Proposal Template
Proposal Template
Proposal Template
Introduction:
Cybersecurity risks affecting industrial control systems (ICT) have grown extremely during the past
couple of years, mainly due to increased activity by nation-states and cybercriminals. Attackers have
become more sophisticated and dangerous and their appropriate and timely detection has become
a real challenge.
Security Information and Event Management (SIEM) systems have been widely deployed as a
powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have grown to
become comprehensive systems that provide a wide visibility to identify areas of high risks and
proactively focus on mitigation strategies aiming at reducing costs and time for incident response.
Currently, SIEM systems and related solutions are slowly converging with big data analytics tools.
Functional Requirements:
1. Analytics.
SIEM tools use real-time analytics to detect and prioritize events or activities that may represent a
threat, compliance issue or something else of interest to users. The solution should offer batch
analytics to identify and correlate weak signals in data not detected in real time.
2. Feature administration.
The SIEM solution should provide tools to administer, maintain and support complex functions, such
as log and data source management, analytics and detection content, reporting, user roles and
access control, along with technical integration and response workflows.
3. Data collection.
SIEM systems collect data by deploying agents on end-user devices, servers, network equipment, or
other security systems like firewalls and antivirus, or via protocols syslog forwarding or SNMP.
Advanced SIEMs can integrate with cloud services to obtain log data about cloud-deployed
infrastructure or SaaS applications, and can easily ingest other non-standard data sources.
4. Data storage.
SIEMs relied on storage deployed in the data center.
7. Integration.
It may sound elementary, but it is also critical for any new SIEM tool to integrate with all relevant
applications, data sources and technologies. SIEM threat detection performance depends not only
on SIEM and its configuration, but also on the entire detection stack and all supporting telemetry
chosen to be sent to the SIEM.
8. Alerting.
Analyzes events and helps escalate alerts to notify security staff of immediate issues, either by
email, other types of messaging, or via security dashboards.
9. Threat Hunting.
Allows security staff to run queries from multiple sources via SIEM data, filter and pivot the data,
and proactively uncover threats or vulnerabilities.
Tools:
1. Windows 10.
2. Windows server.
3. Linux.
4. VMware.
5. Wazuh.
6. Elasticsearch.
7. Filebeat.
8. Kibana.
9. Agent.