{"id":4690,"date":"2013-11-27T16:58:17","date_gmt":"2013-11-27T15:58:17","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=4690"},"modified":"2019-12-31T11:28:42","modified_gmt":"2019-12-31T10:28:42","slug":"surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/","title":{"rendered":"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)"},"content":{"rendered":"<p><em>A l\u2019heure o\u00f9 l\u2019on prend plus que jamais au s\u00e9rieux les sc\u00e9narios d\u2019attaques cibl\u00e9es ou de fuite d\u2019information, les entreprises se heurtent souvent \u00e0 un manque de visibilit\u00e9 sur ce qu\u2019il se passe au sein m\u00eame de leur syst\u00e8me d\u2019information.<\/em><\/p>\n<p><em>Beaucoup ont donc entam\u00e9 au cours des 18 derniers mois un projet visant \u00e0 exploiter les logs (ou journaux d\u2019\u00e9v\u00e8nements) afin d\u2019anticiper, d\u00e9tecter et diagnostiquer des actes malveillants.<\/em><\/p>\n<p><em>L\u2019objectif est ambitieux\u00a0: on parle d\u2019abord de log management, puis de corr\u00e9lation des logs \u00e0 l\u2019aide d\u2019un SIEM (security information and event management)\u00a0. Quelle r\u00e9alit\u00e9 derri\u00e8re ces principes\u00a0? Comment les mettre en place\u00a0?<\/em><\/p>\n<h2>\u00c9tape 1\u00a0: centraliser les journaux<\/h2>\n<p>Une grande majorit\u00e9 de machines (\u00e9quipements r\u00e9seau, serveurs, postes de travail), bases de donn\u00e9es ou applications d\u2019un SI peuvent aujourd\u2019hui g\u00e9n\u00e9rer des logs. Ces fichiers contiennent, pour chaque machine, la liste de tous \u00e9v\u00e8nements qui se sont d\u00e9roul\u00e9s : r\u00e9ussite ou \u00e9chec d\u2019une connexion utilisateur, red\u00e9marrage, saturation de la m\u00e9moire&#8230;<\/p>\n<p>Pour les exploiter, il est possible de se connecter unitairement \u00e0 chacun des \u00e9quipements afin d\u2019y observer l\u2019historique. Cette t\u00e2che fastidieuse, encore souvent observ\u00e9e sur le terrain, est irr\u00e9aliste sur des syst\u00e8mes d\u2019information complexes. Elle est par ailleurs inefficace pour pr\u00e9venir un incident ou d\u00e9tecter les impacts en temps r\u00e9el.<\/p>\n<p>La construction d\u2019un \u00ab\u00a0puits de log\u00a0\u00bb est une premi\u00e8re brique de r\u00e9ponse\u00a0: il s\u2019agit de collecter, \u00e0 l\u2019aide d\u2019un outil automatis\u00e9 du march\u00e9, l\u2019ensemble des journaux d\u2019\u00e9quipements dans un espace de stockage unique. L\u2019un des crit\u00e8res de s\u00e9lection de cet outil est justement sa capacit\u00e9 \u00e0 reconna\u00eetre diff\u00e9rents formats de logs (syslog, traps SNMP, formats propri\u00e9taires\u2026).<\/p>\n<p>Le volume d\u2019information centralis\u00e9e peut vite exploser\u00a0: il est important d\u2019\u00e9viter la collecte de donn\u00e9es inutiles. Par ailleurs, le syst\u00e8me peut \u00e9galement \u00eatre gourmand en puissance de calcul en fonction des p\u00e9rim\u00e8tres de recherches effectu\u00e9es.<\/p>\n<p>On parle de <em>log management<\/em> \u00e0 partir du moment o\u00f9 les donn\u00e9es contenues dans ce puits sont trait\u00e9es et exploit\u00e9es, par exemple pour retrouver un \u00e9l\u00e9ment dangereux (virus, probl\u00e8me de s\u00e9curit\u00e9\u2026), ou un comportement malveillant (fuite d\u2019information, suppression de donn\u00e9es\u2026). Il est n\u00e9cessaire de cadrer en amont les finalit\u00e9s du projet,\u00a0 qui peuvent \u00eatre multiples\u00a0:<\/p>\n<ul>\n<li>V\u00e9rifier que les r\u00e8gles du SI sont appliqu\u00e9es<\/li>\n<li>D\u00e9tecter les attaques ou les utilisations frauduleuses du SI<\/li>\n<li>Permettre les analyses post-incidents (<em>forensics<\/em>)<\/li>\n<li>R\u00e9pondre aux contraintes l\u00e9gales ou de conformit\u00e9 avec la capacit\u00e9 de fournir des \u00e9l\u00e9ments de preuve<\/li>\n<\/ul>\n<p>Pour d\u00e9marrer, une bonne pratique consiste \u00e0 s\u2019orienter principalement vers des logs de s\u00e9curit\u00e9 et r\u00e9seau. Certaines applications m\u00e9tiers sensibles pourront ensuite \u00eatre ajout\u00e9es.