SIEM Architecture

25,295 views 19 slides Dec 14, 2015
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

Security Incident Event Management
Real time monitoring of Servers, Network Devices.
Correlation of Events
Analysis and reporting of Security Incidents.
Threat Intelligence
Long term storage


Slide Content

SIEM Architecture
By
Nishanth Kumar Pathi

Nishanth Kumar Pathi
•Information Security Consultant
•null – moderator
•OWASP Contributor

•@nishanthkumarp
•http://nishanth.co.in

Typical Corporate Environment

Defense in Depth

Problem Statement
•Which events should be gathered ?
•How we manage the vast amount of logs and
information
•What and How should we parse, normalize and
time-correction ?
•How should the events be stored ?
•Identify data breach internal or external
•Mitigate cyber attacks.
•Meet Compliance Requirements.

What is SIEM
•Security Incident Event Management
•Real time monitoring of Servers, Network
Devices.
•Correlation of Events
•Analysis and reporting of Security Incidents.
•Threat Intelligence
•Long term storage

Evolution
•SIM – System* Information Management
•SEM - Security Event Management
•NBA – Network Based Analysis
•Log Management – Log file capture & Storage
•SIEM - SIM & SEM

Features of SIEM

What it can collect ?

Work Flow
Collect data
form log
sources
Correlates
Events
Alerts Security
incidents
Generates IT
security &
compliance
reports
Archive Logs
for Forensic
Analysis

SIEM Architecture
12

Dashboard

Implementation

Self Hosted , Self Managed

Cloud Hosted , Self Managed

Hybrid Model , Jointly Managed

Why SIEM Implementation Fails ?
•Lack of Planning
•Faulty Deployment Strategies.
•Operational Knowledge

Any Questions ?

Nishanth Kumar Pathi
•Information Security Consultant
•null – moderator
•OWASP Contributor

•@nishanthkumarp
•http://nishanth.co.in