SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
© 2020 Akamai1
Fine-tune your security strategy.
Mitigate Security
Threats with SIEM
© 2020 Akamai2
developer.akamai.com/webinars
© 2020 Akamai3
Agenda
Introduction to SIEM1
Demos3
Q&A - Ask us anything in the Q&A widget4
Akamai SIEM Integration2
© 2020 Akamai4
Speaker
Mike Elissen
Developer Advocate
Akamai Technologies
Ajay Mishra
Director of Security
Technology and Strategy
Akamai Technologies
© 2020 Akamai5
Why SIEM?
DevSecOps | Security Information and Event Management
Ask us a question in the Q&A widget!
Investigate threatsDetect threats Mitigate threats
© 2020 Akamai6
Akamai SIEM Integration
DevSecOps | Security Information and Event Management
Ask us a question in the Q&A widget!
© 2020 Akamai7
Akamai SIEM Integration
DevSecOps | Security Information and Event Management
Ask us a question in the Q&A widget!
Akamai
Edge Security
Akamai
Security Events
Collector
Connector Your SIEM
1
Security events
generated in
JSON format
Pull request
Pull response
Push to SIEM
Splunk CEF Syslog SIEM API
SIEM
CEF
3
2
4
© 2020 Akamai8
Akamai SIEM Integration
DevSecOps | Security Information and Event Management
Ask us a question in the Q&A widget!
{
"type": "akamai_siem",
"format": "json",
"version": "1.0",
"attackData": {
"configId": "31987",
"policyId": "dac2_63124",
"clientIP": "66.249.82.189",
"rules": "MzkwMDAwMA%3d%3d%3bMzkwMDAwNg%3d%3d%3bMzkwMDAxMg%3d%3d%3bMzkwMDAxMw%3d%3d%3bQk9ULUFOT01BTFktSEVBREVS%3b",
"ruleVersions": "MQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3b",
"ruleMessages":
"TWlzc2luZyBBY2NlcHQtTGFuZ3VhZ2UgSGVhZGVy%3bTWlzc2luZyBDb29raWUgSGVhZGVy%3bQ29tZXMgZnJvbSBhIFByb3h5%3bT3JpZ2luYXRlcyBmcm9tIENsb3VkIElhYVMg
UHJvdmlkZXIgTmV0d29yaw%3d%3d%3bVW5rbm93biBCb3RzIChSZXF1ZXN0IEFub21hbHkp%3b",
"ruleTags":
"QUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtB
TUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9VTktOT1dOX0JPVA%3d%3d%3b",
"ruleData": "%3b%3b%3bUmVxdWVzdCBmcm9tIENsb3VkIElhYVMsIEFTTlVNIDkzMDQ%3d%3bQm90X0EzOTNFQjVBNDRCRjk4OUREOEJDQjdGNDE4QUM0MTE4%3b",
"ruleSelectors": "UkVRVUVTVF9IRUFERVJTOlVzZXItQWdlbnQ%3d%3bJlJFUVVFU1RfSEVBREVSUzpDb29raWU%3d%3b%3b%3b%3b",
"ruleActions": "bW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3b",
"apiId": "API_369224",
© 2020 Akamai9
Demo and Use Cases
1. How to configure SIEM Integration
2. Connect SIEM with Splunk
3. Launch a credential abuse attack
4. Capture events in Splunk
Ask us a question in the Q&A widget!
{
"type": "akamai_siem",
"format": "json",
"version": "1.0",
"attackData": {
"configId": "31987",
"policyId": "dac2_63124",
"clientIP": "66.249.82.189",
"rules":
"MzkwMDAwMA%3d%3d%3bMzkwMDAwNg%3d%3d%3bMzkwMDAxMg%3d%3d%3bMzkwMDAxMw%3d%3d%3b
Qk9ULUFOT01BTFktSEVBREVS%3b",
"ruleVersions": "MQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3b",
"ruleMessages":
"TWlzc2luZyBBY2NlcHQtTGFuZ3VhZ2UgSGVhZGVy%3bTWlzc2luZyBDb29raWUgSGVhZGVy%3bQ29tZXMgZnJvb
SBhIFByb3h5%3bT3JpZ2luYXRlcyBmcm9tIENsb3VkIElhYVMgUHJvdmlkZXIgTmV0d29yaw%3d%3d%3bVW5rbm93
biBCb3RzIChSZXF1ZXN0IEFub21hbHkp%3b",
"ruleTags":
"QUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3
bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3
bQUtBTUFJL0JPVC9VTktOT1dOX0JPVA%3d%3d%3b",
"ruleData":
"%3b%3b%3bUmVxdWVzdCBmcm9tIENsb3VkIElhYVMsIEFTTlVNIDkzMDQ%3d%3bQm90X0EzOTNFQjVBNDRCRj
k4OUREOEJDQjdGNDE4QUM0MTE4%3b",
"ruleSelectors":
"UkVRVUVTVF9IRUFERVJTOlVzZXItQWdlbnQ%3d%3bJlJFUVVFU1RfSEVBREVSUzpDb29raWU%3d%3b%3b%3b
%3b",
"ruleActions":
"bW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9ua
XRvcg%3d%3d%3b",
"apiId": "API_369224",
© 2020 Akamai10
Credential Stuffing Attack
PHP Login Page with Akamai Bot Manager in ALERT mode
Ask us a question in the Q&A widget!
Akamai
Edge Security
PHP Login
Page
Connector Splunk
1
Bot Manager in
ALERT mode Push to SIEM
SIEM2
© 2020 Akamai11
Best Practices
1
2
Verify requirements with Splunk
No available connector?
Use the SIEM API
3 Keep your security configuration
up-to-date
© 2020 Akamai12
Summary Visit Akamai Docs
developer.akamai.com
Let’s Recap
Webinar Resources
© 2020 Akamai13
developer.akamai.com/webinars

