Volume 15, Number 6
Exploring Critical Vulnerabilities in SIEM Implementation and SOC Service Procurement: An In-Depth Analysis of High-Risk Scenarios
Authors
Ertuğrul AKBAŞ, Istanbul Esenyurt University, Turkey
Abstract
This research paper examines the high risks encountered while using a Security Information and Event Management (SIEM) product or acquiring Security Operations Center (SOC) services. The paper focuses on key challenges such as insufficient logging, the importance of live log retentions, scalability concerns, and the critical aspect of correlation within SIEM. It also emphasizes the significance of compliance with various standards and regulations, as well as industry best practices for effective cybersecurity incident detection, response, and management.
Keywords
SIEM, Security, SOC, Cyber Security, Insufficient logging, Live Log, Hot Log, Log Loss, Correlation