Chapter 7: Support & Integration

Supporting system requirements, third-party integrations, and ecosystem dependencies for a complete monitoring architecture

A cybersecurity monitoring system does not operate in isolation. Its effectiveness is directly proportional to the breadth and depth of its integrations with the surrounding IT and security ecosystem. The SIEM platform must receive data from network infrastructure, endpoint security tools, identity management systems, cloud platforms, and threat intelligence feeds to provide comprehensive visibility. This chapter defines the supporting system requirements and integration specifications for each ecosystem component.

7.1 Integrated Support Requirements Overview

The following diagram illustrates all supporting systems that must be integrated with the central SIEM platform to achieve full monitoring coverage. Each supporting system connects to the SIEM through a specific protocol and port, providing a distinct category of security telemetry. The integration map serves as the master reference for network firewall rule configuration and integration project planning.

Integrated Support Requirements Diagram

Figure 7.1: Integrated Support Requirements Diagram — All supporting systems integrated with the central SIEM Platform, showing connection protocols and ports for: Network Infrastructure (Syslog/NetFlow), Identity & Access Management (LDAP/API), IT Service Management (REST API), Endpoint Security (Agent/API), Cloud Platforms (CloudTrail/API), Threat Intelligence Feeds (STIX/TAXII), Vulnerability Management (API), and SOAR Platform (Webhook/API).

Supporting SystemIntegration TypeProtocol/PortData ProvidedIntegration Priority
Network Infrastructure (Firewalls, Switches, Routers)Log forwardingSyslog UDP/514, TCP/6514; NetFlow UDP/2055Firewall allow/deny, routing changes, flow recordsCritical
Identity & Access Management (AD, LDAP, IAM)Directory query + log forwardingLDAP TCP/389, 636; HTTPS TCP/443Authentication events, group membership, privilege changesCritical
IT Service Management (ServiceNow, Jira)Bidirectional APIREST API HTTPS TCP/443Incident tickets, change records, CMDB asset dataHigh
Endpoint Security (EDR, AV, DLP)Agent + APIAgent TCP/443; HTTPS TCP/443Endpoint telemetry, malware detections, DLP violationsCritical
Cloud Platforms (AWS, Azure, GCP)API pullHTTPS TCP/443CloudTrail, Azure Monitor, GCP Logging eventsHigh
Threat Intelligence Feeds (MISP, commercial)STIX/TAXII pull + APIHTTPS TCP/443IOC feeds, threat actor profiles, vulnerability intelligenceHigh
Vulnerability Management (Qualys, Tenable)API pullHTTPS TCP/443Asset vulnerability data, scan results, risk scoresMedium
SOAR PlatformWebhook + APIHTTPS TCP/443Playbook execution results, case management updatesHigh

7.2 Network Infrastructure Integration

Network infrastructure devices — firewalls, routers, switches, and load balancers — are the most fundamental log sources for a cybersecurity monitoring system. These devices generate high-volume, high-value security events that form the backbone of threat detection. The integration must be configured to capture all security-relevant events without overwhelming the log collection infrastructure with routine operational noise.

Device TypeCritical Log EventsRecommended Log LevelEstimated EPS
Next-Generation FirewallAllow/deny decisions, IPS alerts, URL filtering, SSL inspection eventsInformational (all security events)500–5,000 EPS per device
Core/Distribution SwitchPort security violations, MAC address changes, STP topology changes, VLAN changesWarning and above10–100 EPS per device
Router/WAN EdgeBGP/OSPF changes, ACL hits, interface state changes, routing anomaliesWarning and above5–50 EPS per device
VPN GatewayAuthentication success/failure, session establishment/termination, policy violationsInformational (all auth events)50–500 EPS per device
Load BalancerConnection rate anomalies, health check failures, SSL certificate eventsWarning and above10–200 EPS per device

7.3 Cloud Platform Integration

Cloud platform integration presents unique challenges compared to on-premises infrastructure. Cloud providers offer native logging services — AWS CloudTrail, Azure Monitor, and GCP Cloud Logging — that must be configured to forward events to the on-premises SIEM or a cloud-native SIEM instance. The integration architecture must account for the high volume of cloud API calls, the need for cross-account log aggregation in multi-account environments, and the latency introduced by cloud-to-on-premises log forwarding.

Cloud ProviderLog ServiceCritical Log SourcesIntegration MethodTypical Latency
Amazon Web ServicesCloudTrail, VPC Flow Logs, GuardDuty, Security HubAPI calls, network flows, threat detections, security findingsS3 + SQS notification or Kinesis Firehose1–5 minutes
Microsoft AzureAzure Monitor, Microsoft Defender, Entra ID LogsActivity logs, sign-in events, security alerts, resource changesEvent Hub + Log Analytics API1–3 minutes
Google Cloud PlatformCloud Logging, Security Command Center, VPC Flow LogsAdmin activity, data access, system events, security findingsPub/Sub + API pull1–5 minutes
← Security & Risks Chapter 8: Tools & Accessories →