{"id":493,"date":"2022-12-15T14:00:10","date_gmt":"2022-12-15T14:00:10","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2022\/12\/15\/advancing-an-organizations-siem-ieee-computer-society\/"},"modified":"2022-12-15T14:00:10","modified_gmt":"2022-12-15T14:00:10","slug":"advancing-an-organizations-siem-ieee-computer-society","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2022\/12\/15\/advancing-an-organizations-siem-ieee-computer-society\/","title":{"rendered":"Advancing an Organization\u2019s SIEM | IEEE Computer Society"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-318436 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/12\/13170911\/Stratgies-to-deploy-SIEM.jpg\" alt=\"\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/12\/13170911\/Stratgies-to-deploy-SIEM.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/12\/13170911\/Stratgies-to-deploy-SIEM-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/12\/13170911\/Stratgies-to-deploy-SIEM-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>One of the most valuable tools security professionals use is Security Information and Event Management (SIEM), which combines event management with security information management to provide real-time monitoring, analysis, tracking, and logging of security data. SIEM systems help guard against modern-day cybersecurity threats while observing data logs and incident data to achieve overall security compliance. Many organizations, however, lack an effective SIEM deployment strategy that allows them to maximize the benefits of SIEM. Given the number of available use cases as well as the volume and complexity of SIEM operating variables, it\u2019s likely organizations will remain vulnerable and generally unsatisfied with their SIEM deployments. While it\u2019s tempting to compensate for this by building out a SIEM strategy that attempts to accomplish multiple security use cases, the unfortunate reality is IT teams simply cannot accomplish every organizational goal\u2014even when their SIEM is being maximized. Typically, it is more effective to consider a targeted approach to use cases that provide the best tactical advantages over one\u2019s adversaries, thereby taking a more strategic approach to achieving the overall security mission of an organization.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Explaining SIEM<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">According to Gartner, SIEM is \u201ca technology that supports threat detection and security incident response through the real-time collection and historical analysis of security events from a wide variety of event and contextual data sources.\u201d SIEM programs are sold, marketed, and advertised as tools that can do anything and everything to enhance security. The truth is SIEM is not just a repository where data can be sent without a specific agenda being attributed. Therein lies the true challenge many face with SIEM\u2014most industry professionals don\u2019t know what to do with their collected data or how to consume it for security purposes once it\u2019s collected in SIEM. While it\u2019s true that SIEM can ingest large amounts of data, it is dependent on a deployment strategy, as with any security platform. Uncovering some associated complexity with how to conduct an appropriate rollout can be achieved by building a list of use cases that need to be solved. Based on the use cases selected, the deployment approach can be determined and a roadmap for adoption and data ingestion can be built. For example, if a use case is \u201calerting on multiple failed login attempts,\u201d data would need to be ingested from Windows Event Logs.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Identifying SIEM strategies<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Frequently, defining use cases is an area of confusion for those who acquired a SIEM tool and are seeking the most appropriate way to initiate deployment. Specificity is an important component to establish SIEM use cases that will address an organization\u2019s most pressing security needs. Does the organization want to monitor user behaviors? Does it want to conduct surveillance for insider threats? Is the organization planning to conduct external security threat-hunting by looking at external attacks and then using that data to learn if there is any presence of that threat background within the organization? Based on developed use cases, data sources can be utilized to ingest logs, enabling use cases within the organization\u2019s environment. For example, if the use case is employee online behavior monitoring, a plan will need to be devised about how to ingest login and logout activity. That data related to user activity must be captured and logged centrally into the SIEM monitoring tool. If the use case is based on threat intelligence, it will be necessary to ingest data from firewalls, network devices, and other threat-intelligence feeds.<\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to <i>ComputingEdge<\/i> Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Often, today\u2019s organizations are in a position of trying to recover from failed deployment attempts. To do so, it\u2019s important to define what is important to the business so that use cases can be prioritized and implemented. Consider the following potential areas of need:<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em; list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\n<li><i>Real-time security monitoring and analysis<\/i>. To detect and respond to threats in real-time, gather data from all user devices, applications, and identities across platforms. Monitor a diverse set of data sources and then build detection rules on the dataset to enable real-time visualization and ongoing threat activity.<\/li>\n<li><i>Cloud security.<\/i> Digital initiatives and all modern applications in this \u201cpost-pandemic world\u201d are cloud-native. Securing data in the cloud has become an organizational responsibility that is important to detecting and responding to threats across multiple in-house, hybrid, and remote environments, including remote multi-cloud environments.<\/li>\n<li><i>Enhanced incident response capabilities.<\/i> Incident response workflows can be built and customized around a SIEM tool as the center of security operations. It makes sense to leverage these SIEM capabilities, such as event aggregation, context-based alerting, threat fidelity for triaging, and integration with third-party systems including ticketing, automation systems, and collaboration tools to the fullest extent. These capabilities within any modern SIEM will enhance the security team\u2019s capability to respond to incidents.