You can build perfect defenses and still get breached. The difference between a minor incident and a catastrophe is how quickly you detect it.
Three questions your logs must answer: Did something bad happen? What exactly? How do we stop it?
| Component | Function | Key consideration |
|---|---|---|
| Collection | Agents, syslog, APIs pulling from sources | Coverage: missing one server = blind spot |
| Normalization | Convert different formats to common schema | Without it, can't correlate Windows + Linux events |
| Correlation | Connect related events across time/sources | Login from Madrid, then Beijing 5 min later = alert |
| Detection | Rules that trigger alerts on patterns | Start with vendor rules, then customize heavily |
| Dashboards | Visibility for analysts and executives | SOC: real-time detail. CISO: weekly trends. |
| Retention | How long logs are searchable/archived | Hot: 30-90 days. Cold: 12-24 months. |
10,000+ alerts/day. Most false positives. Your analysts miss the real attack on page 47 of the queue. This is how breaches go undetected despite having a SIEM.
200+ day average dwell time means most organizations don't know they've been breached for months.
A SIEM with 20 well-tuned rules beats one with 500 noisy rules. Quality over quantity.
Alert fatigue kills detection capability. Tune relentlessly, tier alerts, automate the repetitive.
Log everything security-relevant. Never log passwords or PII in plaintext.