SlideShare a Scribd company logo
4
Most read
5
Most read
8
Most read
Log Management
Security Incidents & Events Management (SEIM)
Agenda
• What are logs
• Why do we need logs
• Problems & Challenges
• Best Practices
• SIEM
What are Logs
• Historical Record of events that happened.
• Records events and status of systems in a time sequential format.
• Record of activity on the system/network.
• Provide an Audit trail of who done what, where, when and why (5Ws)
Why are Logs Important?
Logs can assist us in
• Determining what happened - AuditTrail
• Intrusion Detection
• Incident Containment
• Forensic Analysis
• Proactive Protection
• RealTime Alerts
• Providing a Network Baseline
• Determining the Health of the
Network
• Troubleshooting issues
• Proactive maintenance
Where to find Logs
• Logs are everywhere
• Operating Systems
• Applications
• Devices
• Routers
• Firewalls
• IDS
• Switches
Log management & SIEM
The Challenges
• Different vendors different log formats.
• Regulatory Requirements.
• Logs were written by developers
• Format is not easy to read
• Messages can be obscure
• Logs contain enormous amount of information.
• Identifying anomalies can be difficult
• Logs can be overwhelming
• Amount
• format
Best Practices
• Develop logging Policy
• Determine what information is relevant to you.
• What devices are important?
• What events are important?
• Don’t forget to turn on logging!
• Timing of events, e.g. user logons in morning.
• What reports you and the business want/need?
• Group servers into zones based on their function or criticality and priorities events accordingly.
Best Practices
• Baseline your systems & network.
• Determine how your network normally behaves.
• Repeat at regular intervals
• Secure log files on all devices.
• Encrypt logs if possible
• Ensure all devices use same time source.
• If using more than one time zone use UTC.
• Use NTP protocol from a secure source to synchronize time
Best Practices
• Centralize log collection
• Dedicated server to collect all logs.
• Be careful of network traffic volumes.
• Be aware of limitations of server to process number of events.
• Configure all devices send logs to central log server.
• Make sure central server is secure.
• Secure transmission of logs.
• e.g. Syslog uses UDP by default. Consider using IPSec or next generation Syslog (Syslog-NG)
Best Practices
• Normalize the data
• All events such asWindows, Syslog, SNMP etc. should be normalized into same format.
• Review the Logs
• Ensure logs are regularly reviewed
• Manually
• Automatically
• Scripts
• CommercialTools
• FreewareTools
Best Practices
• Log Retention
• Based on disk space.
• May be regulatory requirements.
• Archive ontoWORM type devices and store in secure area.
• Log Rotation
• Determine time schedule
• Based on volume of data
• Develop meaningful naming convention.
• Move data to rotated file
SIEM
• Set ofTools,Applications and Correlation searches.
• Built on top of Log Management Solution.
• real-time analysis of security alerts, events and logs
• continuous monitoring of all ongoing events
• Alerts once incident is found
• Helps in showing security posture
• Facilitates discovery of security problems and breaches
• Investigations
• Inbound/outbound suspicious activities
• Event correlation for advanced threats
• DDOS attacks
• Unauthorized remote access
• Critical service monitoring
• Malware monitoring
• IP Reputations
• Risk & Compliance
• SecurityThreats analysis

More Related Content

PDF
The Microsoft Well Architected Framework For Data Analytics
PPTX
Splunk Overview
PPTX
Observability
PPTX
PDF
Observability
PPTX
Observability vs APM vs Monitoring Comparison
PDF
DevSecOps and the CI/CD Pipeline
PDF
Modern vs. Traditional SIEM
The Microsoft Well Architected Framework For Data Analytics
Splunk Overview
Observability
Observability
Observability vs APM vs Monitoring Comparison
DevSecOps and the CI/CD Pipeline
Modern vs. Traditional SIEM

What's hot (20)

PPTX
Monitoring & Observability
PPTX
Microservices Part 3 Service Mesh and Kafka
PDF
Observability; a gentle introduction
PDF
MITRE ATT&CK Framework
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
PDF
Cloud-Native Observability
PDF
CNIT 121: 9 Network Evidence
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PPTX
Hypercare Support Model.pptx
PPTX
Monitoring and observability
PPTX
Kafka Retry and DLQ
PDF
CQRS + Event Sourcing
PDF
Observability at Scale
PPSX
Microservices Architecture - Cloud Native Apps
PDF
2019 DevSecOps Reference Architectures
PPTX
Practical service level objectives with error budgeting
PPTX
Introduction to Distributed Tracing
PPTX
Continuous Delivery
PDF
I Love APIs 2015 : Zero to Thousands TPS Private Cloud Operations Workshop
PPTX
Azure fundamental -Introduction
Monitoring & Observability
Microservices Part 3 Service Mesh and Kafka
Observability; a gentle introduction
MITRE ATT&CK Framework
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Cloud-Native Observability
CNIT 121: 9 Network Evidence
Vulnerability Management: What You Need to Know to Prioritize Risk
Hypercare Support Model.pptx
Monitoring and observability
Kafka Retry and DLQ
CQRS + Event Sourcing
Observability at Scale
Microservices Architecture - Cloud Native Apps
2019 DevSecOps Reference Architectures
Practical service level objectives with error budgeting
Introduction to Distributed Tracing
Continuous Delivery
I Love APIs 2015 : Zero to Thousands TPS Private Cloud Operations Workshop
Azure fundamental -Introduction
Ad

