SIEM replacement- Exabeam Security Operations Platform considerations
This article is designed to augment the Conducting a SIEM use case development workshop guidance. It outlines the technical components that need to be taken into consideration when replacing Exabeam Security Operations Platform (SOP) with Splunk Enterprise Security. If you need hands-on assistance with this process, contact Splunk Professional Services experts.
It is important to understand that Exabeam Security Operations Platform (SOP) is built around user and entity behavior analytics (UEBA) and incorporates components of SIEM, threat detection, incident response, and SOAR (security orchestration, automation, and response). A simple one-to-one alignment of features between Exabeam is not possible with Splunk Enterprise Security (ES), and considerations for additional Splunk products and applications should be taken into account prior to any deployment of Splunk ES.
Sizing and licensing
Exabeam Security Operations Platform generally uses a licensing model that is different from traditional SIEM license models. SOP is licensed based on several factors of an organization's environment, including the number of users, devices or endpoints monitored, and the specific features of Exabeam modules added to the platform. Exabeam licenses SOP in one of the following formats:
- User-based licensing: Exabeam often licenses its platform based on the number of users or entities (such as devices or accounts) being monitored. This method is different from the traditional data volume-based pricing that the Splunk platform uses. This generally includes unlimited data ingestion, which means organizations can potentially collect and analyze as much data as needed without worrying about increasing costs due to higher data volumes.
- Module-based licensing: Exabeam SOP is modular, meaning different components (for example, SIEM, UEBA, SOAR) can be licensed separately or as a bundle expanding the or adding complementary feature sets.
- Subscription model: Exabeam typically offers its platform on a subscription basis, with pricing determined by the number of users, entities, and modules chosen.
For information on Splunk platform sizing and licensing, see the following:
SIEM components
The following sections provide guidance on each of the key technical components that you need to address when replacing the Exabeam Security Operations Platform with Splunk Enterprise Security. This article assumes that your workshop participants include technical SMEs who understand the functionality of your current SIEM and can use this guidance about the Splunk platform and Splunk Enterprise Security (ES) to scope the necessary changes accurately.
Cloud collectors
The Splunk platform uses of a variety of apps and add-ons that are designed for cloud platforms in order to process data from these systems. While not cloud-specific, like Exabeam Cloud Collectors, Splunk universal forwarders and heavy forwarders can be configured to collect data from cloud environments and provide more granular capability for data processing functions.
Site collectors
Splunk forwarders, particularly universal forwarders and heavy forwarders perform similar functions to those of the Exabeam site collector. Heavy forwarders provide the ability to perform more complex tasks, including data parsing, filtering, and routing of the data from the source prior to forwarding that information to a Splunk indexer or Splunk Cloud Platform. As you discuss Splunk architecture within the context of the SIEM Use Case Development Workshop, ensure you make sizing and architecture recommendations appropriate for expected data volume, filtering, or enrichment, as well as data redundancy and clustering requirements.
Security management
Action editor
The functional equivalent of the Exabeam Action Editor most aligns with capabilities provided in Splunk SOAR, but they can possibly be performed with notable event actions in some limited capability. While not as comprehensive as SOAR playbooks, notable event actions can be used to automate specific tasks such as sending alerts, creating tickets, or initiating data enrichment and contextual lookups.
Be sure you understand your standard operating procedures for incident response and triage, and determine what, if any, circumstances might be needed for Splunk Enterprise Security. This might take the form of custom workflow actions, investigation workbench customization, incident review settings, and more. Document anything that might need to be customized or extended within ES.
Correlation rules
Correlation rules in Exabeam often incorporate behavioral baselines and anomaly detection similar to how Splunk User Behavior Analytics (UBA) operates in its detection capabilities. Exabeam emphasizes ease of use and automation over customization, whereas Splunk ES correlation rules can be specifically written to create complex rule sets and multi-stage attack sequences. Comparably, risk-based alerting(RBA) focuses on aggregating risk over time through modular alerts, with a strong emphasis on customizing how and when risk scores trigger alerts.
