www.confluent.io Open in urlscan Pro
2600:1f18:2489:8200:cc9d:74c9:9a41:c35d  Public Scan

URL: https://www.confluent.io/blog/siem-optimization-for-better-cyber-security/
Submission: On February 21 via manual from US — Scanned from US

Form analysis 1 forms found in the DOM

<form role="search"><svg class="cfHeaderNav-style-module--searchBarIcon--ZSA0y" aria-hidden="true" width="18px" height="18px" focusable="false" data-prefix="fas" data-icon="search" role="img" viewBox="0 0 512 512">
    <path fill="currentColor"
      d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
    </path>
  </svg><input type="search" placeholder="Search" autocomplete="off" autocorrect="off" autocapitalize="off" name="s" value="" class="style-module--input--fZLFL st-default-search-input" id="nav-search-input"><svg
    class="cfHeaderNav-style-module--inputBarResetIcon--JFpIe" aria-hidden="true" width="18px" height="18px" focusable="false" data-prefix="fas" data-icon="times" role="img" viewBox="0 0 352 512">
    <path fill="currentColor"
      d="M242.72 256l100.07-100.07c12.28-12.28 12.28-32.19 0-44.48l-22.24-22.24c-12.28-12.28-32.19-12.28-44.48 0L176 189.28 75.93 89.21c-12.28-12.28-32.19-12.28-44.48 0L9.21 111.45c-12.28 12.28-12.28 32.19 0 44.48L109.28 256 9.21 356.07c-12.28 12.28-12.28 32.19 0 44.48l22.24 22.24c12.28 12.28 32.2 12.28 44.48 0L176 322.72l100.07 100.07c12.28 12.28 32.2 12.28 44.48 0l22.24-22.24c12.28-12.28 12.28-32.19 0-44.48L242.72 256z">
    </path>
  </svg></form>

Text Content

Build a Secure Shared Services Data Streaming Platform and more within our
Confluent Cloud Q1 Launch | Register for demo

Login Contact Us

 * Why Confluent
   * 
     Confluent vs. OSS Kafka®
     
     Streaming Data Pipelines
     
     Our Customers
     
     Our Partners
 * Products
   
   * Choose Your deployment
     
     
     Confluent Cloud
      * Pricing
      * Login
     
     
     Software: Confluent Platform
      * Subscription
   
   * 
     Stream Designer
     
     Connectors
     
     ksqlDB
     
     Stream Governance
     Confluent vs. Kafka: Why you need Confluent
     Confluent is 10x Kafka
     Streaming Data Pipelines
 * Solutions
   * 
     By Customer
     
     By Industry
     
     By Use Case
     
     By Architecture
     
     All Solutions
   * 
     Hybrid and Multicloud Modernization
     
     Event-driven Microservices
     
     Use Case Showcase
     Streaming Use Cases to transform your business
 * Learn
   * 
     Blog
     
     Resources
     
     Training
     
     Professional Services
   * 
     Careers
     
     Events
      * Meetups
      * Kafka Summit
      * Current: Data Streaming Event
      * Webinars
     
     Streaming ETL cloud demo
     Mastering Kafka Streams and ksqlDB
     Microservices with Confluent
 * Developers
   * 
     Confluent Developer
     
     Docs
   * Apache Kafka Quick Start
     Streaming Audio Podcast
     Ask the Community
 * Watch DemoGet Started Free
 * 
 * US English

Watch DemoGet Started Free

 * Watch DemoGet Started Free
 * 
 * Why Confluent
    * 
      Confluent vs. OSS Kafka®
      
      Streaming Data Pipelines
      
      Our Customers
      
      Our Partners

 * Products
   
    * Choose Your deployment
      
      
      Confluent Cloud
       * Pricing
       * Login
      
      
      Software: Confluent Platform
       * Subscription
   
    * 
      Stream Designer
      
      Connectors
      
      ksqlDB
      
      Stream Governance
      Confluent vs. Kafka: Why you need Confluent
      Confluent is 10x Kafka
      Streaming Data Pipelines

 * Solutions
    * 
      By Customer
      
      By Industry
      
      By Use Case
      
      By Architecture
      
      All Solutions
    * 
      Hybrid and Multicloud Modernization
      
      Event-driven Microservices
      
      Use Case Showcase
      Streaming Use Cases to transform your business

 * Learn
    * 
      Blog
      
      Resources
      
      Training
      
      Professional Services
    * 
      Careers
      
      Events
       * Meetups
       * Kafka Summit
       * Current: Data Streaming Event
       * Webinars
      
