SlideShare a Scribd company logo
1 of 16
S.Periyakaruppan
 Introduction
 Types  of SIEM
 SIEM Vs SEM Vs SIM
 Life Cycle
 High level architecture
 Low level design
 Key Requirements
 Security Log analysis
 Security Log monitoring
 NIST Guidelines
SIEM ??  Security Information and event management (Refers the process of
  centralized security log management with analysis, reporting and alerting function)

Security Information  An event or a record related to security devices or an event
  belongs to security of the IT systems or devices

Security event  A occurrence or activity in the system related to security
Introduction - contd
Why SIEM ???

To improve log analysis

To support Incident analysis

To improve incident response

To support forensic investigations

To support regulatory compliance

To support internal process adherence and audit requirements
Introduction - contd
Why Log Management is important ???

To generate logs for what is worth

To support operation maintenance & Troubleshooting

To transmit filtered logs in a secured fashion

To what and how long logs should be stored  Log retention

To store logs for appropriate, in a secured fashion

To ensure relevant security metrics as triggered appropriate logs

To enhance the threat discovery
SIEM vs SIM vs SEM
 SIM,SIEM &SEM are often interchange for its meaning…..

 Are they same ?????
SEM  real-time monitoring and event management to support IT security operations.
SEM requires several capabilities  event and data collection, aggregation and
correlation in near real time; a dynamic monitoring/security event console for viewing
and managing events; and automated response generation for security events.
SIM  historical analysis and reporting for security event data. This requires event and
data collection/correlation (but not in real time), an indexed repository for log data and
flexible query and reporting capabilities.

SIEM = SIM+SEM
SIEM




           Agent based               Plug and
            collection                 Play



Special software need to          End system can be
collect logs                       pushed logs to SIEM or
Collection/Filtering/Aggreg       SIEM can pull logs from log
ation/Normalization                sources
happened in agent                  Collection/Filtering/Aggreg
Implementation challenges         ation/Normalization
due to different agents            happened in SIEM 
required to process different      Performance impact
formats                            Near or Near real time
Near or Near real time            logs
logs
SIEM&LM – Life-cycle
                              Notify


         Identify                                React




      Analyze
                                                   Monitor




                    Collect            Trigger
Key Requirements - SIEM
User interface
Log Sources



                                                                               Ticketing
                       Log Collection   Data Process   Analysis                 system


            LOG
          Collection
               s
                                                                            E-mail system

                                        Data
                                        Managemen
                        Universal       t              Data Analysis
                        device          Log            Intelligent event
                        support         storage/Thi    and payload
                        Agent           rd party       inspection             Console
                        collection      storage        Co-relation and
                        Log             Normalizati    Alerting
                        Consolidati     on             Base-line and
                        on/Compre       Other          Reporting engine
                        ssion           Analytics      Normalization
                                                       Other Analytics




                                                                                  SOC
Log Sources
                                              Log
Attack                                     Collection
                     Log Source
                             Agent           Collection              Analysis

                                                        Context              E-mail
                                        Data             Info
                                       Process                              Console

          Filterin      Normalizati   Aggregati      Correlatio   Alert     Ticketing
              g            on            on              n                   system
                                                                  Repor
                                                                    t


                                                                  Storage
Log Analysis  Studying log entries to identify events of interest or
suppress log entries for insignificant events.
                            Correlation structure

                         Vulnerability
                         database &        Historical events
    Event correlation                                            Alerts/reports
                        Security policy    and observations
                          correlation
                                                                    SMTP
                                                                    SNMP
                                               Behavior              XML
                                               Analysis           Proprietar
                          Message                                     y
                          Analysis
                                              Statistical
    Baseline of                                Analysis
   multiple events

                          Structural         Functional
                           Analysis           Analysis
Critical Success factors - Security                                      Log Analysis

        Observe  Study the logs to filter unwanted noises and to
        understand the very nature of the system



