_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN
Let's talk

SIEM základy — Security Information and Event Management

20. 04. 2024 1 min read beginner

SIEM agreguje logy z celé infrastruktury, koreluje události a detekuje bezpečnostní incidenty.

Jak SIEM funguje

  1. Sběr logů z všech zdrojů
  2. Normalizace a parsování
  3. Korelace událostí
  4. Detekce anomálií a pravidel
  5. Alerting a response

Open-source SIEM

  • Wazuh: HIDS + SIEM, agent-based
  • Elastic SIEM: Elasticsearch + Kibana + detection rules
  • Grafana Loki + Promtail: Lightweight log aggregation

Detection rules

Elastic SIEM detection rule

  • rule: name: Multiple Failed Logins type: threshold query: ‘event.category:authentication AND event.outcome:failure’ threshold: field: source.ip value: 10 severity: high interval: 5m

Key Takeaway

SIEM = centrální viditelnost. Wazuh pro budget, Elastic SIEM pro flexibilitu, Splunk/Sentinel pro enterprise.

securitysiemmonitoringsoc
Share:

CORE SYSTEMS tým

Stavíme core systémy a AI agenty, které drží provoz. 15 let zkušeností s enterprise IT.