      Streaming ETL cloud demo
      Mastering Kafka Streams and ksqlDB
      Microservices with Confluent

 * Developers
    * 
      Confluent Developer
      
      Docs
    * Apache Kafka Quick Start
      Streaming Audio Podcast
      Ask the Community

 * 

Read Time: 12 min


HOW CONFLUENT CAN HELP OPTIMIZE AND MODERNIZE YOUR SIEM FOR BETTER CYBERSECURITY

 1. Customers & Business
 2. Solutions

GET STARTED WITH CONFLUENT, FOR FREE

Get started
WATCH DEMO: KAFKA STREAMING IN 10 MINUTES

Watch now


WRITTEN BY

 * Jeff BeanTechnical Marketing
 * Will LaForestChief Technology Officer, US Public Sector

Mar 11, 2022Read Time: 12 min

In the last few years, we’ve seen hugely impactful cyberattacks that have
grabbed the attention of the media, the security community, and the IT industry.
The WannaCry attack, for instance, aimed at extorting money from its victims,
with an estimated total financial impact of over $4B in losses across the globe.
The SolarWinds breach in 2019, which attacked the network management systems of
many organizations including the U.S. Treasury Department, the Department of
Defense, and over 425 Fortune 500 companies, caused massive disruption and leaks
of substantial private information. And in 2021, we saw a slew of disruptive
attacks on some of the nation’s largest organizations like CNA Financial,
Colonial Pipeline, Kaseya, crippling enterprise operations and disrupting
business continuity.

Cyberthreats to citizens and organizations have become so grave that the current
U.S. administration issued an executive order in 2021 entitled Improving the
Nation’s Cybersecurity noting that “recent cybersecurity incidents such as
SolarWinds, Microsoft Exchange, and the Colonial Pipeline incident are a
sobering reminder that U.S. public and private sector entities increasingly face
sophisticated malicious cyber activity from both nation-state actors and cyber
criminals.”

According to the most recent annual report by IBM, the average cost of a single
security incident hit $4.24 million—the highest cost in the 17-year history of
the report. If that cost doesn’t scare you enough, the same report declares that
it takes an average of 287 days to identify and contain a data breach.

Over the last 15+ years, many organizations have relied on Security Incident and
Event Management (SIEM) tools to protect their environment and improve security
operations. However, since threat vectors are creative and elusive, the existing
tools struggle to detect and respond to new threats in a timely manner and
cannot always be effectively integrated end to end in order to respond to new
threats as early as possible, and at scale. While SIEM platforms have proven
their worth and have a definite place in your cybersecurity strategy, there’s
still a real need to incorporate and integrate data beyond their capabilities.
Confluent has established itself as a critical component for SIEM strategies,
providing the means for integrating disparate data across many systems in real
time.


THE NEED FOR SIEM MODERNIZATION

SIEM tools aggregate data from multiple log sources, enabling search and
investigation of security incidents and specific rules for detecting attacks.
Popular SIEM offerings include Splunk, ArcSight, Elastic, Exabeam, and Sumo
Logic. These systems work by collecting event data from a variety of sources
like logs, applications, network devices, servers, and firewalls, using
proprietary collection agents to bring it all directly into their centralized
platform.


Architecture of a typical SIEM platform


There are a number of deficiencies with existing real-world SIEM solutions. The
top three include fragmentation of operations, a lack of incident response
agility, and high costs due to big data scale. Let’s take a look at each one of
these.


MULTI-PLATFORM FRAGMENTATION

Cybersecurity is one of the biggest priorities for most enterprises, but there
are often multiple groups sharing the responsibility. This, coupled with
differing capabilities and cost, has resulted in the frequent adoption of
multiple SIEM tools in many enterprises. Standardizing on a single tool can be
difficult and sometimes, even impractical. This leads to a fragmented solution
to the more general problem of cybersecurity, making it difficult for security
operations teams to obtain a coordinated security view.

When you factor in the frequent use of multiple SIEM tools the architecture
looks more like this:


More than one SIEM platform is usually in use


Indeed this picture is highly simplified since the lines are neatly symmetrical,
going to all the agents. In reality, the different data sources will be mapped
to different tooling, the level of coverage will be different, and not all data
sources will be covered.

The fragmentation of SIEM platforms and data causes a number of issues. It’s
difficult to use data across vertical SIEM instantiations. Data engineering work
needs to be done separately for each tool which leads to duplication of effort
in both development and maintenance. Bringing new tools to bear is even harder,
creating yet another fragment each time. Plus, shifting workloads from one tool
to another is difficult. For example, suppose you decide that you want to send
all the DNS data to Elastic rather than sending it to Splunk, there’s no real
easy way to accomplish this.


