SIEM: The Complete Guide for Security and Compliance Teams
2026-03-08
By Emre Salmanoglu

SIEM: The Complete Guide for Security and Compliance Teams

Learn how to select, deploy, and operate a SIEM for threat detection, incident response, and compliance evidence. Covers log sources, detection rules, SOAR integration, and framework requirements under ISO 27001, SOC 2, NIS2, and DORA.

SIEM
security monitoring
log management
threat detection
compliance

What Is a SIEM?

A Security Information and Event Management (SIEM) system is the central nervous system of an organisation's security operations. It collects log data from across the technology estate, normalises it into a common format, correlates events to detect threats, and provides the audit trail that compliance frameworks demand.

Modern SIEMs have evolved from simple log aggregators into intelligent platforms that combine real-time threat detection, automated response, threat hunting, and compliance reporting.

Core SIEM Capabilities

CapabilityWhat It DoesCompliance Value
Log collectionIngest logs from all IT systems via agents, syslog, APIsCentral audit trail evidence
NormalisationConvert diverse log formats into a common schemaConsistent analysis and reporting
CorrelationMatch events across sources to detect attack patternsThreat detection evidence
AlertingNotify analysts of detected threats and anomaliesIncident detection evidence
DashboardsReal-time visibility into security postureManagement reporting
InvestigationSearch and drill into historical events for forensicsIncident response evidence
ReportingGenerate compliance and operational reportsAudit evidence packages
RetentionStore logs for required retention periodsRegulatory compliance

SIEM Architecture

ComponentPurposeKey Considerations
Log collectors/agentsGather logs from source systemsAgent vs agentless, bandwidth impact
Log transportSecurely transmit logs to SIEMEncryption in transit, reliability
Parsing engineNormalise diverse log formatsCustom parser development effort
Correlation engineApply detection logic to normalised eventsRule complexity, performance
Storage layerRetain logs for search and complianceHot/warm/cold tiers, cost optimisation
Analytics engineML-based anomaly detection, UEBATraining data requirements
Response layerSOAR integration for automated responsePlaybook development effort
Presentation layerDashboards, reports, investigation toolsAnalyst workflow efficiency

Essential Log Sources

Log Source CategoryExamplesDetection Value
Identity and accessActive Directory, Entra ID, Okta, SSO providersAccount compromise, privilege escalation
EndpointEDR alerts, Windows Event Logs, syslogMalware, lateral movement, data exfiltration
NetworkFirewalls, IDS/IPS, DNS, proxy, VPNCommand and control, data exfiltration
Cloud platformsAWS CloudTrail, Azure Activity Log, GCP Audit LogsMisconfigurations, unauthorised access
ApplicationsWeb servers, databases, custom applicationsApplication-layer attacks, data access
EmailEmail gateway, Microsoft 365/Google WorkspacePhishing, business email compromise
Security toolsVulnerability scanners, DLP, WAF, CASBEnrichment and correlation context

Detection Engineering

MITRE ATT&CK Coverage

TacticPriority DetectionsLog Sources Required
Initial accessPhishing links clicked, exploit attemptsEmail gateway, WAF, EDR
ExecutionSuspicious process creation, script executionEDR, Windows Event Logs
PersistenceNew scheduled tasks, registry modifications, new accountsEDR, Active Directory
Privilege escalationAdmin group changes, token manipulationActive Directory, EDR
Defence evasionLog clearing, security tool tamperingSIEM self-monitoring, EDR
Credential accessBrute force, password spraying, credential dumpingActive Directory, VPN, SSO
Lateral movementUnusual RDP, SMB traffic, service account abuseNetwork, Active Directory, EDR
ExfiltrationLarge data transfers, unusual destinationsNetwork, proxy, DLP

Detection Rule Types

Rule TypeMethodUse Case
Signature-basedMatch known patterns (IOCs, hashes, IPs)Known threats, threat intelligence
Threshold-basedAlert when event count exceeds baselineBrute force, DDoS, scanning
CorrelationMatch events across multiple sources and time windowsMulti-stage attacks, lateral movement
Anomaly-basedML detects deviation from established baselinesInsider threats, novel attacks
Behavioural (UEBA)User and entity behaviour analyticsAccount compromise, privilege abuse

