SIEM Platforms
Security Information and Event Management (SIEM) platforms aggregate logs from across the enterprise, correlate events, and surface threats that individual log sources would miss. A SIEM is the nervous system of a Security Operations Center (SOC). Choosing the right platform depends on deployment model, team expertise, and budget.
Fig. 19 — SIEM Platform Comparison
| Platform |
Deployment |
Query Language |
Best For |
Cost Model |
| Splunk |
On-prem / SaaS |
SPL (Search Processing Language) |
Large enterprises with complex analytics needs and mature SOC teams |
Per-GB ingestion. Expensive at scale. Predictable with workload pricing. |
| Elastic SIEM |
Self-hosted / Cloud |
KQL (Kibana Query Language) |
Teams already using ELK stack. Open-source core with commercial features. |
Free (self-hosted) or per-node/resource (Elastic Cloud). Lower barrier to entry. |
| Microsoft Sentinel |
SaaS (Azure) |
KQL (Kusto Query Language) |
Microsoft/Azure-centric environments. Deep Office 365 and Azure AD integration. |
Per-GB ingestion with commitment tiers. Free data connectors for Microsoft services. |
| Chronicle (Google SecOps) |
SaaS (GCP) |
YARA-L / UDM Search |
High-volume environments. Google-scale search across 12 months of hot data. |
Flat-rate licensing (not per-GB). Predictable at any volume. |
Centralized Logging Architecture
A robust logging pipeline separates collection, transport, processing, and storage into distinct stages. This decoupling allows each stage to scale independently and prevents log loss during traffic spikes or downstream outages.
Fig. 20 — Centralized Logging Pipeline
┌─────────────┐ ┌──────────────────┐ ┌──────────────────┐ ┌──────────────────┐ ┌─────────────┐
│ Applications │ │ Log Shipper │ │ Message Queue │ │ SIEM / Storage │ │ Dashboard │
│ │ │ │ │ │ │ │ │ │
│ Web Servers │───>│ Fluentd │───>│ Apache Kafka │───>│ Splunk │───>│ Grafana │
│ APIs │ │ Fluent Bit │ │ Amazon Kinesis │ │ Elasticsearch │ │ Kibana │
│ Databases │ │ Vector │ │ Azure Event Hub │ │ S3 / GCS │ │ Chronicle │
│ Firewalls │ │ Filebeat │ │ (Buffer/Decouple│ │ (Hot + Cold) │ │ (Alerting) │
│ Endpoints │ │ (Collect+Parse) │ │ + Replay) │ │ (Index+Analyze) │ │ │
└─────────────┘ └──────────────────┘ └──────────────────┘ └──────────────────┘ └─────────────┘
│
┌────────────────────────────────────────────────────────────────────────────────────────┘
│
v
┌──────────────────────────────────────────────────────────────────────────────────────────────────┐
│ Alerting & Response: PagerDuty | Slack/Teams | SOAR Playbooks | Ticket Creation │
└──────────────────────────────────────────────────────────────────────────────────────────────────┘
MITRE ATT&CK Framework
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally-accessible knowledge base of adversary behavior based on real-world observations. It provides a common language for describing what attackers do after gaining initial access. Security teams use it to map detection coverage, identify gaps, and prioritize investments.
Matrix Structure:
- Tactics — The adversary's goal (the why). 14 tactics in the Enterprise matrix.
- Techniques — How the adversary achieves the goal (the how). 200+ techniques.
- Sub-techniques — More specific variations of a technique. 400+ sub-techniques.
- Procedures — Specific implementations observed in the wild, attributed to named threat groups.
