You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: _posts/2025-03-05-OpenSearch-as-a-SIEM-Solution.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ Using OpenSearch, an organization can aggregate all of its audit logs into one p
72
72
### <u>Real-time compliance alerting</u>
73
73
Compliance monitoring isn't just about historical audits. It also requires continuous monitoring to ensure that violations or suspicious activities are caught early. OpenSearch detectors and rules can be written not only for security threats but also for compliance policies. For instance, a user could create a rule that generates an alert when any database containing customer data is accessed outside of business hours.
74
74
75
-
### <u>Audit Logging and Access Control.</u>
75
+
### <u>Audit logging and access control</u>
76
76
OpenSearch includes features that help ensure the integrity and security of log data. It provides audit logging capabilities that track access to the OpenSearch cluster and any changes made. This logging is useful for demonstrating that the SIEM data is protected.[4](https://opensearch.org/docs/latest/security/audit-logs/index/#:~:text=Audit%20logs%20let%20you%20track,where%20to%20store%20the%20logs)
77
77
78
78
OpenSearch can log events like user login to the SIEM, attempts to query or delete data, and changes to roles/permissions. These audit logs help answer “who watched the watchers” – ensuring that all access to sensitive logs is recorded. In a compliance context, this means users can show that only authorized individuals accessed the audit data and that every access is traceable.
0 commit comments