ELI5: What is SIEM?

Think of a giant bulletin board in a security guard’s office where every camera, door sensor, and alarm in the building reports what it sees. A SIEM is that bulletin board for computers. It collects alerts from every device across the entire network, puts them all in one place, and connects the dots. If the front door alarm and a camera alert happen at the same time, the SIEM figures out they are probably related and warns the security team.

Overview

Security Information and Event Management (SIEM) combines Security Information Management (SIM) and Security Event Management (SEM) into a single platform. SIEM collects log data from across the organization, normalizes it, correlates events, and generates alerts for potential security incidents. It is the central nervous system of a security operations center (SOC).

Key Concepts

  • Log aggregation: Collecting logs from firewalls, servers, endpoints, applications, and cloud services into one platform
  • Normalization: Converting logs from different formats into a common schema for analysis
  • Correlation rules: Logic that identifies patterns across multiple events that indicate an attack (e.g., failed logins followed by successful login from new IP)
  • Real-time alerting: Immediate notification when correlation rules or thresholds are triggered
  • Dashboards and reporting: Visual representation of security posture, trends, and compliance metrics
  • Retention and archival: Storing log data for compliance requirements and forensic investigations
  • User and Entity Behavior Analytics (UEBA): Machine learning that baselines normal behavior and detects anomalies
  • Common SIEM platforms: Splunk, Microsoft Sentinel, IBM QRadar, Elastic Security
  • Syslog: Standard protocol for forwarding log messages (UDP 514, TCP 514, or TLS 6514)
  • Syslog severity levels: 0=Emergency, 1=Alert, 2=Critical, 3=Error, 4=Warning, 5=Notice, 6=Info, 7=Debug
  • journalctl: Linux command for querying systemd journal logs

Exam Tips

Remember

SIEM = Collect, Correlate, Alert. It does NOT block attacks — it detects and notifies. For automated response, you need soar. Think of SIEM as the “security dashboard” that watches everything.

  • SIEM is useless without proper tuning — too many false positives cause alert fatigue
  • Know the difference: SIEM detects, SOAR responds, EDR focuses on endpoints
  • Log sources for SIEM: firewalls, IDS/IPS, OS logs, application logs, authentication logs

Connections

  • Ingests data from ids-ips to correlate network-level events with other security telemetry
  • Detects indicators-of-compromise by matching log patterns against known threat signatures
  • Supports compliance requirements by providing audit trails and retention of security logs
  • Enhanced by soar to automate incident response workflows triggered by SIEM alerts
  • Relies on log-management for proper collection and forwarding of source data

Practice Questions

Scenario

See case-siem for a practical DevOps scenario applying these concepts.