Security Information and Event Management

In modern SaaS environments, identity is the primary control plane - governing access, enforcing security policies, and driving compliance. For the Coherent platform, customers are issued dedicated Keycloakarrow-up-right realms where identity management, federation, and access control are fully delegated. This makes centralized visibility into identity events critical. This can be managed with a Security Information and Event Management (SIEM) solution.

SIEM is essential for Keycloak

In Spark, the Identity and Access Management application is the gateway to customer environments, enforcing:

  • Authentication (Single Sign-On, Multi-Factor Authentication, federation).

  • Authorization (roles, policies).

  • Access to APIs, UIs, and admin features.

To protect this surface, identity activity should be logged, monitored, and ingested into a SIEM.

SIEM integration strategy

Customers can integrate by pulling audit and event logs from their Keycloak realm via the Keycloak Admin REST API using a dedicated service account. In addition to Keycloak logs, customers can also integrate Spark tenant from the API Call History and Event viewer.

Configuring and maintaining SIEM integration is solely the customer’s responsibility. The type of SIEM solution used is entirely the customer’s decision. Any modern SIEM is capable of ingesting logs from REST APIs or standard log formats (e.g., JSON, CEF) can be integrated based on the customer’s security architecture and preferences.

  • Successful and failed login attempts.

  • Token grants and refreshes.

  • Admin role assignments.

  • Federation and identity provider changes.

  • Group membership and access policy changes.

For identity-centric security, the first and most critical layer of defense is visibility into identity-driven events such as authentication, access control, and configuration changes, rather than focusing on traditional perimeter tools.

IAM recommendations

Before implementing SIEM we recommend reviewing:

Identity management defines your security perimeter. Treat identity logs with the same urgency as network logs!

Demo video

Microsoft Sentinelarrow-up-right is the Microsoft Azurearrow-up-right SIEM application. This video demonstrates how a failed login to Spark registers into a Sentinel workbookarrow-up-right.

Last updated