Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

CISA Releases Guidance on SIEM and SOAR Implementation

The guidance outlines the benefits and challenges or SIEM and SOAR platforms, and shares implementation recommendations.

Newly released guidance from the US and Australian governments aims to provide organizations with advice on how to improve their security posture through implementing SIEM and SOAR platforms.

The US cybersecurity agency CISA in collaboration with the Australian Cyber Security Centre (ACSC) this week released fresh recommendations for organizations looking to procure SIEM and SOAR platforms, which collect and analyze log data from the network, and identify anomalous behavior and automate response.

SIEM and SOAR platforms provide increased visibility over an organization’s information and communication technology (ITC) environment and help with the detection of cybersecurity incidents, enabling defenders to respond to them early.

When properly implemented, SIEM appliances automate the collection of log data from sources scattered across the network, making it easier for security teams to navigate. 

SOAR solutions, on the other hand, apply predefined playbooks that “combine incident response and business continuity plans to determine automatic actions” and aid incident responders. 

SIEM and SOAR platforms are designed to integrate with one another, as the latter leverages data collected, centralized, and analyzed by the former. SOAR solutions may also be integrated with other security tools, CISA and ACSC say.

To aid organizations in understanding the importance of SIEM and SOAR platforms and in implementing them, the two agencies published three new guiding documents: one aimed at executive decision-makers and two meant for cybersecurity practitioners.

The guidance for executives defines SIEM and SOAR platforms, outlines their benefits and challenges, and shares implementation recommendations considered relevant. 

Advertisement. Scroll to continue reading.

The guidance for practitioners covers SIEM/SOAR implementation and priority logs, providing recommendations on the best practices for implementing these platforms, as well as on the logs that should be prioritized for SIEM ingestion.

The documents, the agencies say, are mainly intended for use within government entities, but the recommended actions apply to any organization looking to implement and leverage SIEM and SOAR. 

Related: Vulnerabilities in CISA KEV Are Not Equally Critical: Report

Related: CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine

Related: Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

Robert Shaker II has joined application security firm ActiveState as Chief Product and Technology Officer.

MorganFranklin Cyber has promoted Nick Stallone and Ferdinand Hamada into newly created roles.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.