SIEM Vocabulary
5 exercises — master SIEM vocabulary for SOC analysts: SIEM architecture and core functions vs. log aggregation, detection vs. correlation rules with MITRE ATT&CK mapping, true/false positive/negative classification and the alert fatigue problem, log source onboarding steps, and UEBA behavioural analytics.
0 / 5 completed
SIEM quick reference
- SIEM — collects + normalises + correlates + alerts; turns raw logs into actionable security detections.
- Detection rule — fires on a single known-bad event or indicator. Correlation rule — fires when a pattern of events across sources/time is suspicious.
- MITRE ATT&CK — framework of adversary TTPs; mapping rules to techniques enables detection coverage gap analysis.
- TP: alert fired, real threat. FP: alert fired, benign event (alert fatigue). FN: no alert, real threat (worst outcome — missed breach). TN: no alert, no threat (normal operation).
- Log source onboarding — connectivity + parsing + normalisation + event coverage validation + rule activation + coverage matrix update.
- UEBA — ML baselines normal user/entity behaviour; alerts on deviations like impossible travel, off-hours access, data volume anomalies, peer group outliers.
- Alert fatigue — too many FPs cause analysts to stop trusting alerts; base-rate error is the root cause; solved by rule tuning and UEBA calibration.
1 / 5
A SOC manager explains the team's tooling: "Everything flows into the SIEM. It's not just a log storage system — it aggregates, normalises, and correlates events from across our environment so we can detect threats we'd never see by looking at any single source."
What is a SIEM, what are its core functions, and what distinguishes it from a simple log aggregator?
The SIEM's value is the intelligence layer on top of log collection. Raw logs are evidence; the SIEM's correlation engine turns evidence into alerts.
SIEM data flow:
Common SIEM use cases:
• Detect credential stuffing: >100 failed logins from single IP in 60s → alert
• Detect lateral movement: user authenticates from office IP, then 5 minutes later from overseas IP → impossible travel alert
• Detect privilege escalation: standard user account added to admin group outside business hours → alert
• Detect data exfiltration: unusual volume of data egress from a database server to external IP → alert
Key vocabulary:
• SIEM (Security Information and Event Management) — centralised security platform that aggregates, normalises, correlates, and alerts across log sources from the entire environment
• Log normalisation — parsing raw log formats into a common schema; enables cross-source event correlation regardless of vendor or log format
• Correlation rule — a SIEM logic rule that fires an alert when a specific pattern of events is detected across one or more sources within a time window
• Log source coverage — the completeness of log ingestion; any system not feeding the SIEM is a potential undetected attacker path
SIEM data flow:
| Stage | What happens | Why it matters |
|---|---|---|
| Ingestion | Logs arrive via syslog, API, agent, or cloud integration | Coverage: every source you don't log is a blind spot |
| Normalisation / parsing | Log fields extracted and mapped to common schema (src_ip, user, action, outcome) | Cross-source correlation requires consistent field names |
| Enrichment | Adds context: IP geolocation, threat intel feed match, asset inventory lookup | Turns raw IP into "known malicious C2 server in Russia" |
| Correlation | Detection rules evaluate enriched events; statistical models identify anomalies | Connects events across sources into a detectable pattern |
| Alerting | Alert fires; routed to analyst queue, SOAR, or ticketing system | Analyst focuses on prioritised, enriched alerts — not raw logs |
Common SIEM use cases:
• Detect credential stuffing: >100 failed logins from single IP in 60s → alert
• Detect lateral movement: user authenticates from office IP, then 5 minutes later from overseas IP → impossible travel alert
• Detect privilege escalation: standard user account added to admin group outside business hours → alert
• Detect data exfiltration: unusual volume of data egress from a database server to external IP → alert
Key vocabulary:
• SIEM (Security Information and Event Management) — centralised security platform that aggregates, normalises, correlates, and alerts across log sources from the entire environment
• Log normalisation — parsing raw log formats into a common schema; enables cross-source event correlation regardless of vendor or log format
• Correlation rule — a SIEM logic rule that fires an alert when a specific pattern of events is detected across one or more sources within a time window
• Log source coverage — the completeness of log ingestion; any system not feeding the SIEM is a potential undetected attacker path
Next up: Alert Triage →