At SOCFortress, we treat log data as sensitive security telemetry. Logs often contain indicators of compromise, authentication activity, internal IP addresses, usernames, and operational details that must be protected from interception or tampering—especially when transmitted over the public internet or other untrusted networks.
This article explains why secure log transport matters and how SOCFortress ensures confidentiality, integrity, and authenticity of syslog data while in transit within our SIEM stacks.
Syslog traffic transmitted without protection (for example, plain UDP over the WAN) is vulnerable to:
Because logs are foundational to detection, investigation, and compliance, SOCFortress designs all customer deployments to ensure logs are encrypted, authenticated, and verifiable while in transit.
The default and preferred method for log ingestion in SOCFortress SIEM stacks is Syslog over TCP with TLS, terminating directly into Graylog.
This ensures that logs cannot be intercepted, altered, or spoofed while traversing the WAN.
Some network devices and legacy platforms only support plain syslog (typically UDP or TCP without TLS). In these cases, SOCFortress deploys a Local Log Collector within the customer’s environment.
A lightweight VM (Debian 13) is deployed on the customer’s internal network and runs syslog-ng.
This design ensures that unencrypted syslog traffic never traverses the WAN.
For a detailed deployment guide, see:
Local Log Collector using Syslog-NG
Many modern platforms (such as EDR, cloud security tools, and SaaS products) natively support TLS-secured syslog. SOCFortress leverages this capability whenever available.
For example, SentinelOne syslog forwarding uses:
This allows SentinelOne to securely authenticate to the SIEM and encrypt all events in transit.
Reference implementation:
SentinelOne – Syslog Forwarder to SIEM Stack
In environments with strict security requirements, SOCFortress can also support network-layer encryption in addition to TLS syslog, including:
While these options provide an additional layer of protection, they are generally not required because TLS with mutual authentication already ensures confidentiality, integrity, and sender validation.
SOCFortress evaluates these options on a case-by-case basis to avoid unnecessary complexity while meeting customer security expectations.
This approach ensures customers can be confident that their security telemetry remains protected from the moment it leaves their environment until it is ingested into the SOCFortress SIEM platform.
Was this article helpfu?
Thank you for voting
You are related to multiple companies. Please select the company you wish to login as.