SIEM vs SOAR vs XDR

CapabilitySIEMSOARXDR
Log collection and storagePrimary functionNoLimited
Threat detectionCorrelation rules, analyticsNo (consumes SIEM alerts)Built-in detection
Automated responseBasic (email, ticket)Primary function (playbooks)Built-in response actions
Compliance reportingPrimary functionNoLimited
InvestigationLog search and forensicsCase managementGuided investigation
ScopeAll log sourcesAlert response workflowsEndpoint, network, cloud, email
Best forCompliance + detection + retentionResponse automationUnified detection and response

Log Retention Requirements

FrameworkMinimum RetentionNotes
ISO 27001Defined by organisationA.8.15 requires logging policy with defined retention
SOC 21 yearCC7.2 — sufficient to support investigation
NIS2Not explicitly specifiedMust support incident investigation (Article 23)
DORA5 yearsICT-related incident records (Article 17)
PCI DSS1 year (3 months hot)Requirement 10.7 — immediately available for analysis
GDPRPurpose-limitedBalance security monitoring with data minimisation

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORA
Centralised loggingA.8.15CC7.2Art. 21(2)(b)Art. 10
Security monitoringA.8.16CC7.2Art. 21(2)(b)Art. 10
Incident detectionA.5.25CC7.3Art. 21(2)(b)Art. 10
Log protectionA.8.15CC7.2Art. 21(2)(d)Art. 10
Time synchronisationA.8.17CC7.2Art. 21(2)(d)Art. 10
Audit trailA.8.15CC7.2Art. 23Art. 17
Reporting to managementA.5.25CC7.3Art. 20Art. 13

Audit Evidence

Evidence TypeDescriptionFramework
SIEM deployment documentationArchitecture, log sources, coverageAll frameworks
Log source inventoryAll systems sending logs with statusISO 27001, SOC 2
Detection rule catalogueDocumented rules mapped to threatsISO 27001, NIS2, DORA
Alert response proceduresSOPs for each alert typeAll frameworks
MTTD/MTTR metricsMonthly detection and response timesSOC 2, NIS2, DORA
Log retention configurationRetention policies and verificationAll frameworks
Incident investigation reportsCompleted investigation recordsNIS2, DORA
SIEM health monitoringUptime, ingestion rate, storage utilisationISO 27001, SOC 2

SIEM Deployment Models

ModelProsConsBest For
On-premisesFull data control, no egress costsHigh CapEx, maintenance burdenRegulated industries, data sovereignty
Cloud-nativeElastic scaling, managed infrastructureData residency concerns, egress costsCloud-first organisations
Managed SIEM (MDR)24/7 expert monitoring, lower staffingLess customisation, vendor dependencySMBs, teams without SOC staff
HybridSensitive data on-prem, scale in cloudComplexity, dual managementOrganisations with mixed requirements

Common Mistakes

MistakeImpactFix
Collecting everythingAlert fatigue, high costs, slow queriesPrioritise log sources by threat model
No detection tuning90%+ false positive ratesBaseline, tune, and continuously improve rules
Ignoring SIEM healthSilent log gaps create blind spotsMonitor ingestion rates and alert on drops
No response proceduresAlerts without action waste investmentDocument and train on SOPs for every alert type
Single analyst dependencyNo coverage during absenceCross-train team, document runbooks
Skipping log source validationMissing critical eventsRegularly verify all sources are sending expected data
No MITRE ATT&CK mappingUnknown detection gapsMap existing rules to ATT&CK and identify coverage gaps

How Orbiq Supports SIEM Compliance

Orbiq helps you demonstrate security monitoring controls:

  • Evidence collection — Centralise SIEM deployment evidence, detection rule documentation, and MTTD/MTTR metrics
  • Continuous monitoring — Track SIEM coverage and detection effectiveness
  • Trust Center — Share your security monitoring posture via your Trust Center
  • Compliance mapping — Map SIEM controls to ISO 27001, SOC 2, NIS2, and DORA
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading