Within the framework of delivery of an SIEM solution, we understand that merely delivering and connecting the equipment is not enough. Customising it to suit customer requirements represents the greatest added value which will make the SIEM solution an effective and powerful tool in the hands of security monitoring. This is why in the delivery we pay particular attention to analysis of the infrastructure and proposal of detection and correlation rules.

Services

Deployment analysis
  • This consists of identifying all assets which will be monitored by the SIEM solution, including determination of their value, links to other assets and determination of the priority of their connection. Assets which are critical from a business perspective are in particular addressed. Analysis also includes identification of monitoring availability of the infrastructure with the aim of identifying the limits of security and operational monitoring, including a proposal for improvement of monitoring availability (security development strategy). In addition to this, a plan for connecting individual assets (log sources) is drawn up according to the determined or recommended priority. Analysis also includes definition of users and their roles. Here we suggest which employees should be able to access the SIEM solution and in which roles, which parts of it they will see and which data they will have access to.
Installation of the solution
  • We deploy and install all components of the solution proposed in the Target Concept. The entire installation is performed in accordance with general security principles in order to meet the target requirements and to minimise operational and security risks. All installation steps follow our best-practice guidelines for SIEM solutions in their individual parts.
Configuration of the solution
  • This consists of integration of assets (log sources) according to the logging architecture and proposal, implementation and testing of detection and correlation rules.
    • Integration is implemented mainly on the SIEM side of the solution, but we also provide assistance with the actual configuration of assets (log sources), for example in the form of detailed configuration instructions or assistance with setup.
    • Proposal, implementation and testing of detection and correlation rules is performed in connection with Risk Analysis in combination with threat modelling. The rules are adapted as far as possible to the specific conditions of the organisation. However, work on the rules does not end with implementation itself and it is necessary to develop them over time to reflect the real threats and the current situation in the infrastructure.
Pilot operation and documentation
  • The entire solution deployed by us is tested, with performance of acceptance tests, high availability tests and optimisation of correlation rules. The last thing is drawing up of documentation describing the architecture of the solution including addressing, integration with the infrastructure, connection of the log source including connection methods, detection and correlation rules which have been created and other relevant issues.