13.1
IG2 IG3

Centralize Security Event Alerting

Asset Type: Network
Security Function: Detect

Description

Centralize security event alerting across enterprise assets for log correlation and analysis. Best practice implementation requires the use of a SIEM, which includes vendor-defined event correlation alerts. A log analytics platform configured with security-relevant correlation alerts also satisfies this Safeguard.

Implementation Checklist

1
Deploy detection tools or enable detection capabilities
2
Configure alerting thresholds and notification channels
3
Establish monitoring schedule and review process
4
Test detection capabilities with simulated events
5
Document detection procedures and escalation paths
6
Enable logging on all in-scope systems
7
Configure log forwarding to centralized SIEM
8
Define log retention periods per policy
9
Establish log review schedule and procedures
10
Select centralized management platform
11
Integrate all in-scope systems and data sources
12
Configure dashboards and reporting
13
Inventory all third-party service providers
14
Classify third parties by risk level
15
Conduct security assessments of critical vendors
16
Include security requirements in contracts

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Undetected Lateral Movement Due to Siloed Log Analysis

Confidentiality

An attacker compromises a single endpoint and moves laterally across the network undetected because security events from different sources are not correlated in a centralized platform.

Delayed Breach Detection from Fragmented Alert Sources

Confidentiality

A data exfiltration campaign persists for months because firewall, endpoint, and authentication logs are reviewed independently rather than correlated, preventing analysts from connecting related indicators of compromise.

Alert Fatigue from Uncorrelated Security Events

Availability

Analysts miss critical attack indicators buried across dozens of independent log sources, allowing ransomware operators to complete their kill chain before detection.

Vulnerabilities (When Safeguard Absent)

Absence of Centralized Log Correlation

Without a SIEM or centralized alerting platform, related attack indicators across multiple systems cannot be correlated, resulting in fragmented visibility and missed detections.

Inconsistent Alerting Across Security Tools

Each security tool generates alerts independently with no unified triage process, creating blind spots where multi-stage attacks span tool boundaries without triggering a consolidated alert.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Detection tool deployment evidence (dashboard screenshots, agent status) Captured monthly
Technical Sample alert/detection output demonstrating capability Captured quarterly
Technical SIEM dashboard showing log sources and collection status Captured monthly
Record Log review records and findings Per review cycle
Document Governing policy document (current, approved, communicated) Reviewed annually