             Brainstorm / Mining  Mining the logs leads to understand
             beyond the level of good or bad. Read the logs to know the
             behavior of the system in various situation


                   Understand the insight  The objective of the log trigger
                   may or may not be achieve its worthiness so we need to
                   understand the insight of the logs



                        Classify  Once you understand the insight you would be
                        able to classify the logs



                              Prioritize  The prioritization takes vital part of detection as
                              you might be miss a log due to poor prioritization
Security Log Monitoring - Approach
                         •Compliance
  Map Requirements       •Regulatory requirements


                         •Scenario of the event
   Declare Use case      •Appropriate reaction

                         • Appropriate criteria to understand the reality or the
    Match Criteria        degree of the occurrence


                         •Based on pre-defined procedure or incident nature
    Declare Priority

                         •Alert the operations team to take action
         Notify

                         •The logs should be monitored for recurrence
  Post Incident review

                         •Closure should be captured in KB for future reference
        Closure
Critical Success factors - Security   Log Monitoring
NIST Guidelines  Security Log management

To establish and maintain successful log management infrastructures,
an organization should perform significant planning and other preparatory
actions for performing log management.

This is important for creating consistent, reliable, and efficient log management
practices that meet the organization’s needs and requirements and also
provide additional value



SECURITY IS PROCESS NOT PRODUCT !!!!!!!!!!!
http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92

More Related Content

What's hot

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 

What's hot (20)

Siem ppt
Siem pptSiem ppt
Siem ppt
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 
SIEM
SIEMSIEM
SIEM
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 

Similar to Security Information and Event Managemen

13 monitor-analyse-system
13 monitor-analyse-system13 monitor-analyse-system
13 monitor-analyse-system
sanganiraju
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Deepak Mishra
 
Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
karthikvcyber
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
Arrow ECS UK
 
6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services
GaryYoung
 

Similar to Security Information and Event Managemen (20)

High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerHigh Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log Manager
 
13 monitor-analyse-system
13 monitor-analyse-system13 monitor-analyse-system
13 monitor-analyse-system
 
Stratum Global RFID
Stratum Global RFIDStratum Global RFID
Stratum Global RFID
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
 
Intellica evam summary
Intellica evam summaryIntellica evam summary
Intellica evam summary
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
1556 a 09
1556 a 091556 a 09
1556 a 09
 
Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
 
Combining logs, metrics, and traces for unified observability
Combining logs, metrics, and traces for unified observabilityCombining logs, metrics, and traces for unified observability
Combining logs, metrics, and traces for unified observability
 
What's New in EventLog Analyzer - Log Management Software
What's New in EventLog Analyzer - Log Management SoftwareWhat's New in EventLog Analyzer - Log Management Software
What's New in EventLog Analyzer - Log Management Software
 
.The Complete Guide to Log and Event Management
.The Complete Guide to Log and Event Management.The Complete Guide to Log and Event Management
.The Complete Guide to Log and Event Management
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Semantic Complex Event Processing at Sem Tech 2010
Semantic Complex Event Processing at Sem Tech 2010Semantic Complex Event Processing at Sem Tech 2010
Semantic Complex Event Processing at Sem Tech 2010
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
ArcSight Basics.ppt
ArcSight Basics.pptArcSight Basics.ppt
ArcSight Basics.ppt
 
Fault Management System (OSS)
Fault Management System (OSS)Fault Management System (OSS)
Fault Management System (OSS)
 
6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services
 
Introduction to Allmon (0.1.0) - a generic performance and availability monit...
Introduction to Allmon (0.1.0) - a generic performance and availability monit...Introduction to Allmon (0.1.0) - a generic performance and availability monit...
Introduction to Allmon (0.1.0) - a generic performance and availability monit...
 