A “lift and shift” approach of Exabeam detections to ES correlation searches is unlikely to be successful, as logic differs and the current alerts might not produce the fidelity of your goals. As you perform the use case planning portion of the SIEM Use Case Development Workshop, ensure you capture all business requirements and security monitoring objectives, and take a requirements-based approach to building ES use cases.
Context management
Exabeam’s context management is similar in nature to the Splunk ES Asset and Identity framework, with some key differences. The Splunk platform provides more flexibility and customization in how this context is managed and applied within correlation searches and enrichment rather than being an intrinsic part of a unified behavioral analytics framework.
As you work through the SIEM Use Case Development Workshop, ensure you document all sources of relevant asset and identity data. Start with the main source of truth, and add additional enrichment sources (vulnerability data, CMDB, etc) that might be relevant and provide contextual value. These can be configured directly in Splunk Enterprise Security, and will be merged into a single kvstore collection for assets and another for identities.
TDIR capabilities
Advanced analytics
Splunk User Behavior Analytics (UBA), Splunk Machine Learning Toolki (MLTK) , and the risk-based alerting (RBA) framework all have components to consider and discuss when replacing advanced analytics in Exabeam with Splunk ES.
- Splunk User Behavior Analytics: Like Exabeam, Splunk UBA builds behavioral baselines for users and entities, identifying deviations that could indicate malicious activity. UBA utilizes machine learning algorithms to detect anomalies and patterns in user and asset behavior, focusing on identifying those events that deviate from established patterns. Splunk ES and UBA use common data models. This ensures consistency in the way data is processed and analyzed across both platforms. When UBA detects an anomalous behavior, it generates a notable event which is sent to Splunk ES where it can be correlated with other security data to provide a comprehensive view of the incident.
- Machine Learning Toolkit: Splunk MLTK can be used to provide advanced and predictive analytics for a variety of security use cases. MLTK models can be integrated with Splunk ES correlation rules to apply comparable functionality to Exabeam’s Advanced Analytics.
- Risk-based alerting: RBA focuses on aggregating risk scores over time, with alerts triggered when the cumulative risk surpasses certain thresholds. This approach helps in prioritizing high-risk incidents and detect security events that take place over long periods of time with varied tactics and techniques.
As with correlation search discovery, it is important to identify and document your business requirements for advanced use cases, behavioral detections, and machine learning analytics to determine how to design and solve for these requirements within Splunk Enterprise Security. Splunk User Behavior Analytics might be required as part of your Splunk architecture, but a number of these should be able to be addressed using MLTK and standard deviation methodology within Splunk ES.
Threat center
The Threat Center in Exabeam SOP is more aligned with the features and functionality of Splunk Mission Control. Splunk Mission Control and its feature set is broader in functional scope, serving as a unified platform for all security operations. It integrates threat intelligence but also includes incident management, SOAR, case management, and workflow automation features including full SOAR capabilities, offering automated incident response, playbooks, and case management to streamline security operations.
Incident responder
The functionality of Exabeam Incident Responder aligns most closely with Splunk SOAR. Be sure you understand your standard operating procedures for incident response and triage, and determine what, if any, circumstances might be needed for Splunk Enterprise Security. This might take the form of custom workflow actions, investigation workbench customization, incident review settings, and more. Document anything that might need to be customized or extended within ES.
If you leverage Exabeam's Incident Response capabilities, be sure to discuss these within the context of the SIEM Use Case Development Workshop. It is important to identify and document your business requirements for incident response and determine how to solve for these requirements within Splunk ES and the Splunk Unified Security Architecture. Splunk SOAR might be required as part of your Splunk architecture to provide equivalent functionality.
Platform Insights
Outcomes navigator
Splunk Security Essentials (SSE) provides best practices and use cases for security operations. Analytics stories in Splunk ES, similar to Exabeam’s Outcomes Navigator, provide detailed guidance on how to detect and mitigate specific threats and guidance on security use case strategy. However, Splunk’s analytics stories are more focused on individual use cases, while Exabeam's Outcomes Navigator provides a broader, outcome-driven security framework. Document anything that might need to be customized or extended within ES.