Contenu connexe

Tendances

Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeSecure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeAmazon Web Services
 
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018Amazon Web Services
 
Operational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
Operational Transformation: Teachers’ Journey from App Servers to VMware TanzuOperational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
Operational Transformation: Teachers’ Journey from App Servers to VMware TanzuVMware Tanzu
 
Seven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkSeven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkKhash Nakhostin
 
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceHow VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceVMware Tanzu
 
Securing AWS Environments
Securing AWS EnvironmentsSecuring AWS Environments
Securing AWS EnvironmentsAshish Kaushik
 
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021VMware Tanzu
 
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Amazon Web Services
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays
 
Cloud Engineer Jobs, Resume & Salary | Edureka
Cloud Engineer Jobs, Resume & Salary | EdurekaCloud Engineer Jobs, Resume & Salary | Edureka
Cloud Engineer Jobs, Resume & Salary | EdurekaEdureka!
 
Using Security To Build With Confidence - Session Sponsored by Trend Micro
Using Security To Build With Confidence - Session Sponsored by Trend MicroUsing Security To Build With Confidence - Session Sponsored by Trend Micro
Using Security To Build With Confidence - Session Sponsored by Trend MicroAmazon Web Services
 
Using Security To Build
 With Confidence In AWS - Trend Micro
Using Security To Build
 With Confidence In AWS - Trend MicroUsing Security To Build
 With Confidence In AWS - Trend Micro
Using Security To Build
 With Confidence In AWS - Trend MicroAmazon Web Services
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAmazon Web Services
 
Cisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at vmworld 2015 joann_starke_let_your_business_soarCisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at vmworld 2015 joann_starke_let_your_business_soarldangelo0772
 
Cisco at v mworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soarCisco at v mworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soarldangelo0772
 
How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWSAmazon Web Services
 

Tendances (20)

Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeSecure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_Singapore
 
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
Adding the Sec to Your DevOps Pipelines (SEC332-R1) - AWS re:Invent 2018
 