<\/p>\n<p>Une fois l\u2019espace de stockage cadr\u00e9, l\u2019archivage am\u00e8ne son lot de contraintes\u00a0:<\/p>\n<ul>\n<li>D\u2019un point de vue l\u00e9gal et r\u00e9glementaire, il faut s\u2019assurer de la lic\u00e9it\u00e9 des traitements en fonction des informations archiv\u00e9es et de leurs dur\u00e9es de r\u00e9tention. Une d\u00e9claration \u00e0 la CNIL est \u00e0 pr\u00e9voir dans de nombreux cas.\u00a0 En fonction de leur origine (e-mail, proxy, applications), les p\u00e9riodes de r\u00e9tention ne sont pas soumises aux m\u00eames r\u00e8gles. \u00c0 titre d\u2019exemple, on consid\u00e8re aujourd\u2019hui qu\u2019une dur\u00e9e raisonnable pour l\u2019historique des acc\u00e8s des utilisateurs \u00e0 internet est de 12 mois.<\/li>\n<li>En fonction des traitements et du cadre juridique existant dans l\u2019entreprise (par exemple charte incluant la surveillance\u2026), les collaborateurs doivent potentiellement \u00eatre inform\u00e9s des mesures mises en place. Dans ce cadre la mobilisation des ressources humaines et des instances repr\u00e9sentatives du personnel sont \u00e0 pr\u00e9voir.<\/li>\n<li>La gestion des identit\u00e9s et des acc\u00e8s au puits de logs\u00a0 est, enfin, un sujet crucial. Le volume et la sensibilit\u00e9 des informations qui y sont stock\u00e9es n\u00e9cessite d\u2019identifier pr\u00e9cis\u00e9ment les personnes habilit\u00e9es \u00e0 en faire usage, et de limiter strictement leurs droits au p\u00e9rim\u00e8tre qui leur incombe. Toute modification des traces doit \u00eatre interdite (m\u00eame aux administrateurs),\u00a0 afin que celles-ci puissent avoir une valeur probante le cas \u00e9ch\u00e9ant.<\/li>\n<\/ul>\n<h2><span style=\"font-size: large;\">\u00c9tape 2\u00a0: faciliter l\u2019analyse, du SIEM au Big Data<\/span><\/h2>\n<p>Si des recherches manuelles sont toujours possibles dans un puits de logs, elles ne r\u00e9pondent qu\u2019\u00e0 un besoin pr\u00e9cis et ponctuel.<\/p>\n<p>Pour obtenir une analyse en temps r\u00e9el avec des remont\u00e9es d\u2019alertes automatiques, il est n\u00e9cessaire de passer \u00e0 l\u2019\u00e9tape sup\u00e9rieure\u00a0: le SIEM. Il s\u2019agit \u00e0 la fois d\u2019une extension et d\u2019une industrialisation de la premi\u00e8re \u00e9tape, souvent offerte par le m\u00eame outil du march\u00e9.<\/p>\n<p>Il s\u2019agit ici de rechercher, \u00e0 travers les traces, des liens entre des \u00e9v\u00e8nements unitaires ayant lieu sur diff\u00e9rents \u00e9l\u00e9ments du SI, afin d\u2019anticiper, bloquer (en temps r\u00e9el) ou comprendre une action malveillante.\u00a0 On parle alors de <em>corr\u00e9lation de logs<\/em>.<\/p>\n<p>Pour cela, il est important de d\u00e9finir les types de comportement anormaux \u00e0 identifier. C\u2019est la principale difficult\u00e9\u00a0: un niveau de sensibilit\u00e9 trop \u00e9lev\u00e9 g\u00e9n\u00e8rera beaucoup d\u2019alertes sans int\u00e9r\u00eat, tandis qu\u2019un niveau trop faible ne permettra pas de lever les alertes pertinentes. Cette \u00e9tape comporte donc une phase d\u2019ajustement et apprentissage qui peut durer plusieurs mois.