The basic foundation of security monitoring, detection and response depends on the detection logic/rules that you have. Once these sets of conditions are met, only then an alert is triggered. The alert is then further investigated by a SOC team based on flagged Indicators of Compromise (IOCs) for suspicious or malicious activity before alerting the Incident Handling team within the organization for remediation.
In this blog, we will review how SIEM alerts are typically generated and ideas to help security teams find what matters before it’s too late.
A good strategy to start with is to identify what devices/assets you would like to integrate with your SIEM. Planning is a crucial step — which many organizations fail to do. This results in their SOC teams just project managing a list of devices to onboard and getting submerged in a flood of Service Requests only to question the ROI of the SIEM and SOC team’s efforts later.
“Failing to plan is planning to fail”
Here are three steps that you can use as a checklist to plan and execute data onboarding -
Once the above steps are completed, ensure you spend a good amount of time (at least 3 to 4 months) to reflect on what use cases are triggered and what optimizations can be done based on trend or type of activities that you see. This is extremely important before deciding to onboard next batch of devices.
It’s important to set aside a good amount of time to:
Here is a blog on how to plan your data ingestion strategy: Understanding Machine Data and it's relevance to security.
Once you have completed Step 1 - the next phase is to implement and execute the content life cycle as mentioned in the following flow diagram:
The idea is to segregate your use case content in 4 stages going forward. While data onboarding for remaining devices can be an ongoing process by your integration team, your content/threat hunting team can focus on the following four stages while using the SIEM:
It is essential to enforce and emphasize the process/framework of the content life cycle discussed above by Organizations. It is imperative for SOC/Security analysts to understand their organization’s unique network architecture so as to customize and derive the best security value unique to their organization without ingesting every IT device that exists. Keep refining and updating the content as per your environment's attack surface.
These are just some techniques/frameworks for security/SOC teams to overcome strategic and planning gaps associated with crafting alerts for data ingested by a SIEM. It’s not always as easy as raising an alert for a use case, instead the analysts must consider the organization’s environmental contexts, concerns and what a suspicious activity might look like.
Vendors that offer managed SIEM services or SIEM products will help you to plan and prioritize IT assets based on their criticality to your business and better leverage automated detection and validation to detect anomalies faster.