SlideShare a Scribd company logo
Dr. Anton Chuvakin
@anton_chuvakin
SIEM Architecture and
Operational Processes
Disclaimer: HISTORICAL INTEREST ONLY
This material is at least several years old and
is preserved here for HISTORICAL INTEREST
ONLY
Advice may not reflect current conditions
(but then again, it may reflect yours…)
To Start…
• You can buy a SIEM tool — but you cannot buy a security monitoring
capability
• Even MSSP only gives you many of the blocks of it, but not the whole thing!
• You have to buy the tools, grow the people and mature the
processes
• Security monitoring is an eternal commitment
Outline
• SIEM 2015: A Brief Refresher
• Before SIEM
• Deploying SIEM
• Running SIEM
• Evolving SIEM
• Pitfalls
• Recommendations
Security Information and Event Management (SIEM)
Decomposed?
SIEM
Analysis
Repository
Query Reports
Data Collection
SIM
Incident
Management
CorrelationNormalization
Real-time
Monitoring
SEM
Threat Intelligence
Data
Asset
Vulnerability
User
Context
Network Firewall
Application FirewallApplication
Database
Server
Network Device
NIDS/NIPS
Endpoint Protection
Data Loss Prevention
File Integrity Monitor
Event Data
Log Management Lives Here Too
Select 2015 SIEM Usage Trends
• More log data (of course!)
• More threat intel into SIEM
• More managed SIEM
• “Brainy” SIEM add-ons emerge
USE CASES!!!!
Taking aspirin is about the headache, not about low aspirin content in your blood!
What problem are you trying to solve?!
7
SIEM Uses Logs — Where Are Yours?
• Logging policy fundamentals:
• Identify, configure, tune — repeat!
• What people log first?
1. Network devices, servers (AD!),
security appliances.
2. Proxies, Web servers, antivirus.
3. Databases, application, desktops.
• SIEM project phases set the order!
Compete Use Case Example
Step Details
Use-case
Selection
Focus on tracking authentication across systems to detect
unauthorized access.
Data Collection Have a list of systems: servers, VPN concentrators,
network devices, and others.
Log Source
Configuration
Contact the team that operates the systems and make
them modify the logging configurations
SIEM Content
Preparation
Review vendor's content, check it for suitability; modify
the reports and rules until satisfied.
Definition of
Operational
Processes
Review operational processes (e.g a process for
suspending or disabling user accounts)
Refinement of
the Content
Review dashboards and test rules to see whether
incidents will be detected.
Top Starter Use Cases (2015)
1. Authentication monitoring by using login logs
2. Compromised- and infected-system tracking; malware
detection by using outbound firewall logs, NIPS alerts and
Web proxy logs
3. Validating IDS/IPS (IDS/IPS) alerts by using context data
4. Monitoring for suspicious outbound connectivity and data
transfers
5. Tracking system changes and other administrative actions
across internal systems and matching them to allowed policy
6. Tracking of Web application attacks and their consequences
by using Web server, WAF and application server logs
Architecture of an SIEM Deployment
• Agents versus agentless for collection?
• Log sources to collectors? Volume?
• Network architecture constraints (such as connectivity
and link bandwidth)?
• Log collection across network architecture boundaries?
• Can correlation be distributed? Can storage be?
• How will redundancy be architected?
"Output-driven" SIEM
Successfully Run SIEM Deployment?
• Goals
• Processes
• People
Essential SIEM Operational Processes
• Use-case Independent:
• Collector and log source configuration process
• Escalation and collaboration process
• Analyst training process (tool and process!)
• Content tuning and customization process (<-KEY!)
• SIEM program checkpoint process
More Essential SIEM Processes
• Incident response
• Security:
• Monitoring:
• Alert triage process
• Activity baselining
process
• Investigation:
• Indicator analysis
process
• Remediation process
• Compliance:
- Report review process
- Report refinement based on
changing requirements
process
- Compliance issue
remediation process
Advanced only: Data exploration process/"hunting"
People
Shorthand Description Common Job Titles for
This Role
Run Maintain an SIEM product in
operational status, monitor its
uptime, optimize performance,
deploy updates , and perform
other system management
tasks
SIEM administrator
and SIEM engineer
Watch Use the SIEM product for
security monitoring, investigate
alerts and review activity
reports
Security analyst, SIEM
analyst, and incident
responder
Tune Refine and customize SIEM
content and create content
specific to new use cases
Content developer
and SIEM consultant
SIEM Maturity Road Map
State No. Maturity Stage Key Processes That Must Be in Place
1 SIEM deployed and collecting some
log data
SIEM infrastructure monitoring process
Log collection monitoring process
2 Periodic SIEM usage,
dashboard/report review
Incident response process
Report review process
3 SIEM alerts and correlation rules
enabled
Alert triage process
4 SIEM tuned with customized filters,
rules, alerts, and reports
Real-time alert triage process
Content tuning process
5 Advanced monitoring use cases,
custom SIEM content use cases
Threat intelligence process
Content research and development
SIEM And/Or/Vs/With Security Analytics?
• Have to solve security problems that
SIEM is sub-optimal for?
• Want to apply more algorithms to log,
flow and context data?
• Have higher volume or diversity of data?
• Need to post-process alerts?
18
Quick Win: Going Beyond SIEM
• User Behavior Analytics (UBA) - “add-on” SIEM brain for user-focused
analysis
• Detect compromised accounts “automatically”
• Enrich alerts with user behavior profiles
• Utilize vendor-provided anomaly algorithms
19
SIEM Pitfalls
• Planning:
• Skip the planning stage and just buy some SIEM tool
• Fail to define the initial deployment scope
• Deployment:
• Ignore a phased approach for deployment
• Install the tool before a logging policy is clarified
• Operation:
• Assume that the SIEM would run itself
• Lack a program owner
Advice
Think "security monitoring capability," not
"SIEM box."
SIEM requires "care and feeding" to give value.
Prepare to be involved with the tool indefinitely.
Use "output-driven" SIEM approach.
Define processes and dedicate personnel to use the
tool.
Define/Refine and incident response process.
Follow the maturity levels — or suffer!
Review your route beyond SIEM – UBA, etc

