{"id":23657,"date":"2024-12-21T00:12:34","date_gmt":"2024-12-20T20:12:34","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/siem-hardware\/23657\/"},"modified":"2024-12-21T00:12:39","modified_gmt":"2024-12-20T20:12:39","slug":"siem-hardware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/siem-hardware\/23657\/","title":{"rendered":"Hardware for SIEM systems"},"content":{"rendered":"<p>At some point, the information security department of any large company inevitably begins to consider introducing a SIEM system \u2014 or replacing the existing one, and must therefore estimate the budget required for its deployment. But SIEM isn\u2019t a lightweight product that can be deployed within existing infrastructure. Almost all solutions in this category require additional hardware, meaning that equipment must be purchased or rented.<\/p>\n<p>So, for accurate budgeting, it\u2019s necessary to take into account the expected hardware configuration. In this post, we discuss how SIEM hardware requirements change depending on the company\u2019s profile and system\u2019s architecture, and provide rough parameters to help estimate the preliminary cost of such equipment.<\/p>\n<h2>Evaluating the data flow<\/h2>\n<p>\nEssentially, a SIEM system collects event data from internal and external sources and identifies security threats by correlating this data. Therefore, before considering what hardware will be required, it\u2019s essential to first assess the volume of information the system will process and store. To this end, you need to first identify critical risks to the infrastructure, and then determine the data sources that must be analyzed to help detect and address threats related to these risks. These are the data sources to focus on. Such an assessment is necessary not only to determine the required hardware, but also to estimate the cost of licensing. For example, the cost of licensing for our  directly depends on the number of events per second (EPS). Another important aspect is to check how the vendor calculates the number of events for licensing. In our case, we take the events per second after filtering and aggregation, calculating the average number of events over the past 24\u00a0hours rather than their peak values\u00a0\u2014 but not all vendors follow this approach.<\/p>\n<p>The most common sources include endpoints (Windows events, Sysmon, PowerShell logs, and antivirus logs), network devices (firewalls, IDS\/IPS, switches, access points), proxy servers (such as Squid and Cisco WSA), vulnerability scanners, databases, cloud systems (such as AWS CloudTrail or Office\u00a0365), and infrastructure management servers (domain controllers, DNS servers, and so on).<\/p>\n<p>As a rule, to form preliminary expectations about the average event flow, the size of the organization can serve as a guide. However, the architectural particularities of specific IT infrastructure can make company size a less decisive parameter.<\/p>\n<p>In general, for small and medium-sized organizations with just one office \u2014 or up to several offices with good communication channels among them and IT infrastructure located in a single data center \u2014 an average event flow of 5000\u201310\u00a0000 EPS can be expected. For large companies, making an estimate is more challenging: depending on the complexity of the infrastructure and the presence of branches, EPS can range from 50\u00a0000 to 200\u00a0000 EPS.\n<\/p>\n<h2>Architectural components of an SIEM system<\/h2>\n<p>\nAn SIEM system generally consists of four main components: the management subsystem, event collection subsystem, correlation subsystem, and storage subsystem.<\/p>\n<p><strong>Core (management subsystem).<\/strong> You can think of this as the control center of the system. It allows managing the other components, and provides visualization tools for SOC analysts \u2014 enabling them to easily configure operational parameters, monitor the SIEM system\u2019s state, and, most importantly, view, analyze, sort and search events, process alerts, and work with incidents. This control center needs to also support log viewing through widgets and dashboards, and enable quick data search and access.<\/p>\n<p>The core is an essential component and can be installed as a single instance or as a cluster to provide a higher level of resilience.<\/p>\n<p><strong>Event collection subsystem.<\/strong> As the name suggests, this subsystem collects data from various sources and converts it into a unified format through parsing and normalization. To calculate the required capacity of this subsystem, one must consider both the event flow intensity and the log format in which events arrive from sources.<\/p>\n<p>The server load depends on how the subsystem processes logs. For example, even for structured logs (Key Value, CSV, JSON, XML), you can use either regular expressions (requiring significantly more powerful hardware) or the vendor\u2019s built-in parsers.<\/p>\n<p><strong>Correlation subsystem.<\/strong> This subsystem analyzes data collected from logs, identifies sequences described in correlation rule logic, and, if necessary, generates alerts, determines their threat levels, and minimizes false positives. It\u2019s important to remember that the correlator\u2019s load is also determined not only by the event flow but by the number of correlation rules and the methods used to describe detection logic as well.