How Teams Use ATT&CK:
- Gap analysis: Map SIEM detection rules to ATT&CK techniques to find blind spots
- Threat intelligence: Identify which techniques specific threat groups use
- Red team exercises: Structure adversary emulation around real-world TTPs
- Vendor evaluation: Compare EDR/XDR coverage using ATT&CK evaluations
Fig. 21 — MITRE ATT&CK Enterprise Tactics
| ID |
Tactic |
Description |
Example Techniques |
| TA0001 |
Initial Access |
Gaining a foothold in the target network |
Phishing (T1566), Exploit Public-Facing App (T1190), Valid Accounts (T1078) |
| TA0002 |
Execution |
Running adversary-controlled code on the target |
Command & Scripting Interpreter (T1059), Scheduled Task (T1053) |
| TA0003 |
Persistence |
Maintaining access across restarts and credential changes |
Boot Autostart (T1547), Create Account (T1136), Implant Container (T1525) |
| TA0004 |
Privilege Escalation |
Gaining higher-level permissions on the system |
Exploitation for Priv Esc (T1068), Sudo Caching (T1548), Token Manipulation (T1134) |
| TA0005 |
Defense Evasion |
Avoiding detection by security tools and analysts |
Obfuscated Files (T1027), Indicator Removal (T1070), Masquerading (T1036) |
| TA0006 |
Credential Access |
Stealing account credentials |
Brute Force (T1110), OS Credential Dumping (T1003), Input Capture (T1056) |
| TA0007 |
Discovery |
Understanding the target environment |
Network Service Discovery (T1046), System Info (T1082), Account Discovery (T1087) |
| TA0008 |
Lateral Movement |
Moving through the network to reach target assets |
Remote Services (T1021), Pass the Hash (T1550), Internal Spearphishing (T1534) |
| TA0009 |
Collection |
Gathering data of interest to the adversary |
Data from Local System (T1005), Screen Capture (T1113), Email Collection (T1114) |
| TA0010 |
Exfiltration |
Stealing data from the target network |
Exfil Over C2 Channel (T1041), Exfil Over Web (T1567), Automated Exfil (T1020) |
| TA0040 |
Impact |
Disrupting availability or integrity of target systems |
Data Encrypted for Impact (T1486), Defacement (T1491), Resource Hijacking (T1496) |
Threat Detection Tools
Modern threat detection has evolved beyond signature-based antivirus into a layered ecosystem of endpoint, network, and behavioral analytics platforms. Each tool class addresses a different slice of the attack surface.
Fig. 22 — Threat Detection Platform Categories
| Category |
Full Name |
Key Products |
Description |
| EDR |
Endpoint Detection & Response |
CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black |
Real-time monitoring of endpoint activity (processes, file changes, network connections). Behavioral analysis detects fileless malware and living-off-the-land attacks. Remote containment and forensic data collection. |
| XDR |
Extended Detection & Response |
Palo Alto Cortex XDR, Microsoft 365 Defender, CrowdStrike Falcon XDR |
Correlates data across endpoints, network, email, cloud, and identity into a unified detection and response platform. Reduces alert fatigue through cross-domain correlation. |
| UEBA |
User & Entity Behavior Analytics |
Exabeam, Microsoft Sentinel UEBA, Splunk UBA |
Baselines normal user and device behavior, then detects anomalies: unusual login times, impossible travel, abnormal data access patterns. Critical for detecting compromised credentials and insider threats. |
| NDR |
Network Detection & Response |
Darktrace, ExtraHop Reveal(x), Vectra AI |
Passive network traffic analysis using ML to detect lateral movement, C2 communications, and data exfiltration. Sees encrypted traffic metadata without decryption. |
Incident Response Phases
NIST SP 800-61 Rev. 2 defines the authoritative framework for computer security incident handling. Every organization must have a tested, documented incident response plan before a breach occurs. The four phases are cyclical—lessons from post-incident activity feed back into improved preparation.
Fig. 23 — NIST Incident Response Lifecycle (SP 800-61 Rev. 2)
┌──────────────────────────────┐
│ │
│ 1. PREPARATION │
│ ───────────────────── │
│ • IR plan & team │
│ • Communication plan │
│ • Tools & forensic kits │
│ • Training & tabletops │
│ │
└──────────────┬───────────────┘
│
▼
┌───────────────────────────────┐ ┌──────────────────────────────┐
│ │ │ │
│ 4. POST-INCIDENT ACTIVITY │ │ 2. DETECTION & ANALYSIS │
│ ────────────────────────── │ │ ────────────────────────── │
│ • Root cause analysis │ │ • Monitor alerts (SIEM) │
│ • Lessons learned meeting │◄──────│ • Triage & validate │
│ • Update playbooks │ │ • Determine scope & impact │
│ • Improve detection rules │ │ • Evidence collection │
│ • Metrics & reporting │ │ │
│ │ └──────────────┬───────────────┘
└───────────────────────────────┘ │
▲ ▼
│ ┌──────────────────────────────┐
│ │ │
│ │ 3. CONTAINMENT, ERADICATION │
│ │ & RECOVERY │
└──────────────│ ────────────────────────── │
│ • Short-term containment │
│ • Evidence preservation │
│ • Eradicate threat actor │
│ • Restore systems │
│ • Verify integrity │
│ │
└──────────────────────────────┘
IR Playbook Structure
A playbook is a documented, repeatable procedure for handling a specific incident type (ransomware, phishing, data breach, DDoS). Good playbooks eliminate decision paralysis during a crisis and ensure consistent, auditable response. Every organization needs playbooks for its top 5-10 most likely incident scenarios.
