What is a SIEM?
SIEM stands for Security Information and Event Management. It is a technology platform that collects, correlates, analyses, and visualises security-relevant data in order to detect and investigate cyber threats.
A SIEM system provides Real-time insight into what is happening within an organisation at the network, system, and application level, and plays a central role in Defense in Depth and incident response.
🧠 What does a SIEM do?
A SIEM combines two functions:
- SIM (Security Information Management): Collecting, retaining, and analysing log files
- SEM (Security Event Management): Real-time monitoring and alerting on suspicious events
🛠️ Functions of a SIEM
| Function | Description |
|---|---|
| Log collection | Ingesting logs from Firewall, servers, SCADA, PLC, network equipment |
| Normalisation | Converting to a uniform format for analysis |
| Correlation | Recognising patterns across multiple systems |
| Alerting & detection | Warning of suspicious or unusual activity |
| Dashboards & reporting | Visualising status, trends, and compliance |
| Forensic analysis | Investigating incidents and the origin of attacks |
🏭 SIEM in industrial (OT) networks
Although SIEM systems traditionally come from IT, they are increasingly used in OT environments. They can:
- Detect attacks on PLCs or SCADA systems
- Signal unexpected network connections or Remote Access attempts
- Log changes to setpoints, user privileges, or firmware
- Automatically recognise CVEs and indicators of compromise (IOCs)
🔐 By linking SIEM data to zones and conduits model segmentation, context-aware detection emerges.
🔧 Common SIEM solutions
- Microsoft Sentinel
- Splunk
- IBM QRadar
- Elastic SIEM
- ArcSight
- Open source: Wazuh, OSSIM
📌 In summary
A SIEM is a powerful platform for centralised security monitoring. It helps organisations detect threats early, investigate incidents, and comply with security frameworks such as ISO 27001, BIO, or CSIR.