<\/p>\n<p><strong>Storage subsystem.<\/strong> An SIEM system must not only analyze but also store data for internal investigations, analytics, visualization and reporting, and in certain industries \u2014 for regulatory compliance and retrospective alert analysis. Thus, another critical question at the SIEM system design stage is how long you want to store collected logs. From an analyst\u2019s perspective, the longer the data is stored, the better. However, a longer log retention period increases hardware requirements. A mature SIEM system provides the ability to strike a balance by setting different retention periods for different log types. For example, 30\u00a0days for NetFlow logs, 60\u00a0days for Windows informational events, 180\u00a0days for Windows authentication events, and so on. This allows data to be optimally allocated across available server resources.<\/p>\n<p>It\u2019s also important to understand what volume of data will be stored using hot storage (allowing quick access) and cold storage (suitable for long-term retention). The storage subsystem must offer high performance, scalability, cross-storage search capabilities (both hot and cold), and data viewing options. Additionally, the ability to back up stored data is essential.\n<\/p>\n<h2>Architectural features of Kaspersky SIEM<\/h2>\n<p>\nSo, we\u2019ve laid out the ideal requirements for an SIEM system. It probably won\u2019t surprise you that our Kaspersky Unified Monitoring and Analysis Platform meets these requirements. With its built-in capability to scale for data flows reaching hundreds of thousands of EPS within a single instance, our SIEM system isn\u2019t afraid of high loads. Importantly, it doesn\u2019t need to be split into multiple instances with correlation results reconciled afterwards\u00a0\u2014 unlike many alternative systems.<\/p>\n<p>The event collection subsystem of the Kaspersky Unified Monitoring and Analysis Platform system is equipped with a <a href=\"https:\/\/support.kaspersky.ru\/help\/KUMA\/3.0.2\/ru-RU\/221932.htm\" target=\"_blank\" rel=\"noopener nofollow\">rich set of parsers<\/a> optimized for processing logs in each format. Additionally, the multi-threading capabilities of Go mean the event flow can be processed using all available server resources.<\/p>\n<p>The data storage subsystem used in our SIEM system consists of servers that store data, and servers with the clickhouse-keeper role, which manage the cluster (these servers don\u2019t store data themselves but facilitate coordination among instances). For data flows of 20\u00a0000 EPS with a relatively low number of search queries, these services can operate on the same servers that store the data. For higher data flows, it\u2019s recommended to separate these services. For instance, they can be deployed on virtual machines (a minimum of one is required, though three are recommended).<\/p>\n<p>The Kaspersky Unified Monitoring and Analysis SIEM storage system is flexible \u2014 allowing event flows to be distributed across multiple spaces, and specifying the storage depth for each space. For example, inexpensive disks can be used to create cold storage (where searches are still possible, just slower). This cold storage can house data that is unlikely to require analysis but must be stored due to regulatory requirements. Such information can be moved to cold storage literally the day after it\u2019s collected.<\/p>\n<p>Thus, the data storage approach implemented in our SIEM system enables long-term data retention without exceeding the budget on expensive equipment, thanks to hot and cold storage capabilities.\n<\/p>\n<h2>SIEM architecture deployment using our SIEM as an example<\/h2>\n<p>\nThe Kaspersky Unified Monitoring and Analysis Platform supports multiple deployment options, so it\u2019s important first to determine your organization\u2019s architecture needs. This can be done based on the estimated EPS flow, and the particularities of your company. For simplicity, let\u2019s assume the required data retention period is 30\u00a0days.\n<\/p>\n<h3>Data flow: 5000\u201310\u00a0000 EPS<\/h3>\n<p>\nFor a small organization, the SIEM system can be deployed on a single server. For example, our SIEM system supports the All-in-One installation option. In this case, the required server configuration is 16\u00a0CPUs, 32GB of RAM, and a 2.5TB of disk space.\n<\/p>\n<h3>Data flow: 30\u00a0000 EPS<\/h3>\n<p>\nFor larger organizations, separate servers are needed for each SIEM component. Dedicating a server exclusively for storage ensures that search queries don\u2019t affect the processing of events by the collector and correlator. However, the collector and correlator services can still be deployed together (or separately, if desired). An approximate equipment configuration for this scenario is as follows:\n<\/p>\n<ul>\n<li>Core: 10\u00a0CPUs, 24GB of RAM, 0.5TB of disk space<\/li>\n<li>Collector: 8\u00a0CPUs, 16GB of RAM, 0.5TB of disk space<\/li>\n<li>Correlator: 8\u00a0CPUs, 32GB of RAM, 0.5TB of disk space<\/li>\n<li>Storage: 24\u00a0CPUs, 64GB of RAM, 14TB of disk space<\/li>\n<\/ul>\n<h3>Data flow: 50\u00a0000\u2013200\u00a0000 EPS<\/h3>\n<p>\nFor large enterprises, additional factors must be considered when defining the architecture. These include ensuring resilience (as the substantial data-flow increases the risk of failure) and the presence of company divisions (branches). In such cases, more servers may be required to install the SIEM system, as it\u2019s preferable to distribute collector and correlator services across different servers for such high EPS flows.