In the field of computer security, security and event management information ( SIEM ) software and service products combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network applications and hardware.
Vendors sell SIEM as software, as equipment or as managed services; these products are also used to record security data and generate reports for compliance purposes.
Video Security information and event management
Ikhtisar
The acronyms SEM , SIM and SIEM are sometimes used interchangeably. The security management segment associated with real-time monitoring, event correlations, notifications and console views are known as security event management (SEM). The second area provides long-term storage and analysis, manipulation and reporting of log data and security records of the type collected by SEM software, and is known as information security management (SIM). Like many of the meanings and definitions of capabilities, requirements are continually evolving to form a derivative of the SIEM product category. Organizations are switching to large data platforms, such as Apache Hadoop, to complement SIEM capabilities by expanding data storage capacity and analytic flexibility. The need for voice-centric or vSIEM visibility (sound security information and event management) provides a recent example of this evolution.
The term event information security management (SIEM), created by Mark Nicolett and Amrit Williams from Gartner in 2005,
- the product's ability to collect, analyze and present information from network and security devices
- vulnerability management and policy compliance tools
- operating system logs, databases, and apps
- external threat data ââli>
Its main focus is to monitor and help manage user and service privileges, directory services and other system configuration changes; as well as providing an audit and review of incident logs and responses.
Maps Security information and event management
Abilities/components
- Data collection: The management of logs collects data from multiple sources, including networks, security, servers, databases, applications, provides the ability to consolidate monitored data to help avoid key missing events./li>
- Correlation: looks for common attributes, and links shared events into meaningful bundles. This technology provides the ability to perform various correlation techniques to integrate multiple sources, to transform data into useful information. Correlation is usually a function of the Event Security Management section of the full SIEM solution
- Remind: automatic analysis of related events and production alerts, to notify recipients of problems immediately. Reminds to get to the dashboard, or sent over third-party channels like email.
- Dashboard: Tool can capture event data and turn it into an information chart to help in viewing patterns, or identify activities that do not form a standard pattern.
- Compliance: Applications can be used to automate compliance data collection, generate reports that adapt to existing security, governance and audit processes.
- Retention: uses long-term historical data storage to facilitate the correlation of data over time, and to provide necessary retention for compliance requirements. Long-term log data retention is crucial in forensic investigation because it is not possible that the invention of network infringement will occur when the violation occurs.
- Forensic analysis: Ability to search logs at various nodes and time periods based on certain criteria. It reduces the need to gather log information in your head or have to search thousands and thousands of logs.
Use case
Computer security researcher Chris Kubecka identified the following SIEM usage cases, presented at the 28C3 (Chaos Communication Congress) hacking conference.
- SIEM visibility and anomaly detection can help detect zero-day or polymorphic code. Especially because of the low level of anti-virus detection against this rapidly changing type of malware.
- Automatic parsing, normalization and log categorization can occur automatically. Regardless of the type of computer or network device as long as it can send logs.
- Visualizing with SIEM using security events and log failures can help in pattern detection.
- Protocol anomalies that can show configuration errors or security issues can be identified with SIEM using pattern detection, warning, baseline, and dashboard.
- SIEMS can detect secret, malicious, and encrypted communications.
- Cyberwarfare can be detected by SIEM with accuracy, finding attackers and victims.
Reminded examples
David Swift of the SANS Institute writes about monitorable activities and specific rules that can be made for event correlations to trigger warnings under certain conditions from various log sources such as network devices, security devices, servers, and antivirus. Some examples of specific rules to remind on event conditions involve user authentication rules, detected attacks and detected infections. Thresholds can be configured to trigger alerts based on the quantity of events.
pronunciation
The acronym SIEM is alternately pronounced SIM or SEEM .
See also
- IT risk
- Log management
- Event manager security
- Security information management
References
Source of the article : Wikipedia