Lab 02: SIEM Design with Elastic
Objectives
Step 1: Elastic SIEM Architecture Overview
┌─────────────────────────────────────────────────────────────┐
│ DATA SOURCES │
│ Endpoints │ Network │ Cloud │ Apps │ Identity │
└──────┬──────┴─────┬─────┴────┬────┴───┬────┴──────┬─────────┘
│ │ │ │ │
┌──────▼────────────▼──────────▼────────▼───────────▼─────────┐
│ BEATS / AGENTS │
│ Filebeat │ Winlogbeat │ Packetbeat │ Auditbeat │ Metricbeat │
└─────────────────────────┬───────────────────────────────────┘
│
┌───────────▼───────────┐
│ Logstash / Ingest │ ← Parse, enrich, filter
│ Pipelines │
└───────────┬───────────┘
│
┌───────────▼───────────┐
│ Elasticsearch │
│ Hot → Warm → Cold │ ← ILM policy
└───────────┬───────────┘
│
┌───────────▼───────────┐
│ Kibana Security │
│ Detection Rules │ ← EQL / Sigma / ML
│ SIEM Dashboards │
└───────────┬───────────┘
│
┌───────────▼───────────┐
│ SOAR / Alerting │ ← PagerDuty, XSOAR
└───────────────────────┘Step 2: Data Ingestion — Beats Configuration
Step 3: Index Strategy
Step 4: Hot/Warm/Cold Tier Strategy
Tier
Retention
Storage Type
Replicas
Use Case
Step 5: Sigma Rule Parser + EQL Query Builder
Step 6: SIEM Detection Rules
Category
Example Rule
ATT&CK
Step 7: SIEM Tuning Methodology
Step 8: Capstone — SIEM Architecture Design
Summary
Component
Design Choice
Rationale
Last updated
