SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
© 2020 Akamai1
Fine-tune your security strategy.
Mitigate Security
Threats with SIEM
© 2020 Akamai2
developer.akamai.com/webinars
© 2020 Akamai3
Agenda
Introduction to SIEM1
Demos3
Q&A - Ask us anything in the Q&A widget4
Akamai SIEM Integration2
© 2020 Akamai4
Speaker
Mike Elissen
Developer Advocate
Akamai Technologies
Ajay Mishra
Director of Security
Technology and Strategy
Akamai Technologies
© 2020 Akamai5
Why SIEM?
DevSecOps | Security Information and Event Management
Ask us a question in the Q&A widget!
Investigate threatsDetect threats Mitigate threats
© 2020 Akamai6
Akamai SIEM Integration
DevSecOps | Security Information and Event Management
Ask us a question in the Q&A widget!
© 2020 Akamai7
Akamai SIEM Integration
DevSecOps | Security Information and Event Management
Ask us a question in the Q&A widget!
Akamai
Edge Security
Akamai
Security Events
Collector
Connector Your SIEM
1
Security events
generated in
JSON format
Pull request
Pull response
Push to SIEM
Splunk CEF Syslog SIEM API
SIEM
CEF
3
2
4
© 2020 Akamai8
Akamai SIEM Integration
DevSecOps | Security Information and Event Management
Ask us a question in the Q&A widget!
{
"type": "akamai_siem",
"format": "json",
"version": "1.0",
"attackData": {
"configId": "31987",
"policyId": "dac2_63124",
"clientIP": "66.249.82.189",
"rules": "MzkwMDAwMA%3d%3d%3bMzkwMDAwNg%3d%3d%3bMzkwMDAxMg%3d%3d%3bMzkwMDAxMw%3d%3d%3bQk9ULUFOT01BTFktSEVBREVS%3b",
"ruleVersions": "MQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3b",
"ruleMessages":
"TWlzc2luZyBBY2NlcHQtTGFuZ3VhZ2UgSGVhZGVy%3bTWlzc2luZyBDb29raWUgSGVhZGVy%3bQ29tZXMgZnJvbSBhIFByb3h5%3bT3JpZ2luYXRlcyBmcm9tIENsb3VkIElhYVMg
UHJvdmlkZXIgTmV0d29yaw%3d%3d%3bVW5rbm93biBCb3RzIChSZXF1ZXN0IEFub21hbHkp%3b",
"ruleTags":
"QUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtB
TUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9VTktOT1dOX0JPVA%3d%3d%3b",
"ruleData": "%3b%3b%3bUmVxdWVzdCBmcm9tIENsb3VkIElhYVMsIEFTTlVNIDkzMDQ%3d%3bQm90X0EzOTNFQjVBNDRCRjk4OUREOEJDQjdGNDE4QUM0MTE4%3b",
"ruleSelectors": "UkVRVUVTVF9IRUFERVJTOlVzZXItQWdlbnQ%3d%3bJlJFUVVFU1RfSEVBREVSUzpDb29raWU%3d%3b%3b%3b%3b",
"ruleActions": "bW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3b",
"apiId": "API_369224",
© 2020 Akamai9
Demo and Use Cases
1. How to configure SIEM Integration
2. Connect SIEM with Splunk
3. Launch a credential abuse attack
4. Capture events in Splunk
Ask us a question in the Q&A widget!
{
"type": "akamai_siem",
"format": "json",
"version": "1.0",
"attackData": {
"configId": "31987",
"policyId": "dac2_63124",
"clientIP": "66.249.82.189",
"rules":
"MzkwMDAwMA%3d%3d%3bMzkwMDAwNg%3d%3d%3bMzkwMDAxMg%3d%3d%3bMzkwMDAxMw%3d%3d%3b
Qk9ULUFOT01BTFktSEVBREVS%3b",
"ruleVersions": "MQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3b",
"ruleMessages":
"TWlzc2luZyBBY2NlcHQtTGFuZ3VhZ2UgSGVhZGVy%3bTWlzc2luZyBDb29raWUgSGVhZGVy%3bQ29tZXMgZnJvb
SBhIFByb3h5%3bT3JpZ2luYXRlcyBmcm9tIENsb3VkIElhYVMgUHJvdmlkZXIgTmV0d29yaw%3d%3d%3bVW5rbm93
biBCb3RzIChSZXF1ZXN0IEFub21hbHkp%3b",
"ruleTags":
"QUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3
bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3
bQUtBTUFJL0JPVC9VTktOT1dOX0JPVA%3d%3d%3b",
"ruleData":
"%3b%3b%3bUmVxdWVzdCBmcm9tIENsb3VkIElhYVMsIEFTTlVNIDkzMDQ%3d%3bQm90X0EzOTNFQjVBNDRCRj
k4OUREOEJDQjdGNDE4QUM0MTE4%3b",
"ruleSelectors":
"UkVRVUVTVF9IRUFERVJTOlVzZXItQWdlbnQ%3d%3bJlJFUVVFU1RfSEVBREVSUzpDb29raWU%3d%3b%3b%3b
%3b",
"ruleActions":
"bW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9ua
XRvcg%3d%3d%3b",
"apiId": "API_369224",
© 2020 Akamai10
Credential Stuffing Attack
PHP Login Page with Akamai Bot Manager in ALERT mode
Ask us a question in the Q&A widget!
Akamai
Edge Security
PHP Login
Page
Connector Splunk
1
Bot Manager in
ALERT mode Push to SIEM
SIEM2
© 2020 Akamai11
Best Practices
1
2
Verify requirements with Splunk
No available connector?
Use the SIEM API
3 Keep your security configuration
up-to-date
© 2020 Akamai12
Summary Visit Akamai Docs
developer.akamai.com
Let’s Recap
Webinar Resources
© 2020 Akamai13
developer.akamai.com/webinars

