Elastic Security (part of the ELK Stack) is a powerful open-source SIEM solution. It combines Elasticsearch for storage and search, Kibana for visualization, and Beats/Agents for data collection. Many organizations choose it for its flexibility and cost-effectiveness.
Think of the ELK Stack like building blocks: Elasticsearch is the warehouse where all your logs are stored and indexed, Kibana is the window into that warehouse (dashboards and searches), and Beats are the delivery trucks bringing logs from everywhere.
ELK vs Elastic Security
ELK Stack is the core platform. Elastic Security adds security-specific features: detection rules, case management, and threat intelligence integration. The free tier includes many security features!
ELK Stack Architecture
KQL Query Basics
Security Searches in Kibana
Detection Rules
Elastic Detection Rules
Elastic provides hundreds of pre-built detection rules aligned to MITRE ATT&CK. Enable them in Security → Detections → Rules → Load Elastic prebuilt rules. Review and enable relevant ones!
Event Query Language (EQL)
Security Dashboards
Timeline Investigation
Elastic Security Methodology
Elastic Security Workflow
1
IngestConfigure Beats/Agent to collect logs
2
Enable RulesLoad and enable detection rules
3
MonitorReview alerts in Security Overview
4
InvestigateUse Timeline and KQL to dig deeper
5
DocumentCreate cases for confirmed incidents
6
TuneAdjust rules to reduce false positives
Knowledge Check
Challenges
Key Takeaways
- ELK Stack: Beats collect, Elasticsearch stores, Kibana visualizes
- KQL is Kibana's query language: field: value AND/OR/NOT
- EQL detects sequences - perfect for attack chain detection
- Elastic provides pre-built detection rules mapped to MITRE ATT&CK
- Timeline is the investigation workspace - pivot, note, document
- Free tier includes many security features - great for learning