More from S Periyakaruppan CISM,ISO31000,C-EH,ITILF (7)

E payment security – pci dss
E payment security – pci dssE payment security – pci dss
E payment security – pci dss
 
Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01
 
NIST 800 30 revision Sep 2012
NIST 800 30 revision  Sep 2012NIST 800 30 revision  Sep 2012
NIST 800 30 revision Sep 2012
 
Software compliance
Software complianceSoftware compliance
Software compliance
 
Software compliance
Software complianceSoftware compliance
Software compliance
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
 
Information technology Vs Information security
Information technology Vs Information securityInformation technology Vs Information security
Information technology Vs Information security
 

Recently uploaded

Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
amitlee9823
 
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
amitlee9823
 
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
nirzagarg
 
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
amitlee9823
 
How to Build a Simple Shopify Website
How to Build a Simple Shopify WebsiteHow to Build a Simple Shopify Website
How to Build a Simple Shopify Website
mark11275
 
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
gajnagarg
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
eeanqy
 
ab-initio-training basics and architecture
ab-initio-training basics and architectureab-initio-training basics and architecture
ab-initio-training basics and architecture
saipriyacoool
 

Recently uploaded (20)

Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
 
Hingoli ❤CALL GIRL 8617370543 ❤CALL GIRLS IN Hingoli ESCORT SERVICE❤CALL GIRL
Hingoli ❤CALL GIRL 8617370543 ❤CALL GIRLS IN Hingoli ESCORT SERVICE❤CALL GIRLHingoli ❤CALL GIRL 8617370543 ❤CALL GIRLS IN Hingoli ESCORT SERVICE❤CALL GIRL
Hingoli ❤CALL GIRL 8617370543 ❤CALL GIRLS IN Hingoli ESCORT SERVICE❤CALL GIRL
 
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
RT Nagar Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bang...
 
Sweety Planet Packaging Design Process Book.pptx
Sweety Planet Packaging Design Process Book.pptxSweety Planet Packaging Design Process Book.pptx
Sweety Planet Packaging Design Process Book.pptx
 
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
 
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
Whitefield Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Ba...
 
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
How to Build a Simple Shopify Website
How to Build a Simple Shopify WebsiteHow to Build a Simple Shopify Website
How to Build a Simple Shopify Website
 
Call Girls Jalgaon Just Call 8617370543Top Class Call Girl Service Available
Call Girls Jalgaon Just Call 8617370543Top Class Call Girl Service AvailableCall Girls Jalgaon Just Call 8617370543Top Class Call Girl Service Available
Call Girls Jalgaon Just Call 8617370543Top Class Call Girl Service Available
 
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
❤Personal Whatsapp Number 8617697112 Samba Call Girls 💦✅.
 
High Profile Escorts Nerul WhatsApp +91-9930687706, Best Service
High Profile Escorts Nerul WhatsApp +91-9930687706, Best ServiceHigh Profile Escorts Nerul WhatsApp +91-9930687706, Best Service
High Profile Escorts Nerul WhatsApp +91-9930687706, Best Service
 
Sector 104, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 104, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 104, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 104, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
Just Call Vip call girls dharamshala Escorts ☎️9352988975 Two shot with one g...
 
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
 
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
 
ab-initio-training basics and architecture
ab-initio-training basics and architectureab-initio-training basics and architecture
ab-initio-training basics and architecture
 
WhatsApp Chat: 📞 8617697112 Call Girl Baran is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Baran is experiencedWhatsApp Chat: 📞 8617697112 Call Girl Baran is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Baran is experienced
 

