{"id":13381,"date":"2020-05-13T14:47:56","date_gmt":"2020-05-13T14:47:56","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=13381"},"modified":"2020-05-13T14:51:32","modified_gmt":"2020-05-13T14:51:32","slug":"what-is-siem-and-why-is-it-so-important","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/what-is-siem-and-why-is-it-so-important\/","title":{"rendered":"What is SIEM and Why is it so Important?"},"content":{"rendered":"\n<p><strong>SIEM stands for Security Information and Event Management (SIEM).<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>SIEM solutions provide a holistic view of what is happening on a network in real-time and help IT teams to be more proactive in the fight against security threats.<\/p><\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/why-siem-tools.png\" alt=\"\" class=\"wp-image-13460\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>Security information and event management (SIEM) is an approach that offers observability over an organization\u2019s information security. By combining SIM (security information management) and SEM (security event management), it aims to aggregate log data across users, machines, and servers for real-time event log monitoring and correlations to find security threats and mitigate risks in real-time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Notable Acronyms and Parts of SIEM<\/h2>\n\n\n\n<p>The acronyms SEM, SIM and SIEM have sometimes been used interchangeably, but generally refer to the different primary focus of products:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Log management: Focus on simple collection and storage of log messages and audit trails<\/li><li>Security information management (SIM): Long-term storage as well as analysis and reporting of log data.<\/li><li>Security event manager (SEM): Real-time monitoring, correlation of events, notifications and console views.<\/li><li>Security information and event management (SIEM): Combines SIM and SEM and provides real-time analysis of security alerts generated by network hardware and applications.<\/li><li>Managed Security Service: (MSS) or Managed Security Service Provider: (MSSP): The most common managed services appear to evolve around connectivity and bandwidth, network monitoring, security, virtualization, and disaster recovery.<\/li><li>Security as a service (SECaaS): These security services often include authentication, anti-virus, anti-malware\/spyware, intrusion detection, Penetration testing and security event management, among others.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What is SIEM?<\/h2>\n\n\n\n<p>A key challenge in the realm of computer security is that cyber attacks are continually evolving as well as the race to prevent them. It is impossible to automate all security systems in advance of attacks and remove human involvement in security analysis retroactively.<\/p>\n\n\n\n<p>SIEM is evolving in system security that incorporates all of the above mentioned technologies: Log Management Systems, Security Event Management, Security Information Management and Security Event Correlation. As these various security components became increasingly integrated and merged over the years, SIEM emerged as the generalized industry term for managing information generated from combined security infrastructure and controls.<\/p>\n\n\n\n<p>There is also a movement from traditional on-premise SIEM solutions as organizations infrastructure and applications moved to the cloud and multi-cloud.<\/p>\n\n\n\n<p>SIEM technology has been in existence for more than a decade, initially evolving from the log management discipline. It combined security event management (SEM) \u2013 which analyzes log and event data in real time to provide threat monitoring, event correlation and incident response \u2013 with security information management (SIM) which collects, analyzes and reports on log data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who is SIEM for?<\/h2>\n\n\n\n<p>One could get very lost in the weeds with all these security acronyms so it might be helpful to focus on who SIEM is for.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Security Team \u2013 Primarily SIEM solutions primary users are the security personnel in your organization that gives them all the information, alerts and automation necessary to be two steps ahead of online threats.<\/li><li>Operations Team \u2013 SRE, DevOps and your operations team also benefit from SIEM tools to get the company operations back online and back to business as usual. They need access to logs, events, security incidents to figure out the root cause and resolve issues as quickly as possible.<\/li><li>Compliance Team \u2013 The handling of data has a growing number of rules from industry and government regulation (GDPR, HIPAA, PCI to name a few)<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">SIEM Components<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/siem-components-1-1024x775.jpg\" alt=\"\" class=\"wp-image-13451\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/siem-components-architecture-1024x576.png\" alt=\"\" class=\"wp-image-13452\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/siem-workflow-diagram.jpg\" alt=\"\" class=\"wp-image-13457\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Logs Remain a Key SIEM Pillar<\/h2>\n\n\n\n<p>Logs are intrinsic to effective SIEM, particularly the mapping of a company\u2019s business processes and infrastructure to those logs. And the more types of logs from as many sources as possible that a company can feed its SIEM system, the more actionable insights are generated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How SIEM works?<\/h2>\n\n\n\n<p>SIEM software collects and aggregates log data generated throughout the organization\u2019s technology infrastructure, from host systems and applications to network and security devices such as firewalls and antivirus filters.<\/p>\n\n\n\n<p>The software then identifies and categorizes incidents and events, as well as analyzes them. The software delivers on two main objectives, which are to provide reports on security-related incidents and events, such as successful and failed logins, malware activity and other possible malicious activities and send alerts if analysis shows that an activity runs against predetermined rulesets and thus indicates a potential security issue.