Más contenido relacionado

La actualidad más candente

Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeSecure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeAmazon Web Services
 
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018Amazon Web Services
 
Operational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
Operational Transformation: Teachers’ Journey from App Servers to VMware TanzuOperational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
Operational Transformation: Teachers’ Journey from App Servers to VMware TanzuVMware Tanzu
 
Seven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkSeven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkKhash Nakhostin
 
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceHow VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceVMware Tanzu
 
Securing AWS Environments
Securing AWS EnvironmentsSecuring AWS Environments
Securing AWS EnvironmentsAshish Kaushik
 
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021VMware Tanzu
 
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Amazon Web Services
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays
 
Cloud Engineer Jobs, Resume & Salary | Edureka
Cloud Engineer Jobs, Resume & Salary | EdurekaCloud Engineer Jobs, Resume & Salary | Edureka
Cloud Engineer Jobs, Resume & Salary | EdurekaEdureka!
 
Using Security To Build With Confidence - Session Sponsored by Trend Micro
Using Security To Build With Confidence - Session Sponsored by Trend MicroUsing Security To Build With Confidence - Session Sponsored by Trend Micro
Using Security To Build With Confidence - Session Sponsored by Trend MicroAmazon Web Services
 
Using Security To Build
 With Confidence In AWS - Trend Micro
Using Security To Build
 With Confidence In AWS - Trend MicroUsing Security To Build
 With Confidence In AWS - Trend Micro
Using Security To Build
 With Confidence In AWS - Trend MicroAmazon Web Services
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAmazon Web Services
 
Cisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at vmworld 2015 joann_starke_let_your_business_soarCisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at vmworld 2015 joann_starke_let_your_business_soarldangelo0772
 
Cisco at v mworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soarCisco at v mworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soarldangelo0772
 
How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWSAmazon Web Services
 

La actualidad más candente (20)

Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeSecure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_Singapore
 
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
 
Operational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
Operational Transformation: Teachers’ Journey from App Servers to VMware TanzuOperational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
Operational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
 
Seven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkSeven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit Network
 
Is Microservices SOA Done Right?
Is Microservices SOA Done Right?Is Microservices SOA Done Right?
Is Microservices SOA Done Right?
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceHow VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
 
Securing AWS Environments
Securing AWS EnvironmentsSecuring AWS Environments
Securing AWS Environments
 
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021
 
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
Cloud Engineer Jobs, Resume & Salary | Edureka
Cloud Engineer Jobs, Resume & Salary | EdurekaCloud Engineer Jobs, Resume & Salary | Edureka
Cloud Engineer Jobs, Resume & Salary | Edureka
 
Using Security To Build With Confidence - Session Sponsored by Trend Micro
Using Security To Build With Confidence - Session Sponsored by Trend MicroUsing Security To Build With Confidence - Session Sponsored by Trend Micro
Using Security To Build With Confidence - Session Sponsored by Trend Micro
 
Using Security To Build
 With Confidence In AWS - Trend Micro
Using Security To Build
 With Confidence In AWS - Trend MicroUsing Security To Build
 With Confidence In AWS - Trend Micro
Using Security To Build
 With Confidence In AWS - Trend Micro
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web Applications
 
Amazon guard duty_lab
Amazon guard duty_labAmazon guard duty_lab
Amazon guard duty_lab
 
Cisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at vmworld 2015 joann_starke_let_your_business_soarCisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at vmworld 2015 joann_starke_let_your_business_soar
 
Cisco at v mworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soarCisco at v mworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soar
 
How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWS
 

Similar a Mitigate Security Threats with SIEM

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Amazon Web Services
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Jason Jolley
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitAmazon Web Services
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyMarketingArrowECS_CZ
 
Integrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineIntegrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineAkamai Developers & Admins
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudAmazon Web Services
 
(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the CloudAmazon Web Services
 
presentacion Demo McAfee SIEM
presentacion Demo McAfee SIEMpresentacion Demo McAfee SIEM
presentacion Demo McAfee SIEMvictor bueno
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesAmazon Web Services
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 Amazon Web Services
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and ClosingAWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and ClosingHayato Kiriyama
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Amazon Web Services
 
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Amazon Web Services
 

Similar a Mitigate Security Threats with SIEM (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
Integrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineIntegrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery Pipeline
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud
 
presentacion Demo McAfee SIEM
presentacion Demo McAfee SIEMpresentacion Demo McAfee SIEM
presentacion Demo McAfee SIEM
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and ClosingAWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
 
The Akamai Security Portfolio
The Akamai Security PortfolioThe Akamai Security Portfolio
The Akamai Security Portfolio
 

Más de Akamai Developers & Admins

AWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAkamai Developers & Admins
 
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAkamai Developers & Admins
 
Fluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realFluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realAkamai Developers & Admins
 
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai Developers & Admins
 
Getting Started with User and API Management Features
Getting Started with User and API Management FeaturesGetting Started with User and API Management Features
Getting Started with User and API Management FeaturesAkamai Developers & Admins
 
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeEdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeAkamai Developers & Admins
 
Provision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xProvision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xAkamai Developers & Admins
 
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsManaging the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsAkamai Developers & Admins
 
Integrating All Akamai Media Client Solutions with AMP
Integrating All Akamai Media Client Solutions with AMPIntegrating All Akamai Media Client Solutions with AMP
Integrating All Akamai Media Client Solutions with AMPAkamai Developers & Admins
 

Más de Akamai Developers & Admins (20)

Manage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with TerraformManage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with Terraform
 
Akamai-as-Code with The Washington Post
Akamai-as-Code with The Washington PostAkamai-as-Code with The Washington Post
Akamai-as-Code with The Washington Post
 
Set up a Development Environment in 5 Minutes
Set up a Development Environment in 5 MinutesSet up a Development Environment in 5 Minutes
Set up a Development Environment in 5 Minutes
 
AWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scale
 
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
 
10 things you can do at the edge
10 things you can do at the edge10 things you can do at the edge
10 things you can do at the edge
 
How the internet is reshaping our lives
How the internet is reshaping our livesHow the internet is reshaping our lives
How the internet is reshaping our lives
 
Velocity + Fluent 2018: API Performance
Velocity + Fluent 2018: API PerformanceVelocity + Fluent 2018: API Performance
Velocity + Fluent 2018: API Performance
 
Fluent 2018: Measuring What Matters
Fluent 2018: Measuring What MattersFluent 2018: Measuring What Matters
Fluent 2018: Measuring What Matters
 
Fluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realFluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting real
 
Automation at the Edge
Automation at the EdgeAutomation at the Edge
Automation at the Edge
 
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
 
Getting Started with User and API Management Features
Getting Started with User and API Management FeaturesGetting Started with User and API Management Features
Getting Started with User and API Management Features
 
Akamai Developer General Session
Akamai Developer General SessionAkamai Developer General Session
Akamai Developer General Session
 
Akamai Admin General Session
Akamai Admin General SessionAkamai Admin General Session
Akamai Admin General Session
 
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeEdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
 
Optimizing your API to Perform at Scale
Optimizing your API to Perform at ScaleOptimizing your API to Perform at Scale
Optimizing your API to Perform at Scale
 
Provision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xProvision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.x
 
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsManaging the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
 
Integrating All Akamai Media Client Solutions with AMP
Integrating All Akamai Media Client Solutions with AMPIntegrating All Akamai Media Client Solutions with AMP
Integrating All Akamai Media Client Solutions with AMP
 

Último

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Mitigate Security Threats with SIEM

