Use the security requirements and template below to provide management with your own unique feasibility assessment for 3 tools:
• Title page (does not count towards the 4-5-page requirement)
• 1.0 Purpose – This section must identify each option and the technical feasibility (or likelihood) of each option meeting the SEIM security requirements identified below
• 1.1 Option #1: Describe the 1st SEIM tool option and how it aligns with security requirements
• 1.2 Option #2: Describe the 2nd SEIM tool option and how it aligns with security requirements
• 1.2 Option #3: Describe the 3rd SEIM tool option and how it aligns with security requirements
• 1.3 Select the Preferred option from the above 3 SEIM solutions and for the selected option address the following:
o Explain the technical feasibility for the selected SEIM solution
o Explain how the selected SEIM solution addresses the security requirements
o Explain the technical risks in selecting any one of the SEIM solutions
• Summary/Conclusion
1. Perform Log Collection
2. Provide Log Management
3. Provide a product that analyzes and correlates network activity
4. Provide a SEIM solution which can generate or be compatible with a ticketing system
5. Provide the ability to meet audit requirements with monitoring and alerting capabilities