🔐 Elastic Stack (ELK): The Basics — SOC Analyst Guide



🔐 Elastic Stack (ELK): The Basics — SOC Analyst Guide

📘 Task 1: Introduction

Elastic Stack (ELK) is widely used in modern Security Operations Centers (SOC) for log analysis and investigations. Although it is not a traditional SIEM, its powerful search and visualization capabilities make it function like one.

🎯 Learning Objectives

  • Understand ELK components

  • Explore features of ELK

  • Learn searching & filtering

  • Investigate VPN logs

  • Create dashboards & visualizations


📘 Task 2: Components of ELK

Elastic Stack consists of four main components:

1. Elasticsearch

  • Stores and analyzes data

  • Works with JSON documents

  • Provides fast search using REST API

2. Logstash

  • Data processing pipeline

  • Collects, filters, and sends data

Structure:

  • Input → Source of data

  • Filter → Normalize data

  • Output → Destination

3. Beats

  • Lightweight agents

  • Send data from endpoints

4. Kibana

  • Visualization tool

  • Used for dashboards and investigations


✅ Answers:

  • Logstash is used to visualize data → nay

  • Elasticstash supports all formats except JSON → nay


📘 Task 3: Discover Tab (Log Analysis)

The Discover Tab in Kibana is where SOC analysts spend most of their time.

🔍 Features:

  • Logs view

  • Fields panel

  • Search bar (KQL)

  • Time filter

  • Index pattern


✅ Answers:

  • Total hits → 2861

  • Max connections IP → 238.163.231.224

  • User with max traffic → James

  • Emanda max source IP → 107.14.1.247

  • Spike IP (Jan 11) → 172.201.60.191

  • Connections excluding New York → 48


📘 Task 4: KQL (Kibana Query Language)

KQL helps in searching logs efficiently.

🔎 Types of Search:

1. Free Text Search

Example:
United States

2. Field-Based Search

Example:
Source_ip : 238.163.231.224

3. Operators

  • AND

  • OR

  • NOT


✅ Answers:

  • Records (US + James OR Albert) → 161

  • Johny Brown VPN after termination → 1


📘 Task 5: Visualization

Kibana allows creating:

  • Tables

  • Pie charts

  • Bar charts

📊 Use Cases:

  • Identify trends

  • Correlate fields

  • Monitor anomalies


📘 Task 6: Failed Login Analysis

Created a visualization for failed VPN attempts.


✅ Answers:

  • User with most failed attempts → Simon

  • Wrong attempts in January → 274


📘 Task 7: Dashboard & Insights

Dashboards provide:

  • Real-time monitoring

  • Centralized view

  • Easy anomaly detection


📘 Task 8: Conclusion

Elastic Stack (ELK) is a powerful tool for SOC analysts. It helps in:

  • Collecting logs

  • Searching data

  • Detecting threats

  • Visualizing insights

It may not be a traditional SIEM, but it is widely used as one in real-world security operations.


🎉 Final Note

This hands-on lab gave a real-world experience of:

  • Investigating VPN logs

  • Detecting anomalies

  • Creating dashboards

Comments

Popular Posts