Fig. 24 — IR Playbook Components
| Component |
Description |
| Scope |
Define which incident types this playbook covers. Be specific: "Ransomware affecting production Windows servers" is better than "malware incident." |
| Severity Classification |
Clear criteria for SEV-1 (critical), SEV-2 (major), SEV-3 (minor). Defines response time SLAs, who gets paged, and escalation triggers. Use impact + urgency matrix. |
| Roles & Responsibilities |
Incident Commander, Technical Lead, Communications Lead, Legal/Privacy contact, Executive sponsor. RACI matrix for each role. Include backup personnel and on-call rotation. |
| Communication Plan |
Internal notification chain, external stakeholder communication, regulatory notification timelines (GDPR: 72 hours, HIPAA: 60 days, state breach laws vary). Pre-drafted templates for each audience. |
| Technical Steps |
Step-by-step procedures for containment, evidence collection, eradication, and recovery. Include specific commands, tool usage, and decision trees. Version-controlled and tested quarterly. |
| Escalation Path |
When to escalate from Tier 1 to Tier 2, when to engage external IR firms (Mandiant, CrowdStrike Services), when to involve law enforcement (FBI IC3, CISA). |
| Evidence Preservation |
Chain of custody procedures. What to image, what to preserve in memory, log retention requirements. Legal hold notification process. Forensic image integrity (hash verification). |
| Post-Mortem Template |
Blameless post-incident review template: timeline of events, root cause analysis, what went well, what to improve, action items with owners and deadlines. Must be completed within 5 business days. |
Security Monitoring Tools
The essential open-source and freely available tools for security monitoring, auditing, and threat detection on Linux systems. These form the foundation of host-based security monitoring and complement network-level SIEM platforms.
fail2ban
Brute-force protection. Monitors log files for repeated authentication failures and automatically bans offending IPs via firewall rules. Protects SSH, web apps, mail servers. Config: /etc/fail2ban/jail.local
auditd
Linux audit daemon. Kernel-level audit framework that logs system calls, file access, and user actions. Required for compliance (PCI-DSS, HIPAA). Rules: /etc/audit/audit.rules. Query: ausearch, aureport
osquery
SQL-based endpoint visibility. Query OS state using SQL: SELECT * FROM listening_ports WHERE port = 22; Supports Windows, macOS, Linux. Fleet management with Kolide or FleetDM. Real-time event tables.
Lynis
Security audit scanner. Performs automated security assessments against CIS benchmarks. Checks system hardening, software patches, kernel configuration, authentication settings. lynis audit system
Suricata
Network threat detection. High-performance IDS/IPS and network security monitoring engine. Processes traffic at multi-gigabit speeds. Supports Snort-compatible rules plus Lua scripting. Full packet capture and protocol logging.
Wazuh
SIEM + HIDS platform. Open-source security monitoring combining host intrusion detection, log analysis, vulnerability detection, and compliance checking. Integrates with Elastic Stack. Agents for Windows, Linux, macOS.
Digital Forensics Basics
Digital forensics is the scientific process of collecting, preserving, analyzing, and presenting digital evidence. Whether investigating a breach, supporting litigation, or conducting an internal review, forensic rigor ensures evidence is admissible and conclusions are defensible.
Evidence Preservation Principles:
- Order of volatility: Capture most volatile data first (CPU registers → memory → disk → network logs → backups)
- Forensic imaging: Bit-for-bit disk copy using write-blockers. Verify with SHA-256 hash. Never analyze the original media.
- Chain of custody: Document every person who handles evidence, when, and what they did. Any gap invalidates the evidence in legal proceedings.
- Legal hold: Notify relevant parties to preserve all potentially relevant data. Suspend automated deletion policies.
Common Forensic Tools:
- Autopsy: Open-source digital forensics platform. GUI-based. Timeline analysis, keyword search, hash filtering, file carving. Built on The Sleuth Kit.
- Volatility: Memory forensics framework. Analyze RAM dumps for running processes, network connections, injected code, and encryption keys.
- KAPE (Kroll): Rapid triage collection tool. Collects forensic artifacts (browser history, event logs, prefetch) in minutes.
- Velociraptor: Endpoint visibility and forensic collection at scale. Hunt across thousands of endpoints with VQL queries.
The question is not whether you will be breached, but whether you will know when it happens.
— Security Operations axiom