Lab 02: SIEM Design with Elastic

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Architect an Elastic SIEM for enterprise deployment

  • Design index strategies and data lifecycle management

  • Build Sigma detection rules and translate to EQL

  • Tune SIEM performance and reduce false positives


Step 1: Elastic SIEM Architecture Overview

┌─────────────────────────────────────────────────────────────┐
│                    DATA SOURCES                              │
│  Endpoints  │  Network  │  Cloud  │  Apps  │  Identity      │
└──────┬──────┴─────┬─────┴────┬────┴───┬────┴──────┬─────────┘
       │            │          │        │           │
┌──────▼────────────▼──────────▼────────▼───────────▼─────────┐
│                BEATS / AGENTS                                │
│  Filebeat │ Winlogbeat │ Packetbeat │ Auditbeat │ Metricbeat │
└─────────────────────────┬───────────────────────────────────┘

              ┌───────────▼───────────┐
              │  Logstash / Ingest    │  ← Parse, enrich, filter
              │  Pipelines            │
              └───────────┬───────────┘

              ┌───────────▼───────────┐
              │    Elasticsearch      │
              │  Hot → Warm → Cold    │  ← ILM policy
              └───────────┬───────────┘

              ┌───────────▼───────────┐
              │  Kibana Security      │
              │  Detection Rules      │  ← EQL / Sigma / ML
              │  SIEM Dashboards      │
              └───────────┬───────────┘

              ┌───────────▼───────────┐
              │  SOAR / Alerting      │  ← PagerDuty, XSOAR
              └───────────────────────┘

Step 2: Data Ingestion — Beats Configuration

Winlogbeat — Windows event logs (critical event IDs):

Filebeat — Linux syslog / application logs:

💡 Use Elastic Agent + Fleet in modern deployments — single agent replaces individual Beats and enables central policy management.


Step 3: Index Strategy

Naming Convention:

ECS (Elastic Common Schema) — standardise field names:


Step 4: Hot/Warm/Cold Tier Strategy

Tier
Retention
Storage Type
Replicas
Use Case

Hot

0–7 days

NVMe SSD

1

Active ingest + real-time search

Warm

7–30 days

SSD

0

Investigation, compressed

Cold

30–365 days

HDD / Object

0

Compliance, frozen snapshots

Frozen

365+ days

S3 / Azure Blob

0

Long-term archive, searchable

ILM Policy Example:


Step 5: Sigma Rule Parser + EQL Query Builder

📸 Verified Output:


Step 6: SIEM Detection Rules

Rule Categories:

Category
Example Rule
ATT&CK

Execution

PowerShell encoded command

T1059.001

Persistence

Scheduled task creation

T1053.005

Lateral Movement

Admin share access

T1021.002

Credential Access

LSASS memory access

T1003.001

Exfiltration

Large DNS query volume

T1048.003

Defence Evasion

Security log cleared

T1070.001

EQL Examples:


Step 7: SIEM Tuning Methodology

Tuning cycle (monthly):

  1. Pull top-10 alert sources by volume

  2. Identify FP patterns (benign software, maintenance windows)

  3. Add exceptions (allowlists, time-based suppression)

  4. Validate rule still catches TP with red team test

  5. Document changes in SIEM change log

Tuning techniques:

  • Allowlisting: Exclude known-good processes (svchost.exe from C:\Windows\System32)

  • Risk scoring: Adjust rule severity based on asset criticality

  • Aggregation: Group similar alerts into single case (same user, same hour)

  • Baseline: ML-based anomaly detection for user behaviour (UEBA)

💡 Target FPR < 20% for mature SIEM. Start with the 5 highest-volume, lowest-fidelity rules and tune them first for immediate impact.


Step 8: Capstone — SIEM Architecture Design

Scenario: Design Elastic SIEM for 5,000-endpoint enterprise

Architecture Decisions:


Summary

Component
Design Choice
Rationale

Agents

Elastic Agent + Fleet

Centralised management

Schema

ECS (Elastic Common Schema)

Normalised field names

Hot tier

NVMe SSD, 7 days

Fast search for active incidents

Warm tier

SSD, 30 days

Investigation window

Cold tier

HDD/Object, 365 days

Compliance retention

Detection

EQL + Sigma + ML

Multi-layer detection

Tuning

Monthly FPR review

Maintain < 20% FPR

Last updated