SlideShare a Scribd company logo
Legacy SIEM to Splunk,
How to Conquer Migration
and Not Die Trying
Kai Seidenschnur | Staff Sales Engineer
During the course of this presentation, we may make forward-looking statements regarding future events or
the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC.
The forward-looking statements made in this presentation are being made as of the time and date of its live
presentation. If reviewed after its live presentation, this presentation may not contain current or accurate
information. We do not assume any obligation to update any forward looking statements we may make. In
addition, any information about our roadmap outlines our general product direction and is subject to change
at any time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in
the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. ©2018 Splunk Inc. All rights reserved.
Forward-Looking Statements
© 2018 SPLUNK INC.
How the Hell Did
We Get Here?
I’m done.
I’m replacing this SIEM!
▶ Splunk’s a great product, why not
▶ Other worthwhile reasons:
• Limited security data type
• Inability to effectively ingest data
• Slow investigations
• Instability and scalability
• End-of-life or uncertain roadmap
• Closed ecosystem
• Limited to on-premises
Most Common Reasons for Replacement
Introductions
and Agenda
Who Are These Guys, Anyway?
1
Agenda
What Will We Be Talking About Today?
You Got This
Things you can do today, to get
“ready” for a SIEM replacement
SIEM Replacement
Methodology
Splunk PS best practices
Use Cases
These drive migrations
DataSources &
Data Onboarding
Parsers / connectors / TAs
Architecture
Measure twice, cut once
Third Party Integrations
Smart? Great! But do you play
well with others?
SIEM Migration
Methodology
Splunk Professional Services (PS) Best Practices –
Based on Real World Experience
2
SIEM replacements to Splunk Enterprise Security can be complex, but if the
following things are taken into account, you won’t lose your job | shirt over it:
▶ Use cases matter:
• Audit & prioritize use cases
• Planned response ... do something!
▶ Know your data / datasources
• Identify datasources & owners
• Audit datasources
• Identify enrichment requirements
▶ Current / future state integrations
▶ Research & preparation is key
▶ Assets & identities
▶ Partner with Splunk + PS
Things You Should Know About Legacy SIEM
Replacement and Splunk PS Best Practices
Use Cases
These Drive Replacements…Use Cases, Use Cases, USE CASES!
3
▶ Document describing a single
detection activity.
• What is the condition to detect?
• What is the event data required?
• What enrichment is required to scope
down events?
• What enrichment will reduce noise
(false positives)?
• Point to the response plan
• What are your current use cases?
• Which ones provide value?
• Which ones don’t?
What Is a Use Case?
Spiral
Analysis
Planning
Evaluation
Development
Waterfall
Prototyping
Determine Objectives Test Implement
Requirements
Design
Implementation
Verification
Maintenance
DEVE
LOP
DEMONSTRATE
REFI
NE
▶ Document describing a single
response activity
• For a response what event data is required
to triage
• What actions should be taken
• Escalation communication and do we need
to order pizza
• Can we reduce the cost of pizza by
providing better data for response
decisions?
What Is a Response Plan?
▶ The first step in embarking on a SIEM replacement initiative is
• Identifying and prioritizing high value use cases, response plans and compliance reports:
• Splunk PS has a 1-2 week SIEM replacement workshop where we come
in and help customers:
− Identify and develop high-fidelity use cases slated for migration/development
− Datasources and enrichment identified via use case prioritization process
− Plan the solution architecture
• We typically see a 30-60% reduction in use cases selected for migration generally due to:
− Old and/or stale rules
− Housekeeping rules no longer needed
− Rule consolidation due to advanced Splunk Query Language
So no, you don’t have to migrate ALL your old funky rules!
Putting the Horse Before the Cart…
▶ Next step in embarking on a SIEM replacement initiative is
• Quantifying the # of use case/compliance reports to be migrated and developed
in the new Splunk ES environment - 1yr, 3yrs, 5yrs planning:
− 1 search/report = compute resource utilized
• Quantifying the # of concurrent users who will be using the SIEM on a daily basis:
− Generally based on SIEM usage:
− Security Operations Center (SOC)
− Security Engineering Team
− Security Officer(s)
− Audit Team
• Assets & identities–can’t do without it; how will you collect from your environment?
How Use Cases Affect SIEM Replacements
Datasources & Data
Onboarding
Parsers / Connectors / TAs (Technology Add-ons)
4
▶ Use case analysis determines in-scope datasources
▶ Why you don’t need to migrate your historical data from Legacy SIEM
▶ Data Source Onboarding via:
How Do You Migrate Datasources to Splunk?
• Universal Forwarder (UF)
Deployed alongside existing
parsers/connectors
• UF deployed on syslog
aggregator to read and ship
logs into Splunk
• Modern HTTP Event
Collection
• Database Tables (DBX)
• Much more.
• Never forget Splunk Stream
• Fields from raw data
• Data Normalization
• Splunkbase
- splunkbase.splunk.com
- Easy Button: Custom Tas via
“Splunk Add-on Builder” App
Splunk Log Forwarding: Syslog Aggregation TAs (Technology Add-ons)
ES Architecture
Measure Twice, Cut Once
5
▶ Plan for modern data collection,
deprecate legacy log collection
infrastructure and stop accepting log
loss today
▶ Plan for disaster recovery and
availability
▶ Plan to remediate logging policies and
source configuration
Plan the Architecture
Now that we know what we want to do, how will we execute it?
© 2018 SPLUNK INC.
Components >
• Collection layer (connectors /
parsers vs. UF's / HF's )
• Parsing layer (technology add-ons)
• Storage layer (indexers)
• Presentation layer (search head +
Enterprise Security App)
• Security analytics (Splunk App for
Enterprise Security)
• Management layer (deployment
server, cluster master, license
server, deployer)
Data source will determine what
components are needed—your
network determines where they
should be
Splunk
Architecture
Third Party
Integrations
Smart? Great! But Do You Play Well with Others?
5
© 2018 SPLUNK INC.
But Do You Play Well
With Others?
Smart? Great!
We Support Integration with most
third-party systems:
▶ Case management / ticketing
systems
• (ServiceNow, Remedy, etc)
▶ Threat intelligence feeds
• (STIX, TAXII, Internal, etc)
▶ Database integration
• (Oracle, MySQL, etc)
▶ Microsoft Active Directory
▶ REST API support
▶ Custom code
▶ Others
Third-Party Integrations
Identify Current/Future State Third-Party Integration Points
You Got This!
Things You Can Do Today, to Get Prepared
for Your SIEM Replacement
5
▶ Identify/audit and prioritize use cases
for migrations
▶ Identify/audit and prioritize datasources
for migration
▶ Identify datasource owners
▶ Research Splunk Technology Add-ons for
datasource at splunkbase.splunk.com
▶ Assets & identities: identify CMDB sources
▶ Third-party integrations
▶ Develop logging standards
Replacement Checklist:
What Do “You” Do Next?
▶ We've successfully completed
countless hair-pulling SIEM
replacements before. You're in good
hands–partner with us!
▶ Get on the fast track and contact
your Splunk Sales Rep. today to
learn more about PS' SIEM & use
case development programs
▶ You're in luck—we're here to help
you today: We have a breakout room
X dedicated for you to talk to us
about your SIEM replacement
Making machine data
accessible, usable and
valuable to everyone.
© 2018 SPLUNK INC.
Don't forget to rate this session in the
SplunkLive! mobile app
Thank You
https://ponypoll.com/frankfurt

