π οΈ What is SIEM?
SIEM is a platform that collects, aggregates, and analyzes security data from across an organizationβs digital environment.
π Core Functions of a SIEM:
- Log Aggregation: Collects logs from firewalls, servers, applications, and endpoints.
- Event Correlation: Connects related events across multiple sources.
- Alerting: Triggers alerts when suspicious patterns are detected.
- Visualization: Offers dashboards for monitoring and investigation.
- Forensics Support: Helps during incident investigations.
π Common SIEM Tools
Tool | Description |
---|---|
π· Splunk | Enterprise-grade SIEM with powerful analytics and ML. |
βοΈ ELK Stack | Open-source suite (Elasticsearch, Logstash, Kibana). |
π§ IBM QRadar | Used by large enterprises; strong correlation engine. |
π§° Graylog | Lightweight and user-friendly; perfect for learning. |
Each of these platforms helps SOC Analysts turn raw log data into actionable insights.
π What is Log Analysis?
Log Analysis is the process of reviewing system-generated log entries to detect anomalies, attacks, or errors. Itβs a critical part of incident detection and response.
ποΈ Typical Log Sources:
- π Firewall Logs
- 𧱠IDS/IPS Logs
- π» Windows Event Logs
- π§ Linux Syslogs
- π Web Server Logs (e.g., Apache, Nginx)
- π₯ Authentication & Login Logs
π§βπ» How SOC Analysts Use SIEM for Log Analysis
SOC Analysts interact with SIEM platforms to:
- π Monitor systems in real-time
- π Search logs using queries (e.g., Splunk SPL, Kibana KQL)
- 𧩠Correlate events to find attack patterns
- π§ͺ Investigate incidents with supporting evidence
- π§ Improve detection rules based on findings
π§ͺ Sample Query (Splunk)
index=windows sourcetype=WinEventLog:Security EventCode=4625
| stats count by Account_Name, host, _time
| where count > 5
π This Splunk SPL query finds failed login attempts (EventCode 4625) grouped by user and host, flagging accounts with more than 5 failures β a common sign of brute-force attacks.
β Summary β SIEM provides the intelligence. β Logs provide the evidence. β You, the SOC Analyst, provide the expertise.
Mastering SIEM and log analysis is a foundational skill for any SOC Analyst. By understanding whatβs happening across your systems, you can detect threats faster, respond more effectively, and protect your organization from cyber attacks.
π Whatβs Next? In the next article, weβll explore real-world log examples and show how to investigate potential attacks using SIEM tools.
Stay tuned, blue teamer! π§’π‘οΈ