\n<\/p>\n<h3>Data flow: 200\u00a0000 EPS<\/h3>\n<p>\nAs EPS flows grow and the infrastructure divides into separate independent units, the amount of equipment required increases accordingly. Additional servers will be needed for collectors, storage, correlators, and keepers. Moreover, in large organizations, data availability requirements may take precedence. In this case, the Kaspersky Unified Monitoring and Analysis Platform storage cluster divides all collected events into shards. Each shard consists of one or more data replicas. And each shard replica is a cluster node, meaning a separate server. To ensure resilience and performance, we recommend deploying the cluster with two replicas per shard. For processing such large EPS volumes, three collector servers may be required, installed in the offices with the highest event flows.\n<\/p>\n<h2>Kaspersky SIEM in holding companies<\/h2>\n<p>\nIn large enterprises, the cost of implementing an SIEM system increases not only with the volume of data, but also depending on the usage profile. For example, in some cases (such as MSP and MSSP environments, as well as large holding companies with multiple subsidiaries or branches), multi-tenancy is required. This means the company needs to maintain multiple \u201cmini-SIEMs\u201d, which operate independently. Our solution enables this through a single installation at the head office, without the need to install separate systems in\/at each branch\/tenant. This significantly reduces equipment costs.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/12\/21001209\/SIEM-hardware-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/12\/21001209\/SIEM-hardware-1.png\" alt=\"SIEM scheme\" width=\"584\" height=\"610\" class=\"aligncenter size-full wp-image-52803\"><\/a><\/p>\n<p>Let\u2019s imagine either (i) a holding company, (ii) a vertically-integrated enterprise, or (iii) a geographically-distributed corporation with either various independent security teams or a need to isolate data access among branches. The Kaspersky Unified Monitoring and Analysis Platform tenant model allows for segregated access to all resources, events, and third-party integration settings. This means one installation functions as multiple separate SIEM systems. In this case, while each tenant can develop its own content (correlation rules), there\u2019s also the option of distributing a unified set of resources across all divisions. In other words, each division can have its own collectors, correlators, and rules, but the HQ security team can also assign standardized bundles of security content for everyone \u2014 ensuring consistent protection across the organization.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/12\/21001226\/SIEM-hardware-2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/12\/21001226\/SIEM-hardware-2.png\" alt=\"SIEM in holding\" width=\"662\" height=\"497\" class=\"aligncenter size-full wp-image-52802\"><\/a><\/p>\n<p>Thus, using the Kaspersky Unified Monitoring and Analysis Platform ensures the necessary performance with relatively modest computing resources. In some cases, savings on hardware can reach up to 50%.<\/p>\n<p>For a more accurate understanding of the required resources and implementation costs, we recommend talking with our specialists or integration partners. We (or our partners) can also provide premium support, assist in developing additional integrations (including using API capabilities for connected products), and oversee the deployment of a turnkey solution covering system design, equipment estimation, configuration optimization, and much more. Learn more about our SIEM system, the Kaspersky Unified Monitoring and Analysis Platform, .<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"\">\n","protected":false},"excerpt":{"rendered":"<p>How to estimate what and how much hardware will be needed for a SIEM system to assess the costs before deployment?<\/p>\n","protected":false},"author":2757,"featured_media":23659,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[499,2097,321],"class_list":{"0":"post-23657","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-products-2","10":"tag-siem","11":"tag-technology"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/siem-hardware\/23657\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/siem-hardware\/28397\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/siem-hardware\/28530\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/siem-hardware\/38824\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/siem-hardware\/52801\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/siem-hardware\/28654\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/siem-hardware\/34483\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/siem-hardware\/34107\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/siem\/","name":"SIEM"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2757"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23657"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23657\/revisions"}],"predecessor-version":[{"id":23658,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23657\/revisions\/23658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23659"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}