1. National Institute of Standards and Technology (NIST) Special Publication 800-92
"Guide to Computer Security Log Management."
Reference: Section 2.3
"Security Information and Event Management
" describes SIEMs as solutions that "provide the ability to perform analysis of log data... in near real-time" and "provide a simplified
centralized view of the security-related events." This supports the choice of SIEM for centralized analysis and detection.
2. Carnegie Mellon University
Software Engineering Institute
"Common Sense Guide to Mitigating Insider Threats
5th Edition."
Reference: Practice 17
"Use a SIEM to Log
Monitor
and Audit Employee Actions
" page 101. The guide states
"A SIEM system centralizes logging capabilities
and it can correlate and analyze data from multiple sources... to identify suspicious behavior." This highlights the SIEM's role in consolidation and automated analysis.
3. SANS Institute
"Successful SIEM and Log Management Strategies for the Small- to Midsized-Business."
Reference: Page 4
"What Is a SIEM?" The document defines a SIEM as a system that "gathers all the important logs from a network in one place" and "analyzes the logs to identify activity that is outside the norm." This confirms its function for both consolidation and automated detection.