{"id":217,"date":"2010-12-03T00:00:00","date_gmt":"2010-12-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/12\/03\/to-improve-security-get-your-dam-info-into-siem\/"},"modified":"2021-12-30T11:36:45","modified_gmt":"2021-12-30T11:36:45","slug":"to-improve-security-get-your-dam-info-into-siem","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/12\/03\/to-improve-security-get-your-dam-info-into-siem\/","title":{"rendered":"To Improve Security, Get Your DAM Info Into SIEM"},"content":{"rendered":"<p>Database activity monitoring (DAM) and security information and event management (SIEM) technologies historically have worked separately.  To gain a comprehensive view of the activity in the database and its surrounding environs, organizations need to feed their DAM information into a SIEM tool, analysts and other observers advise.  &#8220;If all a customer is doing is trying to monitor a database, then clearly there isn&#8217;t a lot of leverage in using SIEM for that use case,&#8221; says Mike Rothman, analyst with Securosis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As Rothman sees it, the biggest advantage to integrating DAM with SIEM is the context it provides.  &#8220;A database attack is usually one aspect of a broader attack&#8230;. The DAM has no visibility on network traffic, server configurations, exfiltration attempts, user activity, or a million other things,&#8221; Rothman says.<\/p>\n<p>According to Rick Caccia, vice president of marketing at SIEM vendor ArcSight, this additional context is particularly important for monitoring database access through applications that are tied into data stores &#8212; but only through some layer of technological complexity.  &#8220;The common problem DAM products have is most customers don&#8217;t have their applications directly talking to a database; they have some sort of application server that runs applications that talk to the database, and that application server tends to hold one connection to the database,&#8221; Caccia explains.<\/p>\n<p>Tying DAM information into the SIEM allows an organization to more easily correlate the activity a user might have done on a front-end application with the query activity by an application server sent directly into the database.<\/p>\n<p>&#8220;Organizations take application logs, send the application logs to the SIEM, send the DAM logs to the SIEM, and the SIEM correlates those two together,&#8221; Caccia says.<\/p>\n<p>Rothman and Caccia agree that one of the biggest challenges in feeding DAM into SIEM isn&#8217;t the technology &#8212; DAM and SIEM vendors have worked together during the past few years &#8212; but is often caused by internal staff battles.<\/p>\n<p>http:\/\/www.darkreading.com\/database-security\/167901020\/security\/security-management\/228500270\/to-improve-security-get-your-dam-info-into-siem.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-217","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=217"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/217\/revisions"}],"predecessor-version":[{"id":2704,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/217\/revisions\/2704"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}