Operational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
Operational Transformation: Teachers’ Journey from App Servers to VMware TanzuOperational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
Operational Transformation: Teachers’ Journey from App Servers to VMware Tanzu
 
Seven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkSeven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit Network
 
Is Microservices SOA Done Right?
Is Microservices SOA Done Right?Is Microservices SOA Done Right?
Is Microservices SOA Done Right?
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceHow VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
 
Securing AWS Environments
Securing AWS EnvironmentsSecuring AWS Environments
Securing AWS Environments
 
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021
 
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
Cloud Engineer Jobs, Resume & Salary | Edureka
Cloud Engineer Jobs, Resume & Salary | EdurekaCloud Engineer Jobs, Resume & Salary | Edureka
Cloud Engineer Jobs, Resume & Salary | Edureka
 
Using Security To Build With Confidence - Session Sponsored by Trend Micro
Using Security To Build With Confidence - Session Sponsored by Trend MicroUsing Security To Build With Confidence - Session Sponsored by Trend Micro
Using Security To Build With Confidence - Session Sponsored by Trend Micro
 
Using Security To Build
 With Confidence In AWS - Trend Micro
Using Security To Build
 With Confidence In AWS - Trend MicroUsing Security To Build
 With Confidence In AWS - Trend Micro
Using Security To Build
 With Confidence In AWS - Trend Micro
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web Applications
 
Amazon guard duty_lab
Amazon guard duty_labAmazon guard duty_lab
Amazon guard duty_lab
 
Cisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at vmworld 2015 joann_starke_let_your_business_soarCisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at vmworld 2015 joann_starke_let_your_business_soar
 
Cisco at v mworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soarCisco at v mworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soar
 
How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWS
 

Similaire à Mitigate Security Threats with SIEM

Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Amazon Web Services
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Jason Jolley
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitAmazon Web Services
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyMarketingArrowECS_CZ
 
Integrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineIntegrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineAkamai Developers & Admins
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudAmazon Web Services
 
(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the CloudAmazon Web Services
 
presentacion Demo McAfee SIEM
presentacion Demo McAfee SIEMpresentacion Demo McAfee SIEM
presentacion Demo McAfee SIEMvictor bueno
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesAmazon Web Services
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 Amazon Web Services
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and ClosingAWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and ClosingHayato Kiriyama
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Amazon Web Services
 
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Amazon Web Services
 
Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security
 

Similaire à Mitigate Security Threats with SIEM (20)

Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
Integrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineIntegrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery Pipeline
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud
 
presentacion Demo McAfee SIEM
presentacion Demo McAfee SIEMpresentacion Demo McAfee SIEM
presentacion Demo McAfee SIEM
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
AWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and ClosingAWS re:Inforce 2019 re:Cap Opening and Closing
AWS re:Inforce 2019 re:Cap Opening and Closing
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
 
The Akamai Security Portfolio
The Akamai Security PortfolioThe Akamai Security Portfolio
The Akamai Security Portfolio
 
Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
 

Plus de Akamai Developers & Admins

AWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAkamai Developers & Admins
 
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAkamai Developers & Admins
 
Fluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realFluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realAkamai Developers & Admins
 
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai Developers & Admins
 
Getting Started with User and API Management Features
Getting Started with User and API Management FeaturesGetting Started with User and API Management Features
Getting Started with User and API Management FeaturesAkamai Developers & Admins
 
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeEdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeAkamai Developers & Admins
 
Provision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xProvision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xAkamai Developers & Admins
 
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsManaging the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsAkamai Developers & Admins
 
Integrating All Akamai Media Client Solutions with AMP
Integrating All Akamai Media Client Solutions with AMPIntegrating All Akamai Media Client Solutions with AMP
Integrating All Akamai Media Client Solutions with AMPAkamai Developers & Admins
 

Plus de Akamai Developers & Admins (20)

Manage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with TerraformManage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with Terraform
 
