Ticketing, host isolation, and user lockouts
Security Orchestration, Automation, and Response (SOAR) processes are at the heart of SIEM automation today. In the broader sense, SOAR techniques automate and reduce the workload of security teams more generally. When applied to a SIEM system, they can do most of the “grunt work,” freeing human analysts and IT professionals to do the more detailed operations.
A modern SIEM's SOAR functionality can raise tickets or flag problems for human attention in other ways. It can automatically, and almost instantly, isolate a host that is originating or targeted by suspicious activity, or lock out users who might be doing something they shouldn't. Of course, all of these actions can be immediately reviewed by humans.
Examples of SIEM automation
Let’s get into the types of SIEM automation available.
-
Phishing: Let's say one of your employees is targeted by a phishing attack via email. A SIEM system with SOAR-style functionality could detect suspicious patterns linked to the email, prevent it from being delivered temporarily, and flag it for human review.
-
Malware: SIEM’s ability to gather logs and event data from different sources allows it to detect the installation of malware on your systems earlier, and all but immediately and automatically lock down that device until it can be reviewed and remediated.
-
Insider threats: In the same way, the system can often detect suspicious usage patterns from authorized users and prevent the most damaging actions while flagging the activity for immediate investigation.