Security Information and Event Managemen

  • 2.  Introduction  Types of SIEM  SIEM Vs SEM Vs SIM  Life Cycle  High level architecture  Low level design  Key Requirements  Security Log analysis  Security Log monitoring  NIST Guidelines
  • 3. SIEM ??  Security Information and event management (Refers the process of centralized security log management with analysis, reporting and alerting function) Security Information  An event or a record related to security devices or an event belongs to security of the IT systems or devices Security event  A occurrence or activity in the system related to security
  • 4. Introduction - contd Why SIEM ??? To improve log analysis To support Incident analysis To improve incident response To support forensic investigations To support regulatory compliance To support internal process adherence and audit requirements
  • 5. Introduction - contd Why Log Management is important ??? To generate logs for what is worth To support operation maintenance & Troubleshooting To transmit filtered logs in a secured fashion To what and how long logs should be stored  Log retention To store logs for appropriate, in a secured fashion To ensure relevant security metrics as triggered appropriate logs To enhance the threat discovery
  • 6. SIEM vs SIM vs SEM SIM,SIEM &SEM are often interchange for its meaning….. Are they same ????? SEM  real-time monitoring and event management to support IT security operations. SEM requires several capabilities  event and data collection, aggregation and correlation in near real time; a dynamic monitoring/security event console for viewing and managing events; and automated response generation for security events. SIM  historical analysis and reporting for security event data. This requires event and data collection/correlation (but not in real time), an indexed repository for log data and flexible query and reporting capabilities. SIEM = SIM+SEM
  • 7. SIEM Agent based Plug and collection Play Special software need to End system can be collect logs pushed logs to SIEM or Collection/Filtering/Aggreg SIEM can pull logs from log ation/Normalization sources happened in agent Collection/Filtering/Aggreg Implementation challenges ation/Normalization due to different agents happened in SIEM  required to process different Performance impact formats Near or Near real time Near or Near real time logs logs
  • 8. SIEM&LM – Life-cycle Notify Identify React Analyze Monitor Collect Trigger
  • 10. User interface Log Sources Ticketing Log Collection Data Process Analysis system LOG Collection s E-mail system Data Managemen Universal t Data Analysis device Log Intelligent event support storage/Thi and payload Agent rd party inspection Console collection storage Co-relation and Log Normalizati Alerting Consolidati on Base-line and on/Compre Other Reporting engine ssion Analytics Normalization Other Analytics SOC
  • 11. Log Sources Log Attack Collection Log Source Agent Collection Analysis Context E-mail Data Info Process Console Filterin Normalizati Aggregati Correlatio Alert Ticketing g on on n system Repor t Storage
  • 12. Log Analysis  Studying log entries to identify events of interest or suppress log entries for insignificant events. Correlation structure Vulnerability database & Historical events Event correlation Alerts/reports Security policy and observations correlation SMTP SNMP Behavior XML Analysis Proprietar Message y Analysis Statistical Baseline of Analysis multiple events Structural Functional Analysis Analysis
  • 13. Critical Success factors - Security Log Analysis Observe  Study the logs to filter unwanted noises and to understand the very nature of the system Brainstorm / Mining  Mining the logs leads to understand beyond the level of good or bad. Read the logs to know the behavior of the system in various situation Understand the insight  The objective of the log trigger may or may not be achieve its worthiness so we need to understand the insight of the logs Classify  Once you understand the insight you would be able to classify the logs Prioritize  The prioritization takes vital part of detection as you might be miss a log due to poor prioritization
  • 14. Security Log Monitoring - Approach •Compliance Map Requirements •Regulatory requirements •Scenario of the event Declare Use case •Appropriate reaction • Appropriate criteria to understand the reality or the Match Criteria degree of the occurrence •Based on pre-defined procedure or incident nature Declare Priority •Alert the operations team to take action Notify •The logs should be monitored for recurrence Post Incident review •Closure should be captured in KB for future reference Closure
  • 15. Critical Success factors - Security Log Monitoring
  • 16. NIST Guidelines  Security Log management To establish and maintain successful log management infrastructures, an organization should perform significant planning and other preparatory actions for performing log management. This is important for creating consistent, reliable, and efficient log management practices that meet the organization’s needs and requirements and also provide additional value SECURITY IS PROCESS NOT PRODUCT !!!!!!!!!!! http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92