitoring
Context 19
Adding Context 20
Examples of context
Add geo-location information
Get information from DNS servers
Get User details (Full Name, Job Title & Description)
Add context aids in identifying
Access from foreign locations
Suspect data transfer
21
A threats.
Correlation boosts network security
by processing millions of events
simultaneously to detect anomalous
events on the network.
D B Correlation can be based on log
search, rules and alerts
Predefined rules and alerts are not
sufficient. Custom rule and alert builder is a
C
must for every SIEM solution.
Ensure that the process of correlating
events is easy.
#4. Log Retention 25
Deployment Options
Self-Hosted, Self-Managed 31
Self-Hosted, MSSP-Managed 32
Self-Hosted, Jointly-Managed 33
Cloud, MSSP-Managed 34
Cloud, Jointly-Managed 35
Cloud, Self-Managed 36
Hybrid-Model, Jointly-Managed 37
Why SIEM implementation fails? 38
Lack of Planning
No defined scope
Faulty Deployment Strategies
Incoherent log management data collection
High volume of irrelevant data can overload the system
Operational
Lack of management oversight
Assume plug and play
Real-time Monitoring
For operational efficiency and IT
security purposes
Cost Saving
Compliance
Reporting
Rapid ROI
40
Q&A
41
THANK YOU