<\/p>\n<p>Aujourd\u2019hui le march\u00e9 des SIEM se renouvelle : les solutions sont de plus en plus performantes, utilisent de nouvelles techniques de d\u00e9tection d\u2019attaque, et exploitent de plus en plus la puissance de calcul du Cloud pour la corr\u00e9lation d\u2019\u00e9v\u00e8nements.<\/p>\n<p>Le march\u00e9 voit \u00e9galement arriver<a title=\"Outillage s\u00e9curit\u00e9 : la ru\u00e9e vers le Big Data est en cours\" href=\"http:\/\/www.solucominsight.fr\/2013\/02\/outillage-securite-la-ruee-vers-le-big-data-est-en-cours\/\"> des outils utilisant les principes du Big Data<\/a>. Plut\u00f4t que de rechercher des sc\u00e9narios connus, l\u2019id\u00e9e est alors de d\u00e9tecter des anomalies statistiques dans la masse d\u2019information. Cette approche s\u00e9duisante doit encore \u00eatre mise \u00e0 l\u2019\u00e9preuve du terrain.<\/p>\n<h2>\u00a0<span style=\"font-size: large;\">Ne pas n\u00e9gliger les aspects organisationnels<\/span><\/h2>\n<p>Enfin, il est n\u00e9cessaire de s\u2019assurer que les alertes seront trait\u00e9es par les \u00e9quipes comp\u00e9tentes. Les proc\u00e9dures et l\u2019organisation associ\u00e9es doivent donc embarquer les \u00e9quipes s\u00e9curit\u00e9 (SOC\/CERT), r\u00e9seau et syst\u00e8me et le RSSI. Des r\u00e9flexions autour de l\u2019externalisation ou de l\u2019internalisation de ces fonctions de surveillance et des liens avec les entit\u00e9s en charge de la gestion des incidents de s\u00e9curit\u00e9 sont \u00e9galement essentielles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A l\u2019heure o\u00f9 l\u2019on prend plus que jamais au s\u00e9rieux les sc\u00e9narios d\u2019attaques cibl\u00e9es ou de fuite d\u2019information, les entreprises se heurtent souvent \u00e0 un manque de visibilit\u00e9 sur ce qu\u2019il se passe au sein m\u00eame de leur syst\u00e8me d\u2019information&#8230;.<\/p>\n","protected":false},"author":13,"featured_media":6213,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[1432,3309,613,1074,3001],"coauthors":[801],"class_list":["post-4690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-logs","tag-security-operations-center","tag-siem","tag-soc","tag-supervision"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)<\/title>\n<meta name=\"description\" content=\"A l\u2019heure o\u00f9 l\u2019on prend plus que jamais au s\u00e9rieux les sc\u00e9narios d\u2019attaques cibl\u00e9es ou de fuite d\u2019information, les entreprises se heurtent souvent \u00e0 un manque de visibilit\u00e9 sur ce qu\u2019il se passe au sein m\u00eame de leur syst\u00e8me d\u2019information. Beaucoup ont donc entam\u00e9 au cours des 18 derniers mois un projet visant \u00e0 exploiter les logs (ou journaux d\u2019\u00e9v\u00e8nements) afin d\u2019anticiper, d\u00e9tecter et diagnostiquer des actes malveillants. L\u2019objectif est ambitieux : on parle d\u2019abord de log management, puis de corr\u00e9lation des logs \u00e0 l\u2019aide d\u2019un SIEM (security information and event management)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)\" \/>\n<meta property=\"og:description\" content=\"A l\u2019heure o\u00f9 l\u2019on prend plus que jamais au s\u00e9rieux les sc\u00e9narios d\u2019attaques cibl\u00e9es ou de fuite d\u2019information, les entreprises se heurtent souvent \u00e0 un manque de visibilit\u00e9 sur ce qu\u2019il se passe au sein m\u00eame de leur syst\u00e8me d\u2019information. Beaucoup ont donc entam\u00e9 au cours des 18 derniers mois un projet visant \u00e0 exploiter les logs (ou journaux d\u2019\u00e9v\u00e8nements) afin d\u2019anticiper, d\u00e9tecter et diagnostiquer des actes malveillants. L\u2019objectif est ambitieux : on parle d\u2019abord de log management, puis de corr\u00e9lation des logs \u00e0 l\u2019aide d\u2019un