More Related Content

PPTX
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
PPTX
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
PPTX
SplunkLive! Frankfurt 2018 - Predictive, Proactive, and Collaborative ML with...
PPTX
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
PPTX
SplunkLive! Frankfurt 2018 - Getting Hands On with Splunk Enterprise
PPTX
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
PPTX
SplunkLive! Frankfurt 2018 - Integrating Metrics & Logs
PPTX
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Frankfurt 2018 - Monitoring the End User Experience with Splunk
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Predictive, Proactive, and Collaborative ML with...
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Getting Hands On with Splunk Enterprise
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Frankfurt 2018 - Integrating Metrics & Logs
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...

What's hot (20)

PPTX
SplunkLive! Munich 2018: Data Onboarding Overview
PDF
SplunkLive! Frankfurt 2018 - Customer Presentation: Bosch Cyber Defense Center
PPTX
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
SplunkLive! Munich 2018: Getting Started with Splunk Enterprise
PPTX
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
SplunkLive! Frankfurt 2018 - Use Splunk for Incident Response, Orchestration ...
PPTX
SplunkLive! Munich 2018: Predictive, Proactive, and Collaborative ML with IT ...
PPTX
SplunkLive! Munich 2018: Integrating Metrics and Logs
PPTX
SplunkLive! Munich 2018: Intro to Security Analytics Methods
PPTX
SplunkLive! Paris 2018: Event Management Is Dead
PPTX
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
PPTX
SplunkLive! Zurich 2018: Event Analytics
PDF
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migrati...
PPTX
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
PDF
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
PPTX
SplunkLive! Munich 2018: Monitoring the End-User Experience with Splunk
PPTX
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
PPTX
SplunkLive! Munich 2018: Get More From Your Machine Data Splunk & AI
PPTX
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
PPTX
SplunkLive! Zurich 2018: Integrating Metrics and Logs
SplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Customer Presentation: Bosch Cyber Defense Center
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Munich 2018: Getting Started with Splunk Enterprise
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Frankfurt 2018 - Use Splunk for Incident Response, Orchestration ...
SplunkLive! Munich 2018: Predictive, Proactive, and Collaborative ML with IT ...
SplunkLive! Munich 2018: Integrating Metrics and Logs
SplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Event Management Is Dead
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Event Analytics
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migrati...
SplunkLive! Zurich 2018: Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
SplunkLive! Munich 2018: Monitoring the End-User Experience with Splunk
SplunkLive! Zurich 2018: Monitoring the End User Experience with Splunk
SplunkLive! Munich 2018: Get More From Your Machine Data Splunk & AI
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Zurich 2018: Integrating Metrics and Logs
Ad