<\/li>\n<li><i>Leveraging threat intelligence.<\/i> When considering indicators of compromise (IOC) data, industry frameworks such as MITRE ATT&amp;CK\u00ae can serve as critical support for simplifying the process of detecting abnormal behaviors. With threat intelligence being consumed, the security team will have access to the information necessary to scope the attack by assessing risks and weighing the impact of those risks.<\/li>\n<li><i>Leveraging forensics and threat hunting.<\/i> This is a must-have strategy. According to a 2021 report by the International Data Corporation, a growing number of cyber alerts resulting from potential or actual cyber threats and breaches has caused a cycle of \u201calert fatigue\u201d that results in increased costs for many organizations when staff members become numb to various cybersecurity alerts. This also can lead to longer response times to critical alerts or missed alerts altogether, as well as unnecessary stress and burnout among IT departments. Low-value alerts can be eliminated by correlating data that maps to events against a kill chain or adversary tactics. Applying context awareness or risk attributions can help hunt threats, reduce alert volumes, increase the fidelity of alerts, and free up time while uncovering more sophisticated threats.<\/li>\n<li><i>Insider threat detection and other advanced threats.<\/i> While most SIEMs include content for detecting well-known threats, continuous adaptation is needed to manage unknown or advanced threats, such as insider threats, zero-day attacks, laterally moving malware, compromised accounts, and high application programming interface calls. It is important that SIEM deployments mature over time, evolve, and adapt while utilizing machine learning, artificial intelligence, endpoint detection, and behavioral analytics to detect modern threats.<\/li>\n<li><i>Compliance measures.<\/i> SIEM tools are designed with the intent of consuming data across the entire security and technology stack. This can serve other teams, including privacy, fraud, and risk management that require different views and processes around the same data to guarantee compliance. An important SIEM strategy should help unify the three pillars of compliance\u2014processes, technology, and people\u2014and provide better visibility across the board.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">SIEM challenges and misconceptions<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Some SIEM challenges are real and some are perceived. Real challenges include a lack of budget to acquire SIEM, a lack of staff to manage SIEM, and a lack of processes and\/or an established framework to address deployment and network complexity. Perceived challenges include polar-opposite fallacies such as SIEM is \u201cjust another way of conducting log management\u201d or that SIEM \u201ccan solve every security challenge.\u201d It\u2019s true that log management is a central function of SIEM, but this is just one feature. If the organization\u2019s requirement is to store log data, aggregate logs, and perform log management, then the cost to acquire the SIEM is difficult to justify. That said, the notion that SIEM is \u201ctoo expensive\u201d or \u201ctoo complex\u201d is also unfounded. Uncovering some of the complexity that challenges many organizations can be achieved by refining use cases as a means to developing a roadmap for adoption and data ingestion.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">The growing importance of SIEM<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">At its core, SIEM represents a cycle of an organization\u2019s continuous improvement. Security operation centers should invest in SIEM software to streamline visibility across their organization\u2019s environments, investigate log data for incident response to cyberattacks and data breaches, and adhere to local and federal compliance mandates. Examples of effective frameworks that can be adopted to assist in the deployment and maintenance of SIEM include those devised by the National Institutes of Standards and Technology, Center for Internet Security, MITRE ATT&amp;CK\u00ae, and Lockheed Martin. Available data sources to consider when building a security monitoring program include endpoint security, application security, and cloud security. Whether investing in SIEM for the first time or attempting to recover from a failed SIEM deployment, organizations can begin the SIEM process by building use cases into the business context and developing a data onboarding system. From there, they can generate effective security strategies.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">About the Writer<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Jayant Kripalani is a cybersecurity professional with 20 years\u2019 experience working for global security companies such as Splunk, Cisco, Rapid7, and Wipro. He holds a bachelor\u2019s degree in Computer Engineering in addition to multiple industry certifications. He has worked extensively with SOC teams and currently specializes in cybersecurity strategy and consulting. For further information, contact: kripalani.jayant@gmail.com.<\/p>\n<p>\u00a0<\/p>\n<div style=\"background-color: #d4f1f4; padding: 15px 15px 10px 15px;\">\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong>Disclaimer:<\/strong> The author is completely responsible for the content of this article. The opinions expressed are their own and do not represent IEEE\u2019s position nor that of the Computer Society nor its Leadership.<\/p>\n<\/div><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/advancing-an-organizations-siem\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] One of the most valuable tools security professionals use is Security Information and Event Management (SIEM), which combines event&hellip;<\/p>\n","protected":false},"author":1,"featured_media":494,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[456,19,457,2],"tags":[],"class_list":["post-493","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance","category-security","category-siem","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=493"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/493\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/494"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}