More Related Content

PPTX
Generic siem how_2017
Anton Chuvakin
 
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 
PPTX
Five SIEM Futures (2012)
Anton Chuvakin
 
PPT
Top 10 SIEM Best Practices, SANS Ask the Expert
AccelOps
 
PPTX
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
 
PPTX
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
Anton Chuvakin
 
PPTX
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
 
PPTX
On Content-Aware SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 
Generic siem how_2017
Anton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 
Five SIEM Futures (2012)
Anton Chuvakin
 
Top 10 SIEM Best Practices, SANS Ask the Expert
AccelOps
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
Anton Chuvakin
 
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
 
On Content-Aware SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 

What's hot (20)

PPTX
SIEM Primer:
Anton Chuvakin
 
PPTX
Got SIEM? Now what? Getting SIEM Work For You
Anton Chuvakin
 
PPT
NIST 800-92 Log Management Guide in the Real World
Anton Chuvakin
 
PPTX
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Anton Chuvakin
 
PPTX
Security Information and Event Management (SIEM)
k33a
 
PPTX
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
Anton Chuvakin
 
PPTX
Implementing and Running SIEM: Approaches and Lessons
Anton Chuvakin
 
PPTX
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
 
PPTX
RSA 2016 Security Analytics Presentation
Anton Chuvakin
 
PPTX
McAfee SIEM solution
hashnees
 
PPTX
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
PPTX
SOC Architecture Workshop - Part 1
Priyanka Aash
 
PPTX
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Anton Chuvakin
 
PDF
2012-12-12 Seminar McAfee ESM
Pinewood
 
PPTX
Making Log Data Useful: SIEM and Log Management Together
Anton Chuvakin
 
DOC
SIEM
vikasraina
 
PDF
Soc analyst course content
ShivamSharma909
 
PPTX
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton Chuvakin
 
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
SBWebinars
 
PPTX
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 
SIEM Primer:
Anton Chuvakin
 
Got SIEM? Now what? Getting SIEM Work For You
Anton Chuvakin
 
NIST 800-92 Log Management Guide in the Real World
Anton Chuvakin
 
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Anton Chuvakin
 
Security Information and Event Management (SIEM)
k33a
 
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
Anton Chuvakin
 
Implementing and Running SIEM: Approaches and Lessons
Anton Chuvakin
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
 
RSA 2016 Security Analytics Presentation
Anton Chuvakin
 
McAfee SIEM solution
hashnees
 
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Anton Chuvakin
 
2012-12-12 Seminar McAfee ESM
Pinewood
 
Making Log Data Useful: SIEM and Log Management Together
Anton Chuvakin
 
Soc analyst course content
ShivamSharma909
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton Chuvakin
 
Top Cybersecurity Threats and How SIEM Protects Against Them
SBWebinars
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 
Ad

Similar to Tips on SIEM Ops 2015 (20)

PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
Atif Ghauri
 
PDF
Its Not You Its Me MSSP Couples Counseling
Atif Ghauri
 
PPTX
DGI Compliance Webinar
SolarWinds
 
PDF
SIEM Architecture
Nishanth Kumar Pathi
 
PDF
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
PPTX
IBM i Security SIEM Integration
Precisely
 
