Vous êtes sur la page 1sur 30

INTERNSHIP PRESENTATION

THEME: Study and deployment of a SIEM to reinforce


the security of an IS

BY UZIEL SIMOUStudent at Ucac-Icam Institute

MR WILLIAM FOFIE MR EWOLO IGOR


company tutor IT Tutor at Ucac-Icam Institute
SUMMARY
Presentation of the company

Introduction and context

Presentation of the project

Study of the project

Demonstration

1
PRESENTATION OF THE COMPANY
 Business areas
 Fonded in 2018
INFORMATOIN SYSTEM SOLUTIONS
 Located in Bessengue
INFRASTRUCTURE AND NETWORK
SOLUTIONS
CERTIFIED TRAINERS
SYSTEM
ADMINISTRATION  Partners

5
INTRODUCTION

 data security  Security management  SIEM

CONTEXT

4 year internship
th
5
THE PROBLEM

Device monitoring Have to think


too decentralized about the regular
and painful updating of the
information system

Individual operation of Decision-making


network equipment THE CHIEF SECURITY OFFICER not always obvious

3
PROJECT MANAGMENT
 provisional schedule

The project ran from 03 October to 20 January 2023

Installation and discovery of the internship theme


10 Days
Comprehensive study of SIEM technology
1 Month 8 Days
Study of the different SIEM solutions on the market 1 Month 8 Days
Deployement of the SIEM
1 Month 8 Days

5
PRESENTATION OF THE PROJECT

HOW DOES IT
GOALS FUNCTIONALITIES
WORKS ?

5
HOW DOES IT WORKS ?

4
GOALS
Manage the large volume of logs from multiple sources

Identify threats and potential breaches

Help in security decision-making

Monitor and understand the company's security posture

5
UTILITIES

6
STUDY OF THE PROJECT
SIEM LOG COLLECTION LOG LOG
ARCHITECTURE & AGREGATION NORMALIZATION CORRELATION

5
ARCHICTETURE

SIEM Architecture

7
ARCHICTETURE

Project architecture

7
WHAT IS A LOG ?
A log is a time-stamped logbook, which orders the various events that
have occurred on a computer, server, etc.

11
Log collection and aggregation

In 4 ways :

Syslogs

By an agent installed on the device

Event Streaming (Diffusion d’évènements)

By direct acces

11
Log normalization
This step allows you to put the logs in the same unique format to make them more usable

 Syslog log normalization

11
11
Log correlation
First of all, to correlate is to connect
Resumé

11
SIEM SOLUTIONS
A distinction is made between open source and paid solutions

Among the open source solutions...

8
Among paiying solutions...

9
Matrix of choice

 Legend

Featured
Not featured

9
SOLUTIONS CHOOSED

open source

Payante 10
 Budget

 The total cost of the project is 14 266 000 FCFA

5
ADDING A HIDS AGENT

5
CONFIGURATION : ADD OF A RULE

5
RESULTS

5
DEMONSTRATION

11
CONCLUSION
This step allows you to put the logs in the same unique format to make them more usable

11
THANK YOU FOR YOUR ATTENTION

11

Vous aimerez peut-être aussi