BATCH-ORIENTED ARCHITECTURES PRECLUDE REAL-TIME INSIGHTS

Traditional SIEM tools are based on data at rest batch-oriented architectures.
While batch operations are good for collecting data and running complex searches
to find threats and vulnerabilities against a historical corpus, they are not
designed to provide an up-to-date picture of what’s going on right now. This
means organizations solely relying on these tools simply lack the real-time
insights to quickly mount an effective security response.

This article specifically discusses the problem of delayed events going
unnoticed, the impact of it, and how to detect it. Reading between the lines,
care must be taken to implement the special approaches discussed there, and when
that care isn’t taken, significant events can be missed. It’s better to apply an
architecture that’s built for event streaming and can natively handle datasets
that may arrive out of order but where timeliness is important.


LACK OF INCIDENT RESPONSE AGILITY

Fragmentation combined with insufficient observability leads to lack of agility
in the face of an evolving threat landscape. Cyberattacks and vulnerabilities
are unpredictable and therefore hard to proactively plan for. Data relevant to
security can live anywhere from filesystems, to general purpose databases to
transient network packets, and their relevance varies highly at any given time
depending on the threat vector. Each of these data sources need to be integrated
into an end-to-end modernization effort, to allow for recombination of data for
threat analysis. Additionally, incorporating new data sources must be quick and
easy, to access previously uncaptured data for use in resolving live incidents.

Capturing and integrating data is only one piece of the response. You must also
be able to incorporate new rules and machine learning models to detect both
environmental vulnerabilities and ongoing cyberattacks. But in a fragmented SIEM
environment, each individual tool uses its own set of agents and rules, not only
resulting in noisy alerts but also making operational agility difficult to
achieve. In addition, search, discovery, and implementation is further
compromised by the SIEM-specific fragmented storage.


BIG DATA SCALE DRIVES UP COSTS

SIEM relevant data can come from anywhere and signs of a vulnerability can span
any volume of data. This can translate to a massive “big data” problem where the
need to keep tabs on large data volumes and heterogeneous data sources drive up
costs when integrated with a traditional SIEM product, often as a result of the
consumption-rate, volume-based pricing model. While there is definitive
incentive to send more data to SIEM tools to maximize the benefits that these
tools deliver, the more recklessly you collect and analyze data in SIEMs the
more financially unviable they become. As a result, many organizations end up
compromising on the data they collect. They leave out high-volume sources and
hope that their SIEM operations would still be just as robust, forcing a
difficult balancing act between cost and security.


CONFLUENT AUGMENTS YOUR SIEM STRATEGY

Confluent lets you maximize your investment in your preexisting SIEM
infrastructure by helping you incorporate data from different sources for threat
detection in real time. This exposes potential threats for analysis at different
levels of granularity for multiple tools. By providing each SIEM tool with all
of the data it needs for a comprehensive analysis, your security response team
can focus their efforts on detecting threats and analyzing suspicious patterns
instead of simply trying to get access to the data. Confluent also provides you
with a powerful stream processing platform to let you nimbly detect threats in
real time.


AUGMENT YOUR SIEM PLATFORMS WITH CONFLUENT FOR A BETTER CYBERSECURITY POSTURE

Confluent’s solution for SIEM optimization augments your cybersecurity platforms
to break down silos and deliver contextually rich data to be more situationally
aware. With a broad selection of connectors, our platform offers the solution to
the fragmentation problem, allowing you to ingest real-time data streams from
the relevant data sources, and write enriched streams to any sink. Stream
processing within Confluent allows businesses to develop and deploy new threat
detection rules to these data streams on the fly, improving operational agility.
Plus, the overall lower TCO of Confluent can help expand the coverage of your
SIEM tools while minimizing costs.


HOW TO BUILD A SIEM AND OBSERVABILITY PIPELINE WITH APACHE KAFKA® AND CONFLUENT

Confluent enables organizations to bridge the gap between old-school SIEM
solutions and next-gen offerings by consolidating, categorizing, and enriching
all data (such as logs, network data, telemetry and sensor data) and real-time
events from relevant data sources for real-time monitoring, security forensics,
and an enhanced cybersecurity posture. It serves as the curation fabric to
ingest, aggregate, transform, filter, and clean a broad set of data streams, so
that the plethora of analytic processors can consume just the right amount of
data depending on the use case.

