As SOC professionals we deal with massive amounts of data every day. Every endpoint, server, firewall, and application generates logs. They are crucial for monitoring, but it is important to choose them carefully to ensure they provide value and a cost-efficient adequate monitoring of your environment. Many organizations simply onboard every log source into their SIEM, assuming more data equals higher visibility.
Not all log sources provide equally useful information. Some applications record all events within their scope, resulting in large volumes of data. For example, a firewall typically logs all traffic information, leading to significant amounts of data when many users access the internet simultaneously. With such high data volumes, it can be challenging to identify important information when monitoring your environment. Additionally, increased data volume usually leads to higher operational costs, as most cloud SIEM solutions charge for both data ingestion and retention.
On the other hand, some organizations lack awareness as to what they should monitor for, resulting in limited access to critical information. In such cases, cyber incidents may go undetected until it is too late. Furthermore, during post-incident forensic analysis, analysts often discover the absence of logs or insufficient visibility within the environment due to inadequate logging practices.
Hence, what can you do to make sure an organization is in neither scenario and has the right amount of information coming from their log sources?
1. Identify critical assets
Start by identifying your crown jewels, such as financial systems, sensitive customer data, critical servers, or identity management systems.
Work closely with business stakeholders to ensure these systems, data, and processes truly reflect what is most critical to your organization. Focus monitoring and alerts on these first to address the highest-impact threats.
Tip: Map your environment into domains (endpoints, servers, network, identity, and data) and identify which assets have the highest business impact. Engage business owners to validate your list of crown jewels and to keep it updated.
2. Review your log sources
Evaluate the logging capabilities of your current solutions. What events are being generated? Which systems are under-monitored? Are there gaps in coverage for your high-value assets?
Collaborate with network and infrastructure teams, application owners, or external suppliers to determine available data sources and ingestion methods, as well as possible gaps. This ensures key events are captured across all systems. Focus on high-fidelity logs from tools like EDR, NDR, firewalls, or IDS to maintain clear visibility into threats.
Tip: Regularly evaluate your current log sources to ensure your assets are correctly monitored for threats. Identify any gaps in monitoring and consider additional solutions or internal logging options.
3. Create a targeted logging strategy
Prioritize logging across three layers, as summarized in the table below. Use this framework to decide which data to collect, where to store it, and how to set priorities.