AuditRubric
de-ae-3 high Detect / Adverse Event Analysis

Information is correlated from multiple sources

Sophisticated attacks rarely trigger a single high-confidence alert. They generate low-confidence signals across multiple systems: one failed login here, one unusual process there, one unexpected outbound connection. Correlation is the practice of connecting these dots: combining signals from different sources to reveal a pattern that is invisible when each signal is viewed in isolation. Organizations that analyze each alert independently miss multi-stage attacks that become obvious in aggregate.

Estimated effort: 6h
log-correlationsiemthreat-intelligencedetectionmulti-source

Implementation steps

  1. 1

    Centralize logs from all security-relevant sources

    Ensure that all security-relevant log sources feed into a single platform where they can be correlated: endpoint logs, network logs, authentication logs, application logs, cloud service logs, and DNS logs. Standardize timestamps to UTC and normalize field names across sources so that cross-source queries work reliably. Identify any log source gaps and close them.

    splunkelasticmicrosoft-sentineldatadogsumo-logic
  2. 2

    Implement multi-source correlation rules

    Write correlation rules that span multiple log sources: a rule that fires when the same user has a failed login from one location followed by a successful login from a different country within an hour; a rule that fires when a host makes a connection to a newly registered domain shortly after receiving an email with a link. These compound detections require all relevant data to be present and queryable together.

    splunkmicrosoft-sentinelelasticdatadog
  3. 3

    Integrate threat intelligence feeds for enrichment and correlation

    Subscribe to threat intelligence feeds that provide indicators of compromise (IOCs): known malicious IP addresses, domains, file hashes, and attack patterns. Automatically enrich security events with this intelligence and write rules that trigger when any event matches a known IOC. This enables correlation between your internal activity and global threat data, catching known-bad infrastructure before you have observed malicious behavior from it.

    recorded-futurecrowdstrike-falcon-intelalienvault-otxmisppalo-alto-autofocus

Evidence required

Log source inventory and centralization evidence

Evidence that logs from multiple sources are aggregated in a common platform for correlation.

  • · SIEM data source inventory listing all connected log sources
  • · Log pipeline configuration showing normalization and routing
  • · Coverage assessment showing percentage of critical assets with logs flowing

Correlation rule configuration

Evidence that multi-source correlation rules are implemented and active.

  • · SIEM detection rule library showing cross-source correlation logic
  • · Threat intelligence integration configuration
  • · Sample correlation alert demonstrating multi-source analysis

Related controls