Lec 08
Lec 08
Security Analytics in
• Responsible for SEM (Security Event Management), log analysis, and reporting.
• SEM Functions:
The Need
and alert-triggering incidents, thereby boosting network security.
• Incident Management:
• With numerous devices and applications generating extensive log data,
for SIEM
identifying malicious incidents becomes challenging.
• SIEM employs various techniques to detect and manage alert-triggering
incidents, improving network efficiency.
• Forensics:
• SIEM aids in forensic investigations by analyzing past records to identify
the source of an attack.
• Upon detecting similar incidents, SIEM alerts intrusion detection systems
and firewalls to reconfigure rules and mitigate ongoing attacks.
• Automatic defensive measures help prevent malicious attacks without
requiring human intervention and support regulatory compliance efforts.
SIEM Capabilities
SIEM Architecture
and Its Components
• Data: Various devices and applications in an organization generate
logs by default, including network devices, security tools, servers,
and applications.
• Collectors/Agents/Connectors: receive event information generated
by devices in the network and normalize it.
• Central Engine: performs data correlation and log analysis.
o Data correlation matches normalized log data to determine
related events based on predefined rules.
o Log analysis identifies patterns and anomalies indicating
intrusion attempts or policy violations.
o Central engine also handles reporting, monitoring, and
alerting administrators through email, ticketing systems, or
preferred methods.
• Database: Logs are stored in central repositories or databases based
on retention policies.
SIEM Solutions
If SIEM is implemented in an organization or a company without the
involvement of external sources, then it is known as in-house SIEM.
In this kind of SIEMs, the organization has to buy and install the required
Solutions: I
Advantages
• It provides full control over the system.
• It can update the rules whenever the user prefers.
Disadvantages
• It is expensive to set up and operate.
• It takes time to train the staff and make them understand the working of SIEM.
• It is hard to provide all of the necessary tools.
The cloud-based SIEM is the kind in which a third-party vendor supplies the
required features of the SIEM, and the organization has nothing to be
involved with.
SIEM In this kind of SIEM, the organization has to subscribe for a plan which will
exist for a particular amount of time with specific features.
Solutions: Advantages
Cloud- •
•
The SIEM platform is updated constantly.
Operational support is provided when needed.
Based
• This provides a lot of features like unlimited data storage.
• No further installation of the hardware equipment is needed.
Disadvantages
This SIEM includes all the technology features that are required for do-it-yourself
implementation as well as to satisfy security objectives.
SIEM
Managed SIEM can be equipped with necessary elements which help the
organization to get a particular task done.
Solutions:
Advantages
• It removes the load of hiring, training, and keeping special personnel as it comes with advanced
technology and skilled peoples.
Managed
• It costs less when compared to other kinds of SIEMs.
• Implementation cost and maintenance cost are included, and no additional costs are required.
• This takes less space compared to the in-house mechanism. o It provides continuous compliance
support and data security assistance.
Disadvantages
• As a third party manages data security, if the company selected by is wrong, then there is a chance of
more risks or unwanted hassles.
• As a SIEM system is introduced with raw data, the chance of getting false positives will be increased.
Analyzing a false positive will consume the same amount of time for analyzing as a real incident.
IEM Solutions: Micro-Focus ArcSight Enterprise
Security Manager
SIEM Solutions: Splunk Enterprise Security (ES)
SIEM Solutions: IBM Security QRadar
SIEM
Deployment
Cost Considerations:
• SIEM implementation involves various costs including licensing, installation,
optimization, management, renewal, and staff training.
• Expansion of SIEM deployment can incur high costs for the organization.
False Positives:
Challenges
• Prioritizing false-positive incidents can consume significant time for analysis, similar to
real incidents.
in SIEM • Unavailability of trained personnel can pose challenges even with a fully equipped
SIEM, leading to wasted resources until suitable professionals are recruited.
Deployment • Configuring all data sources at once can complicate the work of monitoring and
analyzing teams, necessitating phased integration and tuning to reduce system noise.
Deployment Architecture:
• Selecting an appropriate SIEM deployment architecture is crucial, as a misconfigured
rule-based process can lead to the loss of relevant data and hinder incident detection.
Advantages
Security:
SIEM Scope • Security-driven SIEM involves continuous real-time monitoring and log analysis.
• Log data includes various information such as syslog events, user IDs, system
activities, access attempts, etc.
• Analysis aims to identify suspicious activities or indicators of compromise with
minimal human interaction.
Operations:
• Operations-driven SIEM focuses on device management, maintenance, and
troubleshooting.
• Various network devices and applications produce logs, making analysis and
monitoring challenging.
• Relevant logs need to be surfaced while irrelevant data is ignored.
Definition of Use Cases:
• Use cases are actions such as rules, reports, alerts, or dashboards
that fulfill specific needs or requirements.
• They are the goals behind SIEM implementation for successful
integration into the IT infrastructure.
Scope Development: •Us e ca ses a re developed based on the scope of SIEM i mplementation, focusing on compliance, security, a nd operational needs.
Understanding the network environment is crucial for use case development.
Monitoring Requirements: •Moni toring requirements are determined based on the IT i nfrastructure that needs to be monitored and protected. This i ncludes ensuring
the s ecurity of data such as credit card and personal details tra nsmitted through websites and ecommerce s ections.
Event Sources Mapping: •Ma pping of secured i nformation in monitoring requirements to SIEM use cases is performed. Each task i n the monitoring requirements is
l i sted a ccording to SIEM use cases.
Event Validation: •Event s ources identified a re validated a gainst monitoring requirements. Event va lidation a dds an additional l ayer of security to data
tra ns mitted over postback requests, especially i n web a pplications.
Use Case Logic: •Us e ca se logic involves defining conditions or rules for alerts to detect s pecific a ttack vectors. Constructing l ogic for use cases provi des
deta iled data on specific actions a nd enhances detection ca pabilities.
Use Case Response: •Defi nes actions to be ta ken to contain, eradicate, a nd mi tigate incidents. This includes incident handling and response s teps based on the
fi nal report generated from s tudying the data collected by the SIEM.
Requirements state what is required
for the successful execution of the
Requirements use case.
Contextual
Includes information about new and
User Context: departed employees within the
organization, sourced from HR systems.
Data Context: Derived from data loss prevention tools and other software
managing organizational data.
Requirements Application
Context:
Derived from network applications and dynamic/static
application security testing tools.
Implementing
amount of log data they produce influence architecture selection.
• Log Collection Mechanisms: Different mechanisms exist for log collection,
and selecting the appropriate method is crucial.
a Suitable
• Use Case Implementation: A specific set of use cases must be
implemented to manage, analyze, and secure logs effectively.
• Network Topology: Proper arrangement of devices in the network is
Deployment
essential for efficient log collection. Network topology determines the
placement of security devices like firewalls for effective detection and
prevention of unauthorized access.
Type of Collector:
• Select the appropriate log collector type based on the
requirements for customized or all-encompassing log data
collection.
Handling Varying Log Source Volumes:
• Tailor SIEM implementation to handle log data volumes specific
to the organization's size and device count for optimal
effectiveness.
Storage Distribution:
• Decide whether to distribute log storage across different
Technical locations, considering factors like organizational structure and
preference.
Recommendation Network Architecture Constraints:
• Implement SIEM based on network topology, adhering to any
necessary architecture constraints.