Akamai-as-Code with The Washington Post
Akamai-as-Code with The Washington PostAkamai-as-Code with The Washington Post
Akamai-as-Code with The Washington Post
 
Set up a Development Environment in 5 Minutes
Set up a Development Environment in 5 MinutesSet up a Development Environment in 5 Minutes
Set up a Development Environment in 5 Minutes
 
AWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scale
 
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
 
10 things you can do at the edge
10 things you can do at the edge10 things you can do at the edge
10 things you can do at the edge
 
How the internet is reshaping our lives
How the internet is reshaping our livesHow the internet is reshaping our lives
How the internet is reshaping our lives
 
Velocity + Fluent 2018: API Performance
Velocity + Fluent 2018: API PerformanceVelocity + Fluent 2018: API Performance
Velocity + Fluent 2018: API Performance
 
Fluent 2018: Measuring What Matters
Fluent 2018: Measuring What MattersFluent 2018: Measuring What Matters
Fluent 2018: Measuring What Matters
 
Fluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realFluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting real
 
Automation at the Edge
Automation at the EdgeAutomation at the Edge
Automation at the Edge
 
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
 
Getting Started with User and API Management Features
Getting Started with User and API Management FeaturesGetting Started with User and API Management Features
Getting Started with User and API Management Features
 
Akamai Developer General Session
Akamai Developer General SessionAkamai Developer General Session
Akamai Developer General Session
 
Akamai Admin General Session
Akamai Admin General SessionAkamai Admin General Session
Akamai Admin General Session
 
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeEdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
 
Optimizing your API to Perform at Scale
Optimizing your API to Perform at ScaleOptimizing your API to Perform at Scale
Optimizing your API to Perform at Scale
 
Provision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xProvision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.x
 
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsManaging the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
 
Integrating All Akamai Media Client Solutions with AMP
Integrating All Akamai Media Client Solutions with AMPIntegrating All Akamai Media Client Solutions with AMP
Integrating All Akamai Media Client Solutions with AMP
 

Dernier

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Mitigate Security Threats with SIEM