Similar to Log management & SIEM (20)

PPTX
Security Information and Event Management (SIEM)
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
PPTX
Security Information Event Management Security Information Event Management
PPTX
Introduction to SIEM.pptx
PDF
Siem & log management
PDF
PPTX
SIEM Primer:
PPTX
Beginner's Guide to SIEM
PPT
Best practises for log management
PPTX
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
PDF
InfoSecurity.be 2011
PDF
.The Complete Guide to Log and Event Management
PPT
FIRST 2006 Full-day Tutorial on Logs for Incident Response
PPTX
SIEM - Your Complete IT Security Arsenal
PPTX
SIEM (Security Information and Event Management)
PPTX
Making Log Data Useful: SIEM and Log Management Together
PPTX
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
PPTX
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
PDF
Maceo Wattley Contributor Infosec
Security Information and Event Management (SIEM)
UNIT -III SIEM aur baato kaise hai aap log.pdf
Security Information Event Management Security Information Event Management
Introduction to SIEM.pptx
Siem & log management
SIEM Primer:
Beginner's Guide to SIEM
Best practises for log management
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
InfoSecurity.be 2011
.The Complete Guide to Log and Event Management
FIRST 2006 Full-day Tutorial on Logs for Incident Response
SIEM - Your Complete IT Security Arsenal
SIEM (Security Information and Event Management)
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Maceo Wattley Contributor Infosec
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
A Presentation on Touch Screen Technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
August Patch Tuesday
PPTX
Tartificialntelligence_presentation.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Getting Started with Data Integration: FME Form 101
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
1. Introduction to Computer Programming.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Enhancing emotion recognition model for a student engagement use case through...
NewMind AI Weekly Chronicles - August'25-Week II
Programs and apps: productivity, graphics, security and other tools
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative study of natural language inference in Swahili using monolingua...
A novel scalable deep ensemble learning framework for big data classification...
A Presentation on Touch Screen Technology
OMC Textile Division Presentation 2021.pptx
August Patch Tuesday
Tartificialntelligence_presentation.pptx
DP Operators-handbook-extract for the Mautical Institute
Getting Started with Data Integration: FME Form 101
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
1. Introduction to Computer Programming.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Enhancing emotion recognition model for a student engagement use case through...

Log management & SIEM

  • 1. Log Management Security Incidents & Events Management (SEIM)
  • 2. Agenda • What are logs • Why do we need logs • Problems & Challenges • Best Practices • SIEM
  • 3. What are Logs • Historical Record of events that happened. • Records events and status of systems in a time sequential format. • Record of activity on the system/network. • Provide an Audit trail of who done what, where, when and why (5Ws)
  • 4. Why are Logs Important? Logs can assist us in • Determining what happened - AuditTrail • Intrusion Detection • Incident Containment • Forensic Analysis • Proactive Protection • RealTime Alerts • Providing a Network Baseline • Determining the Health of the Network • Troubleshooting issues • Proactive maintenance
  • 5. Where to find Logs • Logs are everywhere • Operating Systems • Applications • Devices • Routers • Firewalls • IDS • Switches
  • 7. The Challenges • Different vendors different log formats. • Regulatory Requirements. • Logs were written by developers • Format is not easy to read • Messages can be obscure • Logs contain enormous amount of information. • Identifying anomalies can be difficult • Logs can be overwhelming • Amount • format
  • 8. Best Practices • Develop logging Policy • Determine what information is relevant to you. • What devices are important? • What events are important? • Don’t forget to turn on logging! • Timing of events, e.g. user logons in morning. • What reports you and the business want/need? • Group servers into zones based on their function or criticality and priorities events accordingly.
  • 9. Best Practices • Baseline your systems & network. • Determine how your network normally behaves. • Repeat at regular intervals • Secure log files on all devices. • Encrypt logs if possible • Ensure all devices use same time source. • If using more than one time zone use UTC. • Use NTP protocol from a secure source to synchronize time
  • 10. Best Practices • Centralize log collection • Dedicated server to collect all logs. • Be careful of network traffic volumes. • Be aware of limitations of server to process number of events. • Configure all devices send logs to central log server. • Make sure central server is secure. • Secure transmission of logs. • e.g. Syslog uses UDP by default. Consider using IPSec or next generation Syslog (Syslog-NG)
  • 11. Best Practices • Normalize the data • All events such asWindows, Syslog, SNMP etc. should be normalized into same format. • Review the Logs • Ensure logs are regularly reviewed • Manually • Automatically • Scripts • CommercialTools • FreewareTools
  • 12. Best Practices • Log Retention • Based on disk space. • May be regulatory requirements. • Archive ontoWORM type devices and store in secure area. • Log Rotation • Determine time schedule • Based on volume of data • Develop meaningful naming convention. • Move data to rotated file
  • 13. SIEM • Set ofTools,Applications and Correlation searches. • Built on top of Log Management Solution. • real-time analysis of security alerts, events and logs • continuous monitoring of all ongoing events • Alerts once incident is found • Helps in showing security posture • Facilitates discovery of security problems and breaches • Investigations
  • 14. • Inbound/outbound suspicious activities • Event correlation for advanced threats • DDOS attacks • Unauthorized remote access • Critical service monitoring • Malware monitoring • IP Reputations • Risk & Compliance • SecurityThreats analysis