Security Incident Event Management
Real time monitoring of Servers, Network Devices.
Correlation of Events
Analysis and reporting of Security Incidents.
Threat Intelligence
Long term storage
5. Problem Statement
• Which events should be gathered ?
• How we manage the vast amount of logs and
information
• What and How should we parse, normalize and
time-correction ?
• How should the events be stored ?
• Identify data breach internal or external
• Mitigate cyber attacks.
• Meet Compliance Requirements.
6. What is SIEM
• Security Incident Event Management
• Real time monitoring of Servers, Network
Devices.
• Correlation of Events
• Analysis and reporting of Security Incidents.
• Threat Intelligence
• Long term storage
7. Evolution
• SIM – System* Information Management
• SEM - Security Event Management
• NBA – Network Based Analysis
• Log Management – Log file capture & Storage
• SIEM - SIM & SEM
10. Work Flow
Collect data
form log
sources
Correlates
Events
Alerts Security
incidents
Generates IT
security &
compliance
reports
Archive Logs
for Forensic
Analysis