  • 1. © 2020 Akamai1 Fine-tune your security strategy. Mitigate Security Threats with SIEM
  • 3. © 2020 Akamai3 Agenda Introduction to SIEM1 Demos3 Q&A - Ask us anything in the Q&A widget4 Akamai SIEM Integration2
  • 4. © 2020 Akamai4 Speaker Mike Elissen Developer Advocate Akamai Technologies Ajay Mishra Director of Security Technology and Strategy Akamai Technologies
  • 5. © 2020 Akamai5 Why SIEM? DevSecOps | Security Information and Event Management Ask us a question in the Q&A widget! Investigate threatsDetect threats Mitigate threats
  • 6. © 2020 Akamai6 Akamai SIEM Integration DevSecOps | Security Information and Event Management Ask us a question in the Q&A widget!
  • 7. © 2020 Akamai7 Akamai SIEM Integration DevSecOps | Security Information and Event Management Ask us a question in the Q&A widget! Akamai Edge Security Akamai Security Events Collector Connector Your SIEM 1 Security events generated in JSON format Pull request Pull response Push to SIEM Splunk CEF Syslog SIEM API SIEM CEF 3 2 4
  • 8. © 2020 Akamai8 Akamai SIEM Integration DevSecOps | Security Information and Event Management Ask us a question in the Q&A widget! { "type": "akamai_siem", "format": "json", "version": "1.0", "attackData": { "configId": "31987", "policyId": "dac2_63124", "clientIP": "66.249.82.189", "rules": "MzkwMDAwMA%3d%3d%3bMzkwMDAwNg%3d%3d%3bMzkwMDAxMg%3d%3d%3bMzkwMDAxMw%3d%3d%3bQk9ULUFOT01BTFktSEVBREVS%3b", "ruleVersions": "MQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3b", "ruleMessages": "TWlzc2luZyBBY2NlcHQtTGFuZ3VhZ2UgSGVhZGVy%3bTWlzc2luZyBDb29raWUgSGVhZGVy%3bQ29tZXMgZnJvbSBhIFByb3h5%3bT3JpZ2luYXRlcyBmcm9tIENsb3VkIElhYVMg UHJvdmlkZXIgTmV0d29yaw%3d%3d%3bVW5rbm93biBCb3RzIChSZXF1ZXN0IEFub21hbHkp%3b", "ruleTags": "QUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtB TUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9VTktOT1dOX0JPVA%3d%3d%3b", "ruleData": "%3b%3b%3bUmVxdWVzdCBmcm9tIENsb3VkIElhYVMsIEFTTlVNIDkzMDQ%3d%3bQm90X0EzOTNFQjVBNDRCRjk4OUREOEJDQjdGNDE4QUM0MTE4%3b", "ruleSelectors": "UkVRVUVTVF9IRUFERVJTOlVzZXItQWdlbnQ%3d%3bJlJFUVVFU1RfSEVBREVSUzpDb29raWU%3d%3b%3b%3b%3b", "ruleActions": "bW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3b", "apiId": "API_369224",
  • 9. © 2020 Akamai9 Demo and Use Cases 1. How to configure SIEM Integration 2. Connect SIEM with Splunk 3. Launch a credential abuse attack 4. Capture events in Splunk Ask us a question in the Q&A widget! { "type": "akamai_siem", "format": "json", "version": "1.0", "attackData": { "configId": "31987", "policyId": "dac2_63124", "clientIP": "66.249.82.189", "rules": "MzkwMDAwMA%3d%3d%3bMzkwMDAwNg%3d%3d%3bMzkwMDAxMg%3d%3d%3bMzkwMDAxMw%3d%3d%3b Qk9ULUFOT01BTFktSEVBREVS%3b", "ruleVersions": "MQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3b", "ruleMessages": "TWlzc2luZyBBY2NlcHQtTGFuZ3VhZ2UgSGVhZGVy%3bTWlzc2luZyBDb29raWUgSGVhZGVy%3bQ29tZXMgZnJvb SBhIFByb3h5%3bT3JpZ2luYXRlcyBmcm9tIENsb3VkIElhYVMgUHJvdmlkZXIgTmV0d29yaw%3d%3d%3bVW5rbm93 biBCb3RzIChSZXF1ZXN0IEFub21hbHkp%3b", "ruleTags": "QUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3 bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3 bQUtBTUFJL0JPVC9VTktOT1dOX0JPVA%3d%3d%3b", "ruleData": "%3b%3b%3bUmVxdWVzdCBmcm9tIENsb3VkIElhYVMsIEFTTlVNIDkzMDQ%3d%3bQm90X0EzOTNFQjVBNDRCRj k4OUREOEJDQjdGNDE4QUM0MTE4%3b", "ruleSelectors": "UkVRVUVTVF9IRUFERVJTOlVzZXItQWdlbnQ%3d%3bJlJFUVVFU1RfSEVBREVSUzpDb29raWU%3d%3b%3b%3b %3b", "ruleActions": "bW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9ua XRvcg%3d%3d%3b", "apiId": "API_369224",
  • 10. © 2020 Akamai10 Credential Stuffing Attack PHP Login Page with Akamai Bot Manager in ALERT mode Ask us a question in the Q&A widget! Akamai Edge Security PHP Login Page Connector Splunk 1 Bot Manager in ALERT mode Push to SIEM SIEM2
  • 11. © 2020 Akamai11 Best Practices 1 2 Verify requirements with Splunk No available connector? Use the SIEM API 3 Keep your security configuration up-to-date
  • 12. © 2020 Akamai12 Summary Visit Akamai Docs developer.akamai.com Let’s Recap Webinar Resources