Why SIEM Is Irreplaceable in A Secure IT Environment?
Why SIEM Is Irreplaceable in A Secure IT Environment?
Secure IT Environment?
Oskars Podzins Andrejs Romanovs
Dept. of Modelling and Simulation Dept. of Modelling and Simulation
Riga Technical University Riga Technical University
Riga, Latvia Riga, Latvia
[email protected] [email protected]
Abstract—The aim of the publication is to brief on the understanding “Context” is the key. All previously mentioned
importance of a SIEM (Security Information and Event security solutions are great at monitoring activities which goes
Management) solution. Its benefits but also taking time to reflect through these systems, but in most cases to make an educated
on this system drawbacks. All of which is intended for those who decision about what really is happening system needs to know
are looking into cybersecurity solution that will learn from information and activities outside one particular system. This
entire IT infrastructure and be able to identify anomalies, like is where SIEM comes to rescue.
cyberattacks. Depending on the region and market, enterprise
priorities tends to be different, but all mainly take into SIEM is a solution which analyzes events/logs from each
consideration TCO (Total Cost of Ownership), which in SIEM of the security solutions. For example, a traffic flow of a
case is a key metric. If company/organization is serious about specific IP address might not mean a lot to the firewall (if this
deploying a SIEM, then another key security technology they IP has not been listed in global threat exchange databases), but
should think about is SOC. If deployed correctly than SOC a SIEM could combine this flow with the fact that Active
(Security Operations Centre) is a full framework of Directory Domain Controller security logs indicate this IP was
technologies, people and processes to act like a well-oiled
used to brute force a password for several accounts. Using this
machine that identifies, protects, detects, responds and recovers
from all security related incidents.
information SIEM could launch an automated remediation
action of sending an instruction to Firewall trough API to
Keywords—cyber security, network security, security block connections from this specific IP address. Best of all this
management, computer security, SIEM, Log analysis, SOC, and other defensive actions can be automated which gives a
incidents management company 24/7 reactive security solution which learns from
entire IT environment and using context performs high
I. INTRODUCTION probability remediation actions. Using this method is also the
Over the past several years data has become the most best way to detect Zero-day attacks.
valuable resource in the world. This has aided growing interest In most cases attackers must find a way to avoid being
from individual cybercriminals, APTs, Hacktivists and nation- detected by security controls while performing «Intrusion»
state actors to steal, modify, destroy information or even cause phase of a cyberattack. But if a company does not have a
physical damage as it was in case of Stuxnet [1] and Black SIEM solution in place then most likely they won’t be able
energy [2]. detect and stop attacker performing «Lateral movement» or
Verizon - 2018 Data Breach Investigations Report [3] «Privilege escalation» activities at all. Which leads to very
shows that 68% of all identified cyberattacks are discovered long detection time or no detection at all. Monitoring only
month or more after the initial breach. If we take into account entry points or only central servers are not enough anymore.
that there are high percentage of cyberattacks that are Even Starwood hotel and later Marriot (second largest
successful and goes undetected, then final percentage would Hotel chain) was not able to detect breach for 4 years [4].
be much higher. This very well quantifies how secure our data Which shows how difficult sometimes it is to detect and react
is. Taken this information we should strive to improve to cyberattacks.
cyberattack detection capabilities.
This confirms that companies urgently need to deploy and
One of the main issues in identifying cyberattacks is that optimize SIEM solutions. The right way, because most SIEM
IT infrastructure tends to be extremely vast. Typical company solutions are poorly optimized with limited improvements
has hundreds or thousands of interconnected devices, overtime.
hundreds of software fragments which uses countless If a company already has a working SIEM solution with
technologies (most running different versions). All of which security analysts investigating alerts, then organically
is configured and supported by frequently rotating IT staff company already has some form of SOC. If that’s the case,
with different experiences and approaches to fixing problems. then second question is how effective they are in investigating
Combine all of this in one IT environment and in most cases, incidents? How often does SIEM identifies False-Positives?
this will result in almost endless possibilities of How many incidents can one data analyst investigate per day?
vulnerabilities. 5? 15? Chances are that number is between 5-15. Only high
New attack vectors and vulnerabilities are discovered on efficiency SOCs with high automation level will be able to go
an hourly basis. Firewalls, intrusion detection system, beyond 25+ incidents a day. Companies should aim for a
intrusion prevention system, Distributed Denial of Service SIEM that analyzing hundred million log files will identify 2-
protection solutions and other security solutions look for 3 actionable alerts with context. SIEM without any
malicious activity at various points within the IT optimization will identity north of 1000 alerts [5].
infrastructure, from the perimeter to endpoints. However, Considering previously stated amount of investigations
many of these solutions are not effective or even capable of that an average SOC analyst will be able to perform it is clear
detecting zero-day attacks. Because for a SIEM solution that a company with 100 million log files per day will require