PPTX
Is SIEM really Dead ? OR Can it evolve into a Platform ?
Aujas
 
PPTX
IBM i Security: Identifying the Events That Matter Most
Precisely
 
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
hefagi6193
 
PDF
SIEM enabled risk management , SOC and GRC v1.0
Rasmi Swain
 
PPT
SLVA - Security monitoring and reporting itweb workshop
SLVA Information Security
 
PPTX
RuSIEM overview (english version)
Olesya Shelestova
 
PPTX
Effective Security Monitoring for IBM i: What You Need to Know
Precisely
 
PDF
Wc4
Said Wali
 
PPTX
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
SolarWinds
 
PDF
Cybersecurity Series SEIM Log Analysis
Jim Kaplan CIA CFE
 
PPTX
Logging, monitoring and auditing
Piyush Jain
 
PPTX
SOAR and SIEM.pptx
Ajit Wadhawan
 
PPTX
PKI.pptx
Ajit Wadhawan
 
PPT
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Atif Ghauri
 
Its Not You Its Me MSSP Couples Counseling
Atif Ghauri
 
DGI Compliance Webinar
SolarWinds
 
SIEM Architecture
Nishanth Kumar Pathi
 
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
IBM i Security SIEM Integration
Precisely
 
Is SIEM really Dead ? OR Can it evolve into a Platform ?
Aujas
 
IBM i Security: Identifying the Events That Matter Most
Precisely
 
UNIT -III SIEM aur baato kaise hai aap log.pdf
hefagi6193
 
SIEM enabled risk management , SOC and GRC v1.0
Rasmi Swain
 
SLVA - Security monitoring and reporting itweb workshop
SLVA Information Security
 
RuSIEM overview (english version)
Olesya Shelestova
 
Effective Security Monitoring for IBM i: What You Need to Know
Precisely
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
SolarWinds
 
Cybersecurity Series SEIM Log Analysis
Jim Kaplan CIA CFE
 
Logging, monitoring and auditing
Piyush Jain
 
SOAR and SIEM.pptx
Ajit Wadhawan
 
PKI.pptx
Ajit Wadhawan
 
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
Ad

More from Anton Chuvakin (18)

PPTX
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
Anton Chuvakin
 
PPTX
Future of SOC: More Security, Less Operations
Anton Chuvakin
 
PPTX
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
 
PPTX
Meet the Ghost of SecOps Future by Anton Chuvakin
Anton Chuvakin
 
PPTX
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
 
PPTX
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
 
PPTX
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
 
PPTX
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
 
PPTX
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
 
PPTX
Modern SOC Trends 2020
Anton Chuvakin
 
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 
PPTX
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Anton Chuvakin
 
PPTX
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Anton Chuvakin
 
PPTX
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
Anton Chuvakin
 
PPTX
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
Anton Chuvakin
 
PPTX
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
Anton Chuvakin
 
PPTX
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
Anton Chuvakin
 
PPTX
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
Anton Chuvakin
 
Detection Engineering Maturity - Helping SIEMs Find Their Adulting Skills
Anton Chuvakin
 
Future of SOC: More Security, Less Operations
Anton Chuvakin
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Anton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
 
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
 
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
 
Modern SOC Trends 2020
Anton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Anton Chuvakin
 
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
Anton Chuvakin
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
Anton Chuvakin
 
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
Anton Chuvakin
 
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
Anton Chuvakin
 
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
Anton Chuvakin
 

Recently uploaded (20)

PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Software Development Methodologies in 2025
KodekX
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Doc9.....................................
SofiaCollazos
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 