SIEM (security information and event management)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-27T15:58:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:28:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"217\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chadi Hantouche\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chadi Hantouche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\"},\"author\":{\"name\":\"Chadi Hantouche\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\"},\"headline\":\"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)\",\"datePublished\":\"2013-11-27T15:58:17+00:00\",\"dateModified\":\"2019-12-31T10:28:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\"},\"wordCount\":1121,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg\",\"keywords\":[\"logs\",\"Security Operations Center\",\"SIEM\",\"SOC\",\"supervision\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\",\"name\":\"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg\",\"datePublished\":\"2013-11-27T15:58:17+00:00\",\"dateModified\":\"2019-12-31T10:28:42+00:00\",\"description\":\"A l\u2019heure o\u00f9 l\u2019on prend plus que jamais au s\u00e9rieux les sc\u00e9narios d\u2019attaques cibl\u00e9es ou de fuite d\u2019information, les entreprises se heurtent souvent \u00e0 un manque de visibilit\u00e9 sur ce qu\u2019il se passe au sein m\u00eame de leur syst\u00e8me d\u2019information. Beaucoup ont donc entam\u00e9 au cours des 18 derniers mois un projet visant \u00e0 exploiter les logs (ou journaux d\u2019\u00e9v\u00e8nements) afin d\u2019anticiper, d\u00e9tecter et diagnostiquer des actes malveillants. L\u2019objectif est ambitieux : on parle d\u2019abord de log management, puis de corr\u00e9lation des logs \u00e0 l\u2019aide d\u2019un SIEM (security information and event management)\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg\",\"width\":573,\"height\":217},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc\",\"name\":\"Chadi Hantouche\",\"description\":\"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)","description":"A l\u2019heure o\u00f9 l\u2019on prend plus que jamais au s\u00e9rieux les sc\u00e9narios d\u2019attaques cibl\u00e9es ou de fuite d\u2019information, les entreprises se heurtent souvent \u00e0 un manque de visibilit\u00e9 sur ce qu\u2019il se passe au sein m\u00eame de leur syst\u00e8me d\u2019information. Beaucoup ont donc entam\u00e9 au cours des 18 derniers mois un projet visant \u00e0 exploiter les logs (ou journaux d\u2019\u00e9v\u00e8nements) afin d\u2019anticiper, d\u00e9tecter et diagnostiquer des actes malveillants. L\u2019objectif est ambitieux : on parle d\u2019abord de log management, puis de corr\u00e9lation des logs \u00e0 l\u2019aide d\u2019un SIEM (security information and event management)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/","og_locale":"en_US","og_type":"article","og_title":"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)","og_description":"A l\u2019heure o\u00f9 l\u2019on prend plus que jamais au s\u00e9rieux les sc\u00e9narios d\u2019attaques cibl\u00e9es ou de fuite d\u2019information, les entreprises se heurtent souvent \u00e0 un manque de visibilit\u00e9 sur ce qu\u2019il se passe au sein m\u00eame de leur syst\u00e8me d\u2019information. Beaucoup ont donc entam\u00e9 au cours des 18 derniers mois un projet visant \u00e0 exploiter les logs (ou journaux d\u2019\u00e9v\u00e8nements) afin d\u2019anticiper, d\u00e9tecter et diagnostiquer des actes malveillants. L\u2019objectif est ambitieux : on parle d\u2019abord de log management, puis de corr\u00e9lation des logs \u00e0 l\u2019aide