Service health and consumption
The Splunk Monitoring Console (SMC) tracks the health of Splunk services, indexers, search heads, and forwarders. It monitors system performance, availability, and resource usage, similar to Exabeam’s Service Health feature.
The Splunk License Usage Dashboard provides insights into how much data is being indexed relative to the licensed volume, helping administrators manage license consumption and data usage over time, similar to Exabeam’s Consumption feature.
Platform health and monitoring considerations should be discussed and documented but might be outside the scope of the SIEM Replacement Workshop.
Architecture: Clustering and data redundancy
Both Exabeam SOP and the Splunk platform provide clustering and data redundancy capabilities, designed to ensure system reliability, data integrity, and continuous operation. The Splunk platform utilizes a distributed architecture in which data indexing and searching can be scaled across multiple indexer and search head nodes. Additionally, it supports indexer clustering for data redundancy and search head clustering for high availability and load balancing. It might be necessary to consider the following in architecture discussions:
Load balancing
The Splunk platform provides the ability to distribute the incoming data across multiple indexer nodes to balance the load. Use Sp
lunk universal forwarders to distribute data to multiple indexers, configuring to round-robin data among the available indexers or to use more sophisticated load balancing strategies based on the volume of data or the number of events.Data replication
The Splunk platform supports indexer replication where each piece of data can be replicated across multiple indexers to prevent data loss. Search head clustering provides fault tolerance for search management.
Other possible components
The following components are additional considerations that might be applicable and that align with the Splunk unified security roadmap.
Threat Intelligence Service (TIS)
Exabeam TIS is similar to that in SplThreat Intelligence framework that allows it to ingest, normalize, and leverage threat data from various external sources. This can include commercial feeds, open-source feeds, and custom threat intelligence sources.
unk ES and the built-inData migration planning
Migrating from Exabeam Security Operations Platform SIEM to Splunk Enterprise Security involves careful planning, understanding of the differences between the two systems, and careful execution to ensure that security monitoring and response capabilities are maintained throughout the transition.
- Assessment and planning:
- Fully understand the scope and migration requirements, including features utilized, data types, volume, and other timelines or constraints
- Identify applicable data sources to be migrated and determine how they map to the Splunk platform
- Data extraction
- You can use available APIs, DB connectors or export utilities to extract data, depending on the data type to be extracted
- It is possible that custom developed or third-party tools will be required to extract certain data from Exabeam Security Operations Platform in a format compatible with Splunk ES
- Data transformation
- Convert extracted data into a suitable format for ingestion into the Splunk platform (log files, CSV, or other supported input methods (HEC, UF, etc)
- Consider any data transformation requirements, such as time stamping or line breaking
- Translate Exabeam Security Operations Platform rules, alerts, and dashboards in Splunk search language (SPL) and reporting framework.
- Data ingestion
- Ingest data into the Splunk platform using the appropriate ingestion methods (UF, HEC, DBX, etc)
- Apply full getting data in processes for all ingested data
- Install and configure all appropriate search and index time field extraction configurations (preferably with Splunk-supported TAs)
- Verification and validation
- Verify that data appears as expected in the Splunk platform and retains expected integrity and structure
- Perform any required troubleshooting or adjustments if there are any issues during migration process
- Engage end-users to test the functionality and usability of Splunk ES to ensure it meets their needs. Collect feedback and make necessary adjustments
- Migration and cutover
- Plan for any possible incremental migration and cutover. For example, you might want to have a dual feed plan built until your planned cutover date to Splunk ES
- Ensure this plan has sign-off with all project stakeholders and technical leads
- Post-migration activities
- Optimize searches, dashboards, and alerts based on the actual data and usage patterns in Splunk ES
Additional resources
The following resources might help you plan your Splunk platform architecture for a SIEM replacement: