Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

SIEM Basics — Security Information and Event Management

20. 04. 2024 1 min read beginner

SIEM aggregates logs from the entire infrastructure, correlates events, and detects security incidents.

How SIEM works

  1. Log collection from all sources
  2. Normalization and parsing
  3. Event correlation
  4. Anomaly and rule detection
  5. Alerting and response

Open-source SIEM

  • Wazuh: HIDS + SIEM, agent-based
  • Elastic SIEM: Elasticsearch + Kibana + detection rules
  • Grafana Loki + Promtail: Lightweight log aggregation

Detection rules

Elastic SIEM detection rule

  • rule: name: Multiple Failed Logins type: threshold query: ‘event.category:authentication AND event.outcome:failure’ threshold: field: source.ip value: 10 severity: high interval: 5m

Key Takeaway

SIEM = central visibility. Wazuh for budget, Elastic SIEM for flexibility, Splunk/Sentinel for enterprise.

securitysiemmonitoringsoc
Share:

CORE SYSTEMS team

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.