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SIEM in the enterprise<\/h2>\n\n\n\n<p>SIEM software captures only a small portion of the total dollars spent on enterprise security worldwide, according to Gartner. Gartner estimates global spending on enterprise security at nearly $98.4 billion for 2017, with SIEM software garnering about $2.4 billion. Gartner predicts spending on SIEM technology will rise modestly, to nearly $2.6 billion in 2018 and $3.4 billion in 2021.<\/p>\n\n\n\n<p>SIEM software is mostly used by large organizations and public companies, where compliance to regulations remains a strong factor in the use of this technology, according to analysts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">List of Popular SIEM tools<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Splunk &#8211; Splunk is a full on-prem SIEM solution that Gartner rates as a leader in the space. Splunk supports security monitoring and can provide advanced threat detection capabilities. Varonis integrates with Splunk through the Varonis DatAlert App for Splunk.<\/li><li>IBM QRadar &#8211; QRadar is another popular SIEM that you can deploy as a hardware appliance, a virtual appliance, or a software appliance, depending on your organization\u2019s needs and capacity. QRadar can integrate with Varonis to add Advanced Threat Detection capabilities. Look for the Varonis App for QRadar<\/li><li>LogRhythm &#8211; LogRhythm is a good SIEM for smaller organizations. You can integrate LogRhythm with Varonis to get threat detection and response capabilities.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/siem-top-10-tools-siem.jpg\" alt=\"\" class=\"wp-image-13454\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">SIEM Tools Predictions<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/seim-tools-predictions-in-2020-1.jpg\" alt=\"\" class=\"wp-image-13441\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/Top-10-Open-Source-SIEM-Tools.png\" alt=\"\" class=\"wp-image-13461\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">SIEM Process and Flow<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/how-siem-works.png\" alt=\"\" class=\"wp-image-13436\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/Security-Information-Event-Management-SIEM-Process.jpg\" alt=\"\" class=\"wp-image-13438\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What Can a SIEM Help With and SIEM Capabilities?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/SIEM-Capabilities-1-1024x490.jpg\" alt=\"\" class=\"wp-image-13459\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What are SIEMs Used For?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/SIEM-using-1.jpg\" alt=\"\" class=\"wp-image-13455\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/SIEM-using-2.jpg\" alt=\"\" class=\"wp-image-13456\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Criteria and requirement of SIEM<\/h2>\n\n\n\n<p>Enterprise security teams must use a security information and event management (SIEM) solution<br>that not only solves common security use cases, but advanced use cases as well. To keep up with the dynamic threat landscape, modern SIEMs are expected to be able to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Centralize and aggregate all security-relevant events as they\u2019re generated from their source<\/li><li>Support a variety of reception, collection mechanisms including syslog, file transmissions, file collections, etc.<\/li><li>Add context and threat intelligence to security events<\/li><li>Correlate and alert across a range of data<\/li><li>Detect advanced and unknown threats<\/li><li>Profile behavior across the organization<\/li><li>Ingest all data (users, applications) and make them available for use \u2014 monitoring, alerting, investigation and ad hoc searching<\/li><li>Provide ad hoc searching and reporting from data for advanced breach analysis<\/li><li>Investigate incidents and conduct forensic investigations for detailed incident analysis<\/li><li>Assess and report on compliance posture<\/li><li>Use analytics and report on security posture<\/li><li>Track attackers\u2019 actions with streamlined ad hoc analyses and event sequencing<\/li><li>Centrally automate retrieval, sharing and responses across the security stack<\/li><li>Assess threats from the cloud, on-premises and hybrid apps and data sources<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Alerting examples<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/siem-alerts-example-1024x403.jpg\" alt=\"\" class=\"wp-image-13447\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Steps to Implement SIEM in Enterprise<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/8-Steps-to-implement-migrate-to-siem.jpg\" alt=\"\" class=\"wp-image-13437\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">SIEM Best Practices<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2020\/05\/SIEM-Best-Practices.jpg\" alt=\"\" class=\"wp-image-13449\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\"  id=\"_ytid_18387\"  width=\"760\" height=\"427\"  data-origwidth=\"760\" data-origheight=\"427\" src=\"https:\/\/www.youtube.com\/embed\/fXBnjhpDXPE?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;disablekb=0&#038;\" class=\"__youtube_prefs__  epyt-is-override  no-lazyload\" title=\"YouTube player\"  allow=\"fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Reference<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>https:\/\/www.exabeam.com\/siem-guide\/what-is-siem\/<\/li><li>https:\/\/en.wikipedia.org\/wiki\/Security_information_and_event_management<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>SIEM stands for Security Information and Event Management (SIEM). SIEM solutions provide a holistic view of what is happening on a network in real-time and help IT teams to be&#8230; <\/p>\n","protected":false},"author":1,"featured_media":13390,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[6083],"tags":[],"class_list":["post-13381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devsecops"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/13381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=13381"}],"version-history":[{"count":1,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/13381\/revisions"}],"predecessor-version":[{"id":13382,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/13381\/revisions\/13382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media\/13390"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=13381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=13381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=13381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}