Similar to SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying (20)

PPTX
SplunkLive! Paris 2018: Legacy SIEM to Splunk
PPTX
PPT-Splunk-LegacySIEM-101_FINAL
PDF
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
PDF
Splunk-Presentation
PPTX
Travis Perkins at Gartner Risk and Security Management Summit Europe
PPTX
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
PPTX
Make Your SOC Work Smarter, Not Harder
PPTX
SplunkLive! - Splunk for Security
PPTX
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
PPTX
Customer Presentation - Financial Services Organization
PPTX
Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Exploring Frameworks of Splunk Enterprise Security
PPTX
Splunk for Security Breakout Session
PPTX
Learn how to use an Analytics-Driven SIEM for your Security Operations
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
PPTX
Splunk User Group Edinburgh - November Event
PPTX
SplunkLive! Atlanta Customer Presentation – Intercontinental Exchange
PPTX
Customer Presentation with a Healthcare Company
PPTX
SplunkLive! Customer Presentation – HCA
SplunkLive! Paris 2018: Legacy SIEM to Splunk
PPT-Splunk-LegacySIEM-101_FINAL
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
Splunk-Presentation
Travis Perkins at Gartner Risk and Security Management Summit Europe
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Make Your SOC Work Smarter, Not Harder
SplunkLive! - Splunk for Security
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Customer Presentation - Financial Services Organization
Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Exploring Frameworks of Splunk Enterprise Security
Splunk for Security Breakout Session
Learn how to use an Analytics-Driven SIEM for your Security Operations
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk User Group Edinburgh - November Event
SplunkLive! Atlanta Customer Presentation – Intercontinental Exchange
Customer Presentation with a Healthcare Company
SplunkLive! Customer Presentation – HCA
Ad

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
A Presentation on Artificial Intelligence
PDF
KodekX | Application Modernization Development
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying

  • 1. Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying Kai Seidenschnur | Staff Sales Engineer
  • 2. During the course of this presentation, we may make forward-looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described or to include any such feature or functionality in a future release. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. ©2018 Splunk Inc. All rights reserved. Forward-Looking Statements
  • 3. © 2018 SPLUNK INC. How the Hell Did We Get Here? I’m done. I’m replacing this SIEM!
  • 4. ▶ Splunk’s a great product, why not ▶ Other worthwhile reasons: • Limited security data type • Inability to effectively ingest data • Slow investigations • Instability and scalability • End-of-life or uncertain roadmap • Closed ecosystem • Limited to on-premises Most Common Reasons for Replacement
  • 5. Introductions and Agenda Who Are These Guys, Anyway? 1
  • 6. Agenda What Will We Be Talking About Today? You Got This Things you can do today, to get “ready” for a SIEM replacement SIEM Replacement Methodology Splunk PS best practices Use Cases These drive migrations DataSources & Data Onboarding Parsers / connectors / TAs Architecture Measure twice, cut once Third Party Integrations Smart? Great! But do you play well with others?
  • 7. SIEM Migration Methodology Splunk Professional Services (PS) Best Practices – Based on Real World Experience 2
  • 8. SIEM replacements to Splunk Enterprise Security can be complex, but if the following things are taken into account, you won’t lose your job | shirt over it: ▶ Use cases matter: • Audit & prioritize use cases • Planned response ... do something! ▶ Know your data / datasources • Identify datasources & owners • Audit datasources • Identify enrichment requirements ▶ Current / future state integrations ▶ Research & preparation is key ▶ Assets & identities ▶ Partner with Splunk + PS Things You Should Know About Legacy SIEM Replacement and Splunk PS Best Practices
  • 9. Use Cases These Drive Replacements…Use Cases, Use Cases, USE CASES! 3
  • 10. ▶ Document describing a single detection activity. • What is the condition to detect? • What is the event data required? • What enrichment is required to scope down events? • What enrichment will reduce noise (false positives)? • Point to the response plan • What are your current use cases? • Which ones provide value? • Which ones don’t? What Is a Use Case? Spiral Analysis Planning Evaluation Development Waterfall Prototyping Determine Objectives Test Implement Requirements Design Implementation Verification Maintenance DEVE LOP DEMONSTRATE REFI NE
  • 11. ▶ Document describing a single response activity • For a response what event data is required to triage • What actions should be taken • Escalation communication and do we need to order pizza • Can we reduce the cost of pizza by providing better data for response decisions? What Is a Response Plan?
  • 12. ▶ The first step in embarking on a SIEM replacement initiative is • Identifying and prioritizing high value use cases, response plans and compliance reports: • Splunk PS has a 1-2 week SIEM replacement workshop where we come in and help customers: − Identify and develop high-fidelity use cases slated for migration/development − Datasources and enrichment identified via use case prioritization process − Plan the solution architecture • We typically see a 30-60% reduction in use cases selected for migration generally due to: − Old and/or stale rules − Housekeeping rules no longer needed − Rule consolidation due to advanced Splunk Query Language So no, you don’t have to migrate ALL your old funky rules! Putting the Horse Before the Cart…
  • 13. ▶ Next step in embarking on a SIEM replacement initiative is • Quantifying the # of use case/compliance reports to be migrated and developed in the new Splunk ES environment - 1yr, 3yrs, 5yrs planning: − 1 search/report = compute resource utilized • Quantifying the # of concurrent users who will be using the SIEM on a daily basis: − Generally based on SIEM usage: − Security Operations Center (SOC) − Security Engineering Team − Security Officer(s) − Audit Team • Assets & identities–can’t do without it; how will you collect from your environment? How Use Cases Affect SIEM Replacements
  • 14. Datasources & Data Onboarding Parsers / Connectors / TAs (Technology Add-ons) 4
  • 15. ▶ Use case analysis determines in-scope datasources ▶ Why you don’t need to migrate your historical data from Legacy SIEM ▶ Data Source Onboarding via: How Do You Migrate Datasources to Splunk? • Universal Forwarder (UF) Deployed alongside existing parsers/connectors • UF deployed on syslog aggregator to read and ship logs into Splunk • Modern HTTP Event Collection • Database Tables (DBX) • Much more. • Never forget Splunk Stream • Fields from raw data • Data Normalization • Splunkbase - splunkbase.splunk.com - Easy Button: Custom Tas via “Splunk Add-on Builder” App Splunk Log Forwarding: Syslog Aggregation TAs (Technology Add-ons)
  • 17. ▶ Plan for modern data collection, deprecate legacy log collection infrastructure and stop accepting log loss today ▶ Plan for disaster recovery and availability ▶ Plan to remediate logging policies and source configuration Plan the Architecture Now that we know what we want to do, how will we execute it?
  • 18. © 2018 SPLUNK INC. Components > • Collection layer (connectors / parsers vs. UF's / HF's ) • Parsing layer (technology add-ons) • Storage layer (indexers) • Presentation layer (search head + Enterprise Security App) • Security analytics (Splunk App for Enterprise Security) • Management layer (deployment server, cluster master, license server, deployer) Data source will determine what components are needed—your network determines where they should be Splunk Architecture
  • 19. Third Party Integrations Smart? Great! But Do You Play Well with Others? 5
  • 20. © 2018 SPLUNK INC. But Do You Play Well With Others? Smart? Great!
  • 21. We Support Integration with most third-party systems: ▶ Case management / ticketing systems • (ServiceNow, Remedy, etc) ▶ Threat intelligence feeds • (STIX, TAXII, Internal, etc) ▶ Database integration • (Oracle, MySQL, etc) ▶ Microsoft Active Directory ▶ REST API support ▶ Custom code ▶ Others Third-Party Integrations Identify Current/Future State Third-Party Integration Points
  • 22. You Got This! Things You Can Do Today, to Get Prepared for Your SIEM Replacement 5
  • 23. ▶ Identify/audit and prioritize use cases for migrations ▶ Identify/audit and prioritize datasources for migration ▶ Identify datasource owners ▶ Research Splunk Technology Add-ons for datasource at splunkbase.splunk.com ▶ Assets & identities: identify CMDB sources ▶ Third-party integrations ▶ Develop logging standards Replacement Checklist:
  • 24. What Do “You” Do Next?
  • 25. ▶ We've successfully completed countless hair-pulling SIEM replacements before. You're in good hands–partner with us! ▶ Get on the fast track and contact your Splunk Sales Rep. today to learn more about PS' SIEM & use case development programs ▶ You're in luck—we're here to help you today: We have a breakout room X dedicated for you to talk to us about your SIEM replacement
  • 26. Making machine data accessible, usable and valuable to everyone.
  • 27. © 2018 SPLUNK INC. Don't forget to rate this session in the SplunkLive! mobile app Thank You https://ponypoll.com/frankfurt