1. NIST Special Publication 800-92, Guide to Computer Security Log Management. Section 2.3, "Log Management Infrastructure," describes the functions of log aggregation, analysis, and reporting from various sources, which are foundational components of a SIEM. It states, "Log analysis may be performed in a centralized or decentralized manner. Most organizations use a hybrid approach, with centralized logging and analysis for enterprise-wide events..." (p. 11).
2. Microsoft. (2023). What is Microsoft Sentinel?. Microsoft Learn. This official vendor documentation for a leading SIEM product states, "Microsoft Sentinel is a scalable, cloud-native solution that provides security information and event management (SIEM)... Collect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds." (Introduction, para. 1).
3. B. T. D. P. K. K. Wijesinghe and A. S. Karunananda, "A Review on Security Information and Event Management," 2020 2nd International Conference on Advancements in Computing (ICAC), 2020, pp. 316-321. This peer-reviewed paper defines the technology: "SIEM is a combination of Security Information Management (SIM) and Security Event Management (SEM) which provides real-time analysis of security alerts generated by network hardware and applications." (Abstract). This highlights its role in analyzing alerts from multiple sources. DOI: https://doi.org/10.1109/ICAC51239.2020.9357221.