Our contemporary SIEM solution achieves the following goals:

 * Enables organizations to move from batch to real time at scale by serving as
   the real-time data pipeline for SIEM data. This enables faster iteration and
   response.
 * Stream processing from Confluent provides agility and incident detection by
   enriching event data in flight with additional context.
 * Stream processing also enables threat detection in live streams of data that
   are too cost prohibitive to store and index in the SIEM, reducing data
   indexing, analysis and storage costs, and mitigating the trade-offs between
   cost and visibility.
 * The increased flexibility offered by Confluent helps organizations improve
   the return on investment in the tools that work best for them.


Confluent capabilities used for SIEM



EMBED SIGMA RULES INTO YOUR EVENT STREAMS WITH CONFLUENT SIGMA

There’s a gap between the analysis required by a security operations center
(SOC) and generic real-time stream processing offered by Confluent out of the
box. ksqlDB and Kafka Streams are highly capable but generic stream processing
engines with no SIEM-specific logic baked in.

The Sigma project provides a robust language for describing patterns in network
data designed to be used on any platform. Sigma is a generic and open signature
format to describe relevant log events in a straightforward manner. As a domain
specific language, Sigma provides a way of exchanging known threat detection
patterns across and between organizations.

To bridge that gap, and at the behest of some of our customers, Confluent’s
field team created the open source community project Confluent Sigma. Confluent
Sigma natively understands Sigma rules and executes them using Kafka Streams,
applying the rules to real-time streams of observability data in Kafka. Sigma
rules themselves are published into Kafka and are picked up immediately by
Confluent Sigma. This approach means that as new patterns are observed or
existing ones are changed they will immediately take effect, minimizing response
time.



This presentation provides a detailed walk-through of Confluent’s applicability
to SIEM, introduces Confluent Sigma, shows an end-to-end demo of it in action
for real-time threat detection, and illustrates how you can bridge the gap
between old-school SIEM solutions and a next-gen architecture.

You can also try this demonstration out yourself either in-browser using Gitpod
or from Docker.



Let’s take a quick look at the example from the presentation on Confluent’s role
in a cybersecurity use case in flagging suspicious activity in the DNS logs of
the TCP replay.


STEP 1: CONNECT YOUR DATA TO CONFLUENT

The first thing you need to do is ensure you have your data sources connected to
Confluent. For example, data can be sourced from Splunk, syslogs, and elsewhere.
In the figures below (excerpted from the presentation), we ingest data from
Splunk and syslog using our Splunk S2S and syslog connectors:


Data from Splunk S2S after ingestion by Confluent



Syslog data as ingested by Confluent



STEP 2: IN-FLIGHT STREAM PROCESSING

These data streams from different and unrelated sources can be combined and
processed together in flight using ksqlDB. This is shown below:


ksqlDB processing disparate streams together


STEP 3: DESIGN YOUR SIGMA RULES

The project provides a basic UI to specify rules, although they can also be
specified by CLI:


Confluent Sigma rule as seen through a viewer

In the example, Confluent Sigma is used to specify rules to flag suspicious
activity in the DNS logs of the TCP replay. We tweak the sensitivity of the
filter during the demo to show how we can nimbly iterate on development of the
detection rules as the incident unfolds. Then the enriched and flagged data is
surfaced in different levels of granularity to both Splunk and Elastic for
analysis by different teams.


STEP 4: EXECUTE THE RULES

Sigma rules are published to a Kafka topic where they are parsed and executed by
the stream processor. In this case we look at DNS query traffic for suspicious
messages:


Executing a Confluent Sigma rule stored in a Kafka topic

ksqlDB is used again to flag specific data from Splunk for individual analysis
in Elastic:


Selecting specific events from Splunk in ksqlDB for downstream analysis in
Elastic 

Sink connectors to Elastic and Splunk are used to export the flagged data as
well as granular enriched network traffic data.

Here is the Splunk interface showing this data:


After data is synthesized in Confluent, it’s sent to Splunk

And Elastic:


Similar data sent to Elastic for separate analysis

Confluent goes a long way toward solving the problems faced by users of SIEM
tools today.

Confluent’s solution for SIEM enables fragmented tools to share data with each
other using Kafka as the central nervous system, with the ability to scan and
process the streaming data as it flows between them. None of the tools are
displaced from what they do well, and new data sources and tools can be added as
needed.