Tips on SIEM Ops 2015

  • 1. Dr. Anton Chuvakin @anton_chuvakin SIEM Architecture and Operational Processes
  • 2. Disclaimer: HISTORICAL INTEREST ONLY This material is at least several years old and is preserved here for HISTORICAL INTEREST ONLY Advice may not reflect current conditions (but then again, it may reflect yours…)
  • 3. To Start… • You can buy a SIEM tool — but you cannot buy a security monitoring capability • Even MSSP only gives you many of the blocks of it, but not the whole thing! • You have to buy the tools, grow the people and mature the processes • Security monitoring is an eternal commitment
  • 4. Outline • SIEM 2015: A Brief Refresher • Before SIEM • Deploying SIEM • Running SIEM • Evolving SIEM • Pitfalls • Recommendations
  • 5. Security Information and Event Management (SIEM) Decomposed? SIEM Analysis Repository Query Reports Data Collection SIM Incident Management CorrelationNormalization Real-time Monitoring SEM Threat Intelligence Data Asset Vulnerability User Context Network Firewall Application FirewallApplication Database Server Network Device NIDS/NIPS Endpoint Protection Data Loss Prevention File Integrity Monitor Event Data Log Management Lives Here Too
  • 6. Select 2015 SIEM Usage Trends • More log data (of course!) • More threat intel into SIEM • More managed SIEM • “Brainy” SIEM add-ons emerge
  • 7. USE CASES!!!! Taking aspirin is about the headache, not about low aspirin content in your blood! What problem are you trying to solve?! 7
  • 8. SIEM Uses Logs — Where Are Yours? • Logging policy fundamentals: • Identify, configure, tune — repeat! • What people log first? 1. Network devices, servers (AD!), security appliances. 2. Proxies, Web servers, antivirus. 3. Databases, application, desktops. • SIEM project phases set the order!
  • 9. Compete Use Case Example Step Details Use-case Selection Focus on tracking authentication across systems to detect unauthorized access. Data Collection Have a list of systems: servers, VPN concentrators, network devices, and others. Log Source Configuration Contact the team that operates the systems and make them modify the logging configurations SIEM Content Preparation Review vendor's content, check it for suitability; modify the reports and rules until satisfied. Definition of Operational Processes Review operational processes (e.g a process for suspending or disabling user accounts) Refinement of the Content Review dashboards and test rules to see whether incidents will be detected.
  • 10. Top Starter Use Cases (2015) 1. Authentication monitoring by using login logs 2. Compromised- and infected-system tracking; malware detection by using outbound firewall logs, NIPS alerts and Web proxy logs 3. Validating IDS/IPS (IDS/IPS) alerts by using context data 4. Monitoring for suspicious outbound connectivity and data transfers 5. Tracking system changes and other administrative actions across internal systems and matching them to allowed policy 6. Tracking of Web application attacks and their consequences by using Web server, WAF and application server logs
  • 11. Architecture of an SIEM Deployment • Agents versus agentless for collection? • Log sources to collectors? Volume? • Network architecture constraints (such as connectivity and link bandwidth)? • Log collection across network architecture boundaries? • Can correlation be distributed? Can storage be? • How will redundancy be architected?
  • 13. Successfully Run SIEM Deployment? • Goals • Processes • People
  • 14. Essential SIEM Operational Processes • Use-case Independent: • Collector and log source configuration process • Escalation and collaboration process • Analyst training process (tool and process!) • Content tuning and customization process (<-KEY!) • SIEM program checkpoint process
  • 15. More Essential SIEM Processes • Incident response • Security: • Monitoring: • Alert triage process • Activity baselining process • Investigation: • Indicator analysis process • Remediation process • Compliance: - Report review process - Report refinement based on changing requirements process - Compliance issue remediation process Advanced only: Data exploration process/"hunting"
  • 16. People Shorthand Description Common Job Titles for This Role Run Maintain an SIEM product in operational status, monitor its uptime, optimize performance, deploy updates , and perform other system management tasks SIEM administrator and SIEM engineer Watch Use the SIEM product for security monitoring, investigate alerts and review activity reports Security analyst, SIEM analyst, and incident responder Tune Refine and customize SIEM content and create content specific to new use cases Content developer and SIEM consultant
  • 17. SIEM Maturity Road Map State No. Maturity Stage Key Processes That Must Be in Place 1 SIEM deployed and collecting some log data SIEM infrastructure monitoring process Log collection monitoring process 2 Periodic SIEM usage, dashboard/report review Incident response process Report review process 3 SIEM alerts and correlation rules enabled Alert triage process 4 SIEM tuned with customized filters, rules, alerts, and reports Real-time alert triage process Content tuning process 5 Advanced monitoring use cases, custom SIEM content use cases Threat intelligence process Content research and development
  • 18. SIEM And/Or/Vs/With Security Analytics? • Have to solve security problems that SIEM is sub-optimal for? • Want to apply more algorithms to log, flow and context data? • Have higher volume or diversity of data? • Need to post-process alerts? 18
  • 19. Quick Win: Going Beyond SIEM • User Behavior Analytics (UBA) - “add-on” SIEM brain for user-focused analysis • Detect compromised accounts “automatically” • Enrich alerts with user behavior profiles • Utilize vendor-provided anomaly algorithms 19
  • 20. SIEM Pitfalls • Planning: • Skip the planning stage and just buy some SIEM tool • Fail to define the initial deployment scope • Deployment: • Ignore a phased approach for deployment • Install the tool before a logging policy is clarified • Operation: • Assume that the SIEM would run itself • Lack a program owner
  • 21. Advice Think "security monitoring capability," not "SIEM box." SIEM requires "care and feeding" to give value. Prepare to be involved with the tool indefinitely. Use "output-driven" SIEM approach. Define processes and dedicate personnel to use the tool. Define/Refine and incident response process. Follow the maturity levels — or suffer! Review your route beyond SIEM – UBA, etc