Identity Revive

Identity Revive

Log Integration Patterns

Save over 10 hours a week as every project needs to integrate with your SIEM

Rakkhi Joy's avatar
Rakkhi Joy
Nov 29, 2023
∙ Paid

I’m the co-founder of Identity Revive. We can help you:

  • Build a business case for Cyber Security.

  • Help you with all your cyber security logging and monitoring needs.

  • Architect, design, deliver and run your cyber security controls in code so you are compliant with regulation and don't suffer from a cyber incident.

  • Make sure you are getting value out of your Managed Service Providers (MSP’s) and help them use less ClickOps so you get charged less and they make fewer errors.

Also remember if you are a Not-For-Profit (NFP) or in Education or Health sectors as an Non-Government-Organization (NGO), we provide free consulting as a way to Give Back to the community and our Country (Australia). Email me at: rakkhi@identityrevive.com .

Background / Description

Back in the 1970’s they came up with AAA (Authentication, Authorization, Auditing). That is the basics for security. Protect the front door (identity), know what happened (logging). These days you can drive a lot of correlation and automated actions, including using AI and Machine learning from logs.

If you have ever been through an incident, knowing what happened is crucial.

If all that doesn’t convince you, well most regulation and industry frameworks such as NIST or PCI-DSS will require you to log and monitor.

Log integration patterns

In addition to identity and access, the one thing all your projects will need is:

  • What to log.

  • What to configure for each log.

  • How to integrate with your SIEM or whatever system or service you use to provide cyber security monitoring.

If you are an organization with approx 3000 staff, 2 geographies, 20 major projects on the go at any one stage, 5 security architects, these patterns will save you about 10 hours per week. More savings the bigger you are and the more you can get projects and solution architects and designers to self service while maintaining within risk appetite.

User's avatar

Continue reading this post for free, courtesy of Rakkhi Joy.

Or purchase a paid subscription.
© 2026 Identity Revive · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture