Security information and event management explained

Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications and network hardware.[1] SIEM systems are central to security operations centers (SOCs), where they are employed to detect, investigate, and respond to security incidents.[2] SIEM technology collects and aggregates data from various systems, allowing organizations to meet compliance requirements while safeguarding against threats.

SIEM tools can be implemented as software, hardware, or managed services.[3] SIEM systems log security events and generating reports to meet regulatory frameworks such as the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS). The integration of SIM and SEM within SIEM provides organizations with a centralized approach for monitoring security events and responding to threats in real-time.

First introduced by Gartner analysts Mark Nicolett and Amrit Williams in 2005, the term SIEM has evolved to incorporate advanced features such as threat intelligence and behavioral analytics, which allow SIEM solutions to manage complex cybersecurity threats, including zero-day vulnerabilities and polymorphic malware.

In recent years, SIEM has become increasingly incorporated into national cybersecurity initiatives. For instance, Executive Order 14028 signed in 2021 by U.S. President Joseph Biden mandates the use of SIEM technologies to improve incident detection and reporting in federal systems. Compliance with these mandates is further reinforced by frameworks such as NIST SP 800-92, which outlines best practices for managing computer security logs.[4]

History

Initially, system logging was primarily used for troubleshooting and debugging. However, as operating systems and networks have grown more complex, so has the generation of system logs. The monitoring of system logs has also become increasingly common due to the rise of sophisticated cyberattacks and the need for compliance with regulatory frameworks, which mandate logging security controls within risk management frameworks (RMF).

Starting in the late 1970s, working groups began establishing criteria for managing auditing and monitoring programs, laying the groundwork for modern cybersecurity practices, such as insider threat detection and incident response. A key publication during this period was NIST’s Special Publication 500-19.[5]

In 2005, the term "SIEM" (Security Information and Event Management) was introduced by Gartner analysts Mark Nicolett and Amrit Williams. SIEM systems provide a single interface for gathering security data from information systems and presenting it as actionable intelligence.[6] The National Institute of Standards and Technology provides the following definition of SIEM: "Application that provides the ability to gather security data from information system components and present that data as actionable information via a single interface." In addition, NIST has designed and implemented a federally mandated RMF.

With the implementation of RMFs globally, auditing and monitoring have become central to information assurance and security. Cybersecurity professionals now rely on logging data to perform real-time security functions, driven by governance models that incorporate these processes into analytical tasks. As information assurance matured in the late 1990s and into the 2000s, the need to centralize system logs became apparent. Centralized log management allows for easier oversight and coordination across networked systems.

On May 17, 2021, U.S. President Joseph Biden signed Executive Order 14028, "Improving the Nation's Cybersecurity," which established further logging requirements, including audit logging and endpoint protection, to enhance incident response capabilities.[7] This order was a response to an increase in ransomware attacks targeting critical infrastructure. By reinforcing information assurance controls within RMFs, the order aimed to drive compliance and secure funding for cybersecurity initiatives.

Information assurance

Published in September 2006, the NIST SP 800-92 Guide to Computer Security Log Management serves as a key document within the NIST Risk Management Framework to guide what should be auditable. As indicated by the absence of the term "SIEM", the document was released before the widespread adoption of SIEM technologies.[8] [9] Although the guide is not exhaustive due to rapid changes in technology since its publication, it remains relevant by anticipating industry growth. NIST is not the only source of guidance on regulatory mechanisms for auditing and monitoring, and many organizations are encouraged to adopt SIEM solutions rather than relying solely on host-based checks.

Several regulations and standards reference NIST’s logging guidance, including the Federal Information Security Management Act (FISMA),[10] Gramm-Leach-Bliley Act (GLBA),[11] Health Insurance Portability and Accountability Act (HIPAA),[12] Sarbanes-Oxley Act (SOX) of 2002,[13] Payment Card Industry Data Security Standard (PCI DSS),[14] and ISO 27001.[15] Public and private organizations frequently reference NIST documents in their security policies.

NIST SP 800-53 AU-2 Event Monitoring is a key security control that supports system auditing and ensures continuous monitoring for information assurance and cybersecurity operations. SIEM solutions are typically employed as central tools for these efforts. Federal systems categorized based on their impact on confidentiality, integrity, and availability (CIA) have five specific logging requirements (AU-2 a-e) that must be met.[16] While logging every action is possible, it is generally not recommended due to the volume of logs and the need for actionable security data. AU-2 provides a foundation for organizations to build a logging strategy that aligns with other controls.

NIST SP 800-53 SI-4 System Monitoring outlines the requirements for monitoring systems, including detecting unauthorized access and tracking anomalies, malware, and potential attacks. This security control specifies both the hardware and software requirements for detecting suspicious activities.[17] Similarly, NIST SP 800-53 RA-10 Threat Hunting, added in Revision 5, emphasizes proactive network defense by identifying threats that evade traditional controls. SIEM solutions play a critical role in aggregating security information for threat hunting teams.[18]

Together, AU-2, SI-4, and RA-10 demonstrate how NIST controls integrate into a comprehensive security strategy. These controls, supported by SIEM solutions, help ensure continuous monitoring, risk assessments, and in-depth defense mechanisms across federal and private networks.

Terminology

The acronyms SEM, SIM and SIEM have sometimes been used interchangeably,[19] but generally refer to the different primary focus of products:

In practice many products in this area will have a mix of these functions, so there will often be some overlap – and many commercial vendors also promote their own terminology.[21] Oftentimes commercial vendors provide different combinations of these functionalities which tend to improve SIEM overall. Log management alone doesn't provide real-time insights on network security, SEM on its own won't provide complete data for deep threat analysis. When SEM and log management are combined, more information is available for SIEM to monitor.

A key focus is to monitor and help manage user and service privileges, directory services and other system-configuration changes; as well as providing log auditing and review and incident response.[20]

Capabilities

Components

SIEM architectures may vary by vendor; however, generally, essential components comprise the SIEM engine. The essential components of a SIEM are as follows:[25]

A basic SIEM infrastructure is depicted in the image to the right.

Use cases

Computer security researcher Chris Kubecka identified the following SIEM use cases, presented at the hacking conference 28C3 (Chaos Communication Congress).[30]

Correlation rules examples

SIEM systems can have hundreds and thousands of correlation rules. Some of these are simple, and some are more complex. Once a correlation rule is triggered the system can take appropriate steps to mitigate a cyber attack. Usually, this includes sending a notification to a user and then possibly limiting or even shutting down the system.

Brute Force Detection

Brute force detection is relatively straightforward. Brute forcing relates to continually trying to guess a variable. It most commonly refers to someone trying to constantly guess your password - either manually or with a tool. However, it can refer to trying to guess URLs or important file locations on your system.

An automated brute force is easy to detect as someone trying to enter their password 60 times in a minute is impossible.

Impossible Travel

When a user logs in to a system, generally speaking, it creates a timestamp of the event. Alongside the time, the system may often record other useful information such as the device used, physical location, IP address, incorrect login attempts, etc. The more data is collected the more use can be gathered from it. For impossible travel, the system looks at the current and last login date/time and the difference between the recorded distances. If it deems it's not possible for this to happen, for example traveling hundreds of miles within a minute, then it will set off a warning.

Many employees and users are now using VPN services which may obscure physical location. This should be taken into consideration when setting up such a rule.

Excessive File Copying

The average user does not typically copy or move files on the system repeatedly. Thus, any excessive file copying on a system could be attributed to an attacker wanting to cause harm to an organization. Unfortunately, it's not as simple as stating someone has gained access to your network illegally and wants to steal confidential information. It could also be an employee looking to sell company information, or they could just want to take home some files for the weekend.

DDoS Attack

A DDoS (Distributed Denial of Service) Attack could cause significant damage to a company or organization. A DDoS attack can not only take a website offline, it can also make a system weaker. With suitable correlation rules in place, a SIEM should trigger an alert at the start of the attack so that the company can take the necessary precautionary measures to protect vital systems.

File Integrity Change

File Integrity and Change Monitoring (FIM) is the process of monitoring the files on your system. Unexpected changes in your system files will trigger an alert as it's a likely indication of a cyber attack.

Alerting examples

Some examples of customized rules to alert on event conditions involve user authentication rules, attacks detected and infections detected.[31]

Rule Goal Trigger Event Sources
Repeat Attack-Login Source Early warning for brute force attacks, password guessing, and misconfigured applications. Alert on 3 or more failed logins in 1 minute from a single host. Active Directory, Syslog (Unix Hosts, Switches, Routers, VPN), RADIUS, TACACS, Monitored Applications.
Repeat Attack-Firewall Early warning for scans, worm propagation, etc. Alert on 15 or more Firewall Drop/Reject/Deny Events from a single IP Address in one minute.Firewalls, Routers and Switches.
Repeat Attack-Network Intrusion Prevention System Early warning for scans, worm propagation, etc. Alert on 7 or more IDS Alerts from a single IP Address in one minute Network Intrusion Detection and Prevention Devices
Repeat Attack-Host Intrusion Prevention System Find hosts that may be infected or compromised
(exhibiting infection behaviors)
Alert on 3 or more events from a single IP Address in 10 minutes Host Intrusion Prevention System Alerts
Virus Detection/Removal Alert when a virus, spyware or other malware is detected on a host Alert when a single host sees an identifiable piece of malware Anti-Virus, HIPS, Network/System Behavioral Anomaly Detectors
Virus or Spyware Detected but Failed to Clean Alert when >1 Hour has passed since malware was detected, on a source, with no corresponding virus successfully removed Alert when a single host fails to auto-clean malware within 1 hour of detection Firewall, NIPS, Anti-Virus, HIPS, Failed Login Events

See also

External links

Notes and References

  1. Web site: 2024 . What is SIEM . 25 January 2024 . IBM.
  2. Book: Cinque . Marcello . Challenges and Directions in Security Information and Event Management (SIEM) . Cotroneo . Domenico . Pecchia . Antonio . 2018 . 978-1-5386-9443-5 . 95–99 . 10.1109/ISSREW.2018.00-24 . 2024-02-02.
  3. Web site: 5 February 2007 . SIEM: A Market Snapshot . Dr.Dobb's Journal.
  4. Web site: Johnson. Arnold. Dempsey. Kelley. Ross. Ron. Gupta. Sarbari. Bailey. Dennis. Guide for Security-Focused Configuration Management of Information Systems. National Institute of Standards and Technology. 10 October 2019. 23 January 2024. 10.6028/nist.sp.800-128. 63907907.
  5. Book: Ruthberg . Zella . Audit and evaluation of computer security . McKenzie . Robert . 1 October 1977 . . 10.6028/NBS.SP.500-19 . 23 January 2024.
  6. Web site: Williams . Amrit . 2005-05-02 . Improve IT Security With Vulnerability Management . 2016-04-09 . Security information and event management (SIEM).
  7. Web site: 2021-05-17 . Improving the Nation's Cybersecurity . 2021-07-28 . Federal Register.
  8. Web site: Guide to Computer Security Log Management. Kent. Karen. Souppaya. Murugiah. National Institute of Standards and Technology. 13 September 2006. 24 January 2024. 10.6028/NIST.SP.800-92. 221183642.
  9. Web site: NIST Risk Management Framework. National Institute of Standards and Technology. 7 November 2024. 25 January 2024.
  10. Web site: Computer Security Division. Information Technology Laboratory. 2016-11-30. NIST Risk Management Framework CSRC CSRC. 2021-07-23. CSRC NIST. EN-US.
  11. Web site: 2018-10-05. Understanding the NIST cybersecurity framework. 2021-07-23. Federal Trade Commission. en.
  12. Web site: Rights (OCR). Office for Civil. 2009-11-20. Summary of the HIPAA Security Rule. 2021-07-23. HHS.gov. en.
  13. 2005. Issues in Information Systems. 10.48009/2_iis_2005_124-130. 1529-7314. The Role of Information Security in Sarbanes-Oxley Compliance. free.
  14. Web site: July 2019. Mapping PCI DSS v3_2_1 to the NIST Cybersecurity Framework v1_1.
  15. Web site: 10 December 2020. NIST SP 800-53, Revision 5 Control Mappings to ISO/IEC 27001.
  16. Web site: Risk Management Framework for Information Systems and Organizations. National Institute of Standards and Technology. December 2018. 24 January 2024. 10.6028/nist.sp.800-37r2.
  17. Web site: Computer Security Division. Information Technology Laboratory. 2016-11-30. Release Search - NIST Risk Management Framework CSRC CSRC. 2021-07-19. CSRC NIST. EN-US.
  18. Web site: Security and Privacy Controls for Information Systems and Organizations. National Institute of Standards and Technology. 12 October 2020. 24 January 2024. 10.6028/NIST.SP.800-53r5.
  19. Web site: Swift. David. A Practical Application of SIM/SEM/SIEM, Automating Threat Identification. SANS Institute. 14 May 2014. 3. PDF. 26 December 2006. ...the acronym SIEM will be used generically to refer....
  20. Web site: The difference between SEM, SIM and SIEM. 29 March 2010 . Jamil, Amir.
  21. S. . Bhatt . P.K. . Manadhata . L. . Zomlot . The Operational Role of Security Information and Event Management Systems . IEEE Security & Privacy . 12 . 5 . 35–41 . 2014 . 10.1109/MSP.2014.103 . 16419710 .
  22. http://securityinformationeventmanagement.com/security-event-management.php Correlation
  23. Web site: Compliance Management and Compliance Automation – How and How Efficient, Part 1. accelops.net. https://web.archive.org/web/20110723002943/http://www.accelops.net/blog/?p=149. 2011-07-23. dead. 2018-05-02.
  24. Web site: 2018 Data Breach Investigations Report Verizon Enterprise Solutions. Verizon Enterprise Solutions. en-US. 2018-05-02.
  25. Book: Kotenko. Igor. Polubelova. Olga. Saenko. Igor. 2012 IEEE International Conference on Green Computing and Communications . The Ontological Approach for SIEM Data Repository Implementation . November 2012. https://ieeexplore.ieee.org/document/6468405. Besancon, France. IEEE. 761–766. 10.1109/GreenCom.2012.125. 978-1-4673-5146-1. 18920083.
  26. Book: Kotenko. Igor. Chechulin. Andrey. 2012 IEEE International Conference on Green Computing and Communications . Common Framework for Attack Modeling and Security Evaluation in SIEM Systems . November 2012. https://ieeexplore.ieee.org/document/6468300. 94–101. 10.1109/GreenCom.2012.24. 978-1-4673-5146-1. 15834187.
  27. Web site: Karl-Bridge-Microsoft. Eventlog Key - Win32 apps. 2021-07-18. docs.microsoft.com. en-us.
  28. Book: Kotenko. Igor. Polubelova. Olga. Saenko. Igor. 2012 IEEE International Conference on Green Computing and Communications . The Ontological Approach for SIEM Data Repository Implementation . November 2012. https://ieeexplore.ieee.org/document/6468405. 761–766. 10.1109/GreenCom.2012.125. 978-1-4673-5146-1. 18920083.
  29. Book: Azodi. Amir. Jaeger. David. Cheng. Feng. Meinel. Christoph. 2013 International Conference on Advanced Cloud and Big Data . Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems . December 2013. https://ieeexplore.ieee.org/document/6824575. 69–76. 10.1109/CBD.2013.27. 978-1-4799-3261-0. 1066886.
  30. Web site: 28c3: Security Log Visualization with a Correlation Engine. https://ghostarchive.org/varchive/youtube/20211215/j4pF9VUdphc . 2021-12-15 . live. . December 29, 2011. November 4, 2017.
  31. Web site: Successful SIEM and Log Management Strategies for Audit and Compliance. Swift. David. 2010. SANS Institute.