Unlike traditional SIEM tools which are rooted in batch architectures, Confluent
can deliver and process event data as it is generated. Working with different
time characteristics and late arriving data is table stakes for any stream
processor, and Confluent is no exception. Confluent provides robust and complete
stream processing natively through both Kafka Streams and ksqlDB.

Confluent can tap all data streams, sift through them, and present a distilled
version to the SOC to improve incident response effectiveness.

Lastly, Confluent’s solution for SIEM can address these issues in a high volume,
scalable, and cost-effective manner.


LEARN MORE

There’s a lot that Confluent can do to help you optimize your SIEM platforms.
So, here are links to some of our most-popular resources to help you get
started:

 * Watch this presentation video for an overview and demo on how to optimize
   your SIEM platforms.
 * Run our SIEM demonstration in the browser using this Gitpod workspace with
   just a few clicks.
 * See the demonstration on GitHub. It is fully Dockerized and has somewhat
   robust requirements. Since it includes 16 different Docker containers it’s
   probably too much for a laptop. We’ve tested it with good performance on a
   c4.4xlarge EC2 instance.
 * Learn more at additional resources, including:
   * The Confluent solution page on SIEM.
   * Our datasheet on using Confluent to improve the nation’s cybersecurity
     stance in response to a recent executive order by the Biden administration.
   * Intel’s Kafka Summit talk on building a scalable cyber intelligence
     platform.
   * Robin Moffatt’s tutorial on detecting attacks with ksqlDB.

GET STARTED WITH CONFLUENT, FOR FREE

Get started
WATCH DEMO: KAFKA STREAMING IN 10 MINUTES

Watch now


WRITTEN BY

 * Jeff BeanTechnical Marketing
 * Will LaForestChief Technology Officer, US Public Sector

 * 
 * 

GET STARTED WITH CONFLUENT, FOR FREE

Get started
WATCH DEMO: KAFKA STREAMING IN 10 MINUTES

Watch now


DID YOU LIKE THIS BLOG POST? SHARE IT NOW


 1. Customers & Business
 2. Solutions


SUBSCRIBE TO THE CONFLUENT BLOG

Subscribe


HOW MICHELIN CUT KAFKA COSTS BY 35% WITH CONFLUENT CLOUD

Feb 14, 2023

Who isn’t familiar with Michelin? Whether it’s their extensive product line of
tires for nearly every vehicle imaginable (including space shuttles), or the
world-renowned Michelin Guide that has determined the standard of excellence for
fine dining for over 100 years, you’ve probably heard of them.

--------------------------------------------------------------------------------

 * Erin Juno


MODERNIZE HYBRID AND MULTI-CLOUD ENVIRONMENTS WITH TREEHOUSE SOFTWARE AND
CONFLUENT

Jan 24, 2023

At Treehouse Software, when we speak with customers who are planning to
modernize their enterprise mainframe systems, there’s a common theme: they are
faced with decades of mission-critical and historical legacy mainframe data in
disparate databases,

--------------------------------------------------------------------------------

 * Ram Dhakne
 * Joseph Brady


 * Product
 * Confluent Platform
 * Connectors
 * ksqlDB
 * Stream Governance
 * Confluent Hub
 * Subscription
 * Professional Services
 * Training
 * Customers

 * Cloud
 * Confluent Cloud
 * Support
 * Sign Up
 * Log In
 * Cloud FAQ

 * Solutions
 * Financial Services
 * Insurance
 * Retail and eCommerce
 * Automotive
 * Government
 * Gaming
 * Communication Service Providers
 * Technology
 * Manufacturing
 * Fraud Detection
 * Customer 360
 * Messaging Modernization
 * Streaming Data Pipelines
 * Event-driven Microservices
 * Mainframe Integration
 * SIEM Optimization
 * Hybrid and Multicloud
 * Internet of Things
 * Data Warehouse
 * Database

 * Developers
 * Confluent Developer
 * What is Kafka?
 * Resources
 * Events
 * Online Talks
 * Meetups
 * Current: Data Streaming Event
 * Tutorials
 * Docs
 * Blog

 * About
 * Investor Relations
 * Startups
 * Company
 * Careers
 * Partners
 * News
 * Contact
 * Shop Merchandise
 * Trust and Security

 * 
 * 
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 * 
 * 
 * 
 * 
 * 

Terms & Conditions | Privacy Policy | Do Not Sell My Information | Modern
Slavery Policy | Cookie Settings

Copyright © Confluent, Inc. 2014-2023. Apache, Apache Kafka, Kafka, and
associated open source project names are trademarks of the Apache Software
Foundation



By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Notice

Cookies Settings Reject All Accept All Cookies