  • 1. © 2020 Akamai1 Fine-tune your security strategy. Mitigate Security Threats with SIEM
  • 3. © 2020 Akamai3 Agenda Introduction to SIEM1 Demos3 Q&A - Ask us anything in the Q&A widget4 Akamai SIEM Integration2
  • 4. © 2020 Akamai4 Speaker Mike Elissen Developer Advocate Akamai Technologies Ajay Mishra Director of Security Technology and Strategy Akamai Technologies
  • 5. © 2020 Akamai5 Why SIEM? DevSecOps | Security Information and Event Management Ask us a question in the Q&A widget! Investigate threatsDetect threats Mitigate threats
  • 6. © 2020 Akamai6 Akamai SIEM Integration DevSecOps | Security Information and Event Management Ask us a question in the Q&A widget!
  • 7. © 2020 Akamai7 Akamai SIEM Integration DevSecOps | Security Information and Event Management Ask us a question in the Q&A widget! Akamai Edge Security Akamai Security Events Collector Connector Your SIEM 1 Security events generated in JSON format Pull request Pull response Push to SIEM Splunk CEF Syslog SIEM API SIEM CEF 3 2 4
  • 8. © 2020 Akamai8 Akamai SIEM Integration DevSecOps | Security Information and Event Management Ask us a question in the Q&A widget! { "type": "akamai_siem", "format": "json", "version": "1.0", "attackData": { "configId": "31987", "policyId": "dac2_63124", "clientIP": "66.249.82.189", "rules": "MzkwMDAwMA%3d%3d%3bMzkwMDAwNg%3d%3d%3bMzkwMDAxMg%3d%3d%3bMzkwMDAxMw%3d%3d%3bQk9ULUFOT01BTFktSEVBREVS%3b", "ruleVersions": "MQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3b", "ruleMessages": "TWlzc2luZyBBY2NlcHQtTGFuZ3VhZ2UgSGVhZGVy%3bTWlzc2luZyBDb29raWUgSGVhZGVy%3bQ29tZXMgZnJvbSBhIFByb3h5%3bT3JpZ2luYXRlcyBmcm9tIENsb3VkIElhYVMg UHJvdmlkZXIgTmV0d29yaw%3d%3d%3bVW5rbm93biBCb3RzIChSZXF1ZXN0IEFub21hbHkp%3b", "ruleTags": "QUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtB TUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9VTktOT1dOX0JPVA%3d%3d%3b", "ruleData": "%3b%3b%3bUmVxdWVzdCBmcm9tIENsb3VkIElhYVMsIEFTTlVNIDkzMDQ%3d%3bQm90X0EzOTNFQjVBNDRCRjk4OUREOEJDQjdGNDE4QUM0MTE4%3b", "ruleSelectors": "UkVRVUVTVF9IRUFERVJTOlVzZXItQWdlbnQ%3d%3bJlJFUVVFU1RfSEVBREVSUzpDb29raWU%3d%3b%3b%3b%3b", "ruleActions": "bW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3b", "apiId": "API_369224",
  • 9. © 2020 Akamai9 Demo and Use Cases 1. How to configure SIEM Integration 2. Connect SIEM with Splunk 3. Launch a credential abuse attack 4. Capture events in Splunk Ask us a question in the Q&A widget! { "type": "akamai_siem", "format": "json", "version": "1.0", "attackData": { "configId": "31987", "policyId": "dac2_63124", "clientIP": "66.249.82.189", "rules": "MzkwMDAwMA%3d%3d%3bMzkwMDAwNg%3d%3d%3bMzkwMDAxMg%3d%3d%3bMzkwMDAxMw%3d%3d%3b Qk9ULUFOT01BTFktSEVBREVS%3b", "ruleVersions": "MQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3bMQ%3d%3d%3b", "ruleMessages": "TWlzc2luZyBBY2NlcHQtTGFuZ3VhZ2UgSGVhZGVy%3bTWlzc2luZyBDb29raWUgSGVhZGVy%3bQ29tZXMgZnJvb SBhIFByb3h5%3bT3JpZ2luYXRlcyBmcm9tIENsb3VkIElhYVMgUHJvdmlkZXIgTmV0d29yaw%3d%3d%3bVW5rbm93 biBCb3RzIChSZXF1ZXN0IEFub21hbHkp%3b", "ruleTags": "QUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3 bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3bQUtBTUFJL0JPVC9SRVFVRVNUX0FOT01BTFk%3d%3 bQUtBTUFJL0JPVC9VTktOT1dOX0JPVA%3d%3d%3b", "ruleData": "%3b%3b%3bUmVxdWVzdCBmcm9tIENsb3VkIElhYVMsIEFTTlVNIDkzMDQ%3d%3bQm90X0EzOTNFQjVBNDRCRj k4OUREOEJDQjdGNDE4QUM0MTE4%3b", "ruleSelectors": "UkVRVUVTVF9IRUFERVJTOlVzZXItQWdlbnQ%3d%3bJlJFUVVFU1RfSEVBREVSUzpDb29raWU%3d%3b%3b%3b %3b", "ruleActions": "bW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9uaXRvcg%3d%3d%3bbW9ua XRvcg%3d%3d%3b", "apiId": "API_369224",
  • 10. © 2020 Akamai10 Credential Stuffing Attack PHP Login Page with Akamai Bot Manager in ALERT mode Ask us a question in the Q&A widget! Akamai Edge Security PHP Login Page Connector Splunk 1 Bot Manager in ALERT mode Push to SIEM SIEM2
  • 11. © 2020 Akamai11 Best Practices 1 2 Verify requirements with Splunk No available connector? Use the SIEM API 3 Keep your security configuration up-to-date
  • 12. © 2020 Akamai12 Summary Visit Akamai Docs developer.akamai.com Let’s Recap Webinar Resources