Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) is a critical component of modern cybersecurity infrastructure. SIEM systems collect and aggregate log data generated throughout the organization’s technology systems, from host systems and a…

Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) is a critical component of modern cybersecurity infrastructure. SIEM systems collect and aggregate log data generated throughout the organization’s technology systems, from host systems and applications to network and security devices such as firewalls and antivirus filters. The data is then normalized, correlated, and analyzed to generate real-time alerts and long-term reports on threats, vulnerabilities, and incidents.

In this explanation, we will cover key terms and vocabulary related to SIEM in the context of the Undergraduate Certificate in Advanced Security Operation Center (SOC) Management. The terms are grouped into the following categories: data sources, data management, event correlation, threat intelligence, and incident response.

Data Sources

Log data: Log data is the record of events generated by technology systems. Log data can include information such as user activities, system configurations, and security-related events. Log data is a primary data source for SIEM systems.

Event: An event is a single occurrence of a specific activity or state change in a technology system. Events can be security-related or non-security-related. Security-related events are of particular interest to SIEM systems.

Security device: A security device is a technology system specifically designed to protect against cyber threats. Examples of security devices include firewalls, intrusion detection systems (IDS), and antivirus filters. Security devices generate log data that can be collected and analyzed by SIEM systems.

Host system: A host system is a technology system that provides services or applications to users. Examples of host systems include servers, workstations, and laptops. Host systems generate log data that can be collected and analyzed by SIEM systems.

Application: An application is a software program that provides specific functionality to users. Applications generate log data that can be collected and analyzed by SIEM systems.

Data Management

Normalization: Normalization is the process of converting log data from different sources into a common format. Normalization allows SIEM systems to compare and correlate log data from different sources.

Correlation: Correlation is the process of identifying relationships between log data from different sources. Correlation allows SIEM systems to identify complex patterns and trends that may indicate a security threat.

Aggregation: Aggregation is the process of combining log data from different sources into a single record. Aggregation allows SIEM systems to reduce the volume of data and focus on significant events.

Retention: Retention is the process of storing log data for a specific period. Retention allows SIEM systems to maintain a historical record of events for analysis and reporting.

Event Correlation

Alert: An alert is a notification generated by a SIEM system when a specific condition or pattern is detected in the log data. Alerts can be generated in real-time or after the fact.

Threshold: A threshold is a predefined value that triggers an alert when exceeded. Thresholds can be based on the number of events, the severity of the events, or other factors.

Trend analysis: Trend analysis is the process of identifying patterns and trends in log data over time. Trend analysis allows SIEM systems to identify changes in behavior that may indicate a security threat.

Anomaly detection: Anomaly detection is the process of identifying unusual or abnormal events in log data. Anomaly detection allows SIEM systems to identify zero-day attacks and other unknown threats.

Threat Intelligence

Threat intelligence: Threat intelligence is information about potential or current attacks that threaten an organization’s security. Threat intelligence can be collected from internal sources, such as IDS and firewall logs, or external sources, such as security vendors and industry reports.

Indicators of compromise (IOCs): IOCs are specific artifacts or behaviors that indicate a security threat. IOCs can include IP addresses, domain names, file hashes, and other identifiers.

Reputation services: Reputation services are third-party services that provide information about the trustworthiness of specific IP addresses, domain names, or other identifiers. Reputation services can help SIEM systems identify known threats and reduce false positives.

Incident Response

Incident response: Incident response is the process of identifying, investigating, and mitigating security incidents. Incident response is a critical component of SOC management.

Incident handler: An incident handler is a person responsible for managing security incidents. Incident handlers use SIEM systems to identify and investigate incidents.

Forensic analysis: Forensic analysis is the process of collecting and analyzing evidence related to a security incident. Forensic analysis can help incident handlers identify the cause and scope of an incident.

Containment: Containment is the process of isolating a security incident to prevent further damage. Containment can include disconnecting affected systems from the network, blocking specific IP addresses, or other actions.

Eradication: Eradication is the process of removing the cause of a security incident. Eradication can include removing malware, patching vulnerabilities, or other actions.

Recovery: Recovery is the process of restoring affected systems and data to a normal state after a security incident. Recovery can include rebuilding systems, restoring backups, or other actions.

Lessons learned: Lessons learned are insights gained from analyzing security incidents. Lessons learned can help organizations improve their security posture and prevent future incidents.

In conclusion, SIEM systems play a critical role in modern cybersecurity infrastructure. Understanding the key terms and vocabulary related to SIEM is essential for successful SOC management. By collecting and analyzing log data from different sources, SIEM systems can provide real-time alerts and long-term reports on threats, vulnerabilities, and incidents. Effective data management, event correlation, threat intelligence, and incident response are all critical components of a successful SIEM system.

Key takeaways

  • SIEM systems collect and aggregate log data generated throughout the organization’s technology systems, from host systems and applications to network and security devices such as firewalls and antivirus filters.
  • In this explanation, we will cover key terms and vocabulary related to SIEM in the context of the Undergraduate Certificate in Advanced Security Operation Center (SOC) Management.
  • Log data can include information such as user activities, system configurations, and security-related events.
  • Event: An event is a single occurrence of a specific activity or state change in a technology system.
  • Security device: A security device is a technology system specifically designed to protect against cyber threats.
  • Host system: A host system is a technology system that provides services or applications to users.
  • Application: An application is a software program that provides specific functionality to users.
May 2026 intake · open enrolment
from £99 GBP
Enrol