What is a SIEM?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

43 minutes
Video Transcription
Hello. My name is Dustin and welcome to monitoring network traffic. We're going to be learning what a sim is and how it works of why you need one will also learn about IOC's or indicators of compromise and how you can use a SIM to help hunt for these IOC's and see if you've been breached. Let's get started.
You've probably heard the term sin before, but what is it and how are they used in this section? We're going to discuss exactly that.
So what is a Sim?
Sim stands for security information and event management and combines the functions of both a sim or security information management and sem, or security event management,
Depending on the size of your organization, these can be rather expensive and pretty resource intensive, which often makes him difficult to manage unless you've got a dedicated team member or members.
So why uses him?
Like I said, Simms could be very expensive and difficult to manage. Why would anyone want that?
The Sims are a very important part of the security ecosystem. They're able to take data from a ton of different sources, including network devices like firewalls of routers, active directory servers and point protection software and vulnerability information and collect an aggregate all of that information.
So sure, you could log in to 20 different devices to get that information.
But wouldn't it be easier to have one central place that allows you to view and analyze all that data?
I think of the amount of time that could save, which is extremely valuable in the event of a breach or a malware breakout.
Sims can take all that information, analyze the data and create alerts based on IOC's or indicators of compromise or other behavioral analytics. They also allow you to generate reports with various bits of information that may be necessary for a certain team or division within the organization.
With all of this aggregated dan data, you'll be able to perform advanced threat detection,
so the same process is a relatively simple process.
Step one Collect data from various sources. This can include network devices, servers, domain controllers, vulnerability, scanners, anything you can think of that has valuable information.
Step two normal eyes and aggregate all of the collected information
and what this means is a good SIM has the ability to take all the data from many different sources and put it into something useful. If you've ever tried to go over server logs and compare them to firewall logs at the same time, it can be pretty confusing. They're not in the same four mount, and
maybe one's in UTC once in your actual time zone.
Ah, Sim will actually kind of normal. Eyes that and get it all into one human readable format.
Step three. Analyze the data to detect threats
so a good SIM product will have the ability to analyze data and look for certain information, automating basic threat hunting and alerting. Based on analytics that match certain rule sets. For example, you may be able to use behavior analysis to detect when the user has logged in from a different computer or during a strange time.
So if you've got a bob from accounting, he always works 8 to 5
logs and eight Long's out of five. Then, all of a sudden, he's logging in on a Saturday at 10 o'clock at night.
That might not be normal, so you'd actually get that alert
and step for pinpoint breeches and enable organizations to investigate alerts. So, taking the previous example, you may see an admin user log in after hours, but with your sin, You also see that several net for devices went down just before that.
This could explain why that admin was logging in at an unusual time. But you can't just dismiss it. Of course you want to do a full investigation to verify. But this way you've got all that information in one place.
So how does the same work
at its core? Assume is a data aggregator search and reporting system. It can take massive amounts of data from your network and consolidated into one source, making the data human readable. With this data now accessible by you and your team, you can research security issues with as much a dif
detailed information as possible,
allowing you to make quick and smart decisions about any incident.
Most Simms have a pretty robust rule set built in, and they should allow you to customize or Taylor. These rule sets to fit your environment, tuning out false positives. You can focus on the important events and tuning is really important. In the same. You don't want to get overloaded with a bunch of
kind of useless information, so it's something.
Um, we like to say it takes care and feeding every day. That's why you need that dedicated member, depending on the environment size, of course.
So any modern SIM will have many different capabilities and hear some of the most common and useful
riel time monitoring. So you want to be ableto modern. I'm sorry. Modern threats move extremely fast, and your security team needs to be able to monitor those threats and correlate events in real time so they can respond quickly.
Instant response. In order to respond to incidents effectively, there needs to be an organized way to address potential ist incidents as well as the aftermath of an attack. You want to be ableto limit that damage and reduce the amount of time to recover, which ultimately reduces the cost of a breach. If you're able to get the information,
um, and respond within an hour,
that's a lot. You won't lose much money. It takes you 24 hours to respond, or you have to take the whole network down to try and respond to that breach.
User monitoring. So what's the first thing in attacker will attempt to do once they're in your network
usually gain access to user accounts, so monitoring user activity is critical in order to pinpoint breeches and is often a compliance requirement as well. Depending on the organization,
Ah, good Sim will have, ah, good threat Intelligence good threat until can help your i t. Security team recognize abnormal activity and assess the risk to your organization.
What effects on one company might not affect you at all,
so this will help you prioritize your response capabilities. You're not spending a bunch of time trying to respond to something that may not even affect you.
Advanced Analytics Analytics are the key to get any value of the really insane amount of data your sin will be handling. Machine learning can help automate the analysis to identify threats you may have missed before
advanced threats detection in order to identify or detect the newest threats. It's important to have specialized tools and monitoring
and then last but not least, a use case library. In order to reduce your risk. It's important to understand and respond to threats in real time,
so there's ah ton of popular sins out there. But some of the most popular products include a Splunk along rhythm Ailey involved and IBM skew radar.
Choosing a SIM really depends on your organization's needs and really budget, so it's important to know exactly what you're looking for.
Up Next
Course Assessment - Monitoring Network Traffic with SIEM