d\u2019un SIEM (security information and event management)","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/","og_site_name":"RiskInsight","article_published_time":"2013-11-27T15:58:17+00:00","article_modified_time":"2019-12-31T10:28:42+00:00","og_image":[{"width":573,"height":217,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg","type":"image\/jpeg"}],"author":"Chadi Hantouche","twitter_misc":{"Written by":"Chadi Hantouche","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/"},"author":{"name":"Chadi Hantouche","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc"},"headline":"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)","datePublished":"2013-11-27T15:58:17+00:00","dateModified":"2019-12-31T10:28:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/"},"wordCount":1121,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg","keywords":["logs","Security Operations Center","SIEM","SOC","supervision"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/","name":"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg","datePublished":"2013-11-27T15:58:17+00:00","dateModified":"2019-12-31T10:28:42+00:00","description":"A l\u2019heure o\u00f9 l\u2019on prend plus que jamais au s\u00e9rieux les sc\u00e9narios d\u2019attaques cibl\u00e9es ou de fuite d\u2019information, les entreprises se heurtent souvent \u00e0 un manque de visibilit\u00e9 sur ce qu\u2019il se passe au sein m\u00eame de leur syst\u00e8me d\u2019information. Beaucoup ont donc entam\u00e9 au cours des 18 derniers mois un projet visant \u00e0 exploiter les logs (ou journaux d\u2019\u00e9v\u00e8nements) afin d\u2019anticiper, d\u00e9tecter et diagnostiquer des actes malveillants. L\u2019objectif est ambitieux : on parle d\u2019abord de log management, puis de corr\u00e9lation des logs \u00e0 l\u2019aide d\u2019un SIEM (security information and event management)","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/11\/faisceaux-573.jpg","width":573,"height":217},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/11\/surveillance-securite-passer-du-puits-de-logs-au-siem-security-information-and-event-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Surveillance s\u00e9curit\u00e9 : passer du puits de logs au SIEM (security information and event management)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/f79d84b363b7e5b8090ca3839d396efc","name":"Chadi Hantouche","description":"Chadi Hantouche is a Cybersecurity and Digital Trust Senior Manager at Wavestone. For more than a decade, he has helped companies assessing their risk and maturity level, and defining associated solutions. He has a focus on security to support innovative technologies (Big Data, Internet of Things, Cloud computing, Mobility) as well as prevention and reaction against cyberattacks. Chadi is a CISSP, ISO 27001 LI and ITIL certified professional. He is a regular speaker on French and international TV channels, newspapers and conferences, and lecturer in several computer science universities.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/chadi-hantouche\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=4690"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4690\/revisions"}],"predecessor-version":[{"id":6215,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4690\/revisions\/6215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6213"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=4690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=4690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=4690"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=4690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}