SOC2-CC7-SIEM

Security Monitoring and SIEM

detectivehigh effectivenessDaily

What this control does

Centralized log aggregation and automated alerting for security-relevant events across production systems.

Implementation guidance

Ship logs from application servers, cloud audit trails (CloudTrail, GCP Audit Logs), and IAM events to a SIEM (Datadog, Splunk, Sentinel). Configure alerts for: root account use, failed authentication spikes, privilege escalation, and unusual data access. Review alert queue daily. Retain logs for at least 12 months.

Requirements satisfied

CC7.2

Why it matters

A compromised account, malicious insider, or attacker accessing systems is invisible without active monitoring—breaches go undetected for weeks or months. SIEM aggregates logs from disparate sources into a single searchable record with real-time alerts, enabling security teams to detect and respond to incidents before data theft occurs or lateral movement succeeds.

Evidence to collect

  • SIEM configuration export showing enabled log sources (e.g., CloudTrail, application servers, IAM logs)
  • Alert rule definitions with thresholds (e.g., 'fail_login_count > 5 in 5 min', 'root_account_used', 'iam:CreateAccessKey')
  • Screenshots of last 7 days of alert queue with timestamps and resolution notes
  • Log retention policy document or SIEM admin panel showing 12-month retention setting and validated retention dates

Testing procedure

Request the SIEM configuration document and validate that (1) log sources include application servers, cloud audit logs, and IAM events; (2) alerts exist for root/service account activity, authentication failures >N threshold, privilege escalations, and sensitive data access; (3) auditor simulates a test event (e.g., failed login loop, API key usage) and confirms alert fires and is reviewed in alert queue within 24 hours; (4) verify 12-month log retention via SIEM retention policy and spot-check a log entry from 11 months prior.

Common gotchas

Teams ship logs to SIEM but don't configure meaningful alerts—logs exist but incidents go unnoticed. Worse, alert fatigue causes teams to silence or delete critical rules; confirm alerts are actively tuned based on real false-positive rates and aren't all muted. Ensure on-call rotation actually reviews the queue daily rather than assuming automation handles it.