Chapter 7: Support & Integration

Supporting infrastructure requirements, third-party integrations, and ecosystem compatibility

7.1 Integrated Supporting Equipment

A log security system does not operate in isolation — it depends on a set of supporting infrastructure components that must be correctly configured and maintained to ensure the integrity of the evidence chain. The diagram below shows all supporting equipment categories integrated into a single view, illustrating the data flows and dependencies between each component and the central log security platform.

Integrated Support Equipment Diagram
Figure 7.1: Integrated Supporting Equipment — All supporting components in a single diagram: NTP/GPS Time Server, Network Infrastructure (managed switch, firewall, load balancer), PKI Certificate Authority, SIEM Platform, Active Directory/LDAP, Backup Power UPS, Environmental Monitoring, and Physical Security (biometric reader, badge reader, CCTV)

The diagram organizes supporting equipment into three functional rows. The top row covers network and time infrastructure, which provides the foundational connectivity and time synchronization that all other components depend on. The middle row covers core security and identity platforms, which provide authentication, authorization, and log analytics capabilities. The bottom row covers facility and physical support, which ensures the availability and physical security of the log security system hardware. All three rows are interconnected through the central SIEM Platform, which acts as the integration hub.

7.2 Supporting Equipment Requirements

The table below specifies the minimum requirements for each supporting equipment category, including the integration method, the criticality to the evidence chain, and the failure mode if the component is unavailable.

ComponentIntegration MethodCriticalityFailure ModeRedundancy Requirement
NTP/GPS Time ServerNTP v4 (authenticated)CriticalTimestamp drift; hash chain gaps2× servers (primary + backup)
Managed SwitchPhysical layer; VLAN taggingCriticalLog transport failure; complete outageStacked pair or MLAG
FirewallZone boundary enforcementCriticalZone isolation failure; unauthorized accessActive-passive HA pair
Load BalancerVIP for ingest gateway clusterHighSingle gateway becomes bottleneckActive-active pair
PKI / Certificate AuthorityPKCS#11 / SCEP / ESTCriticalmTLS certificate renewal failureOffline root CA + online issuing CA
Active Directory / LDAPLDAPS / KerberosHighRBAC enforcement failure; access control gapMulti-DC replication
SIEM PlatformElasticsearch / OpenSearch APIHighSearch unavailable; analyst access blocked3-node cluster minimum
UPS / GeneratorSNMP monitoringCriticalPower failure causes log loss and data corruptionUPS + generator for >4h runtime
Environmental MonitoringSNMP / REST APIMediumUndetected overheating causes hardware failureRedundant sensors per zone
Physical Security (Biometric/CCTV)Access control API / RTSPHighUnauthorized physical access undetectedBattery backup for access control

7.3 Third-Party Integration Points

The log security system exposes a set of well-defined integration points for third-party platforms. Each integration point uses a standard protocol or API to ensure interoperability with the broadest range of vendor products. The following integration categories are supported out of the box, with additional integrations available through the REST API.

SIEM / SOAR Platforms

Normalized events are forwarded to SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel, Elastic SIEM) via CEF/LEEF syslog or native API. SOAR platforms (Palo Alto XSOAR, Splunk SOAR) can trigger automated playbooks based on integrity alerts. The integration uses read-only API keys scoped to specific log namespaces.

Identity & Access Management

RBAC is enforced through integration with Active Directory / LDAP (LDAPS/Kerberos) or SAML 2.0 / OIDC identity providers (Okta, Azure AD, Ping Identity). Role assignments are synchronized automatically from the IdP, and access reviews are triggered via the SCIM provisioning API. MFA enforcement is delegated to the IdP.

PKI & Certificate Management

TLS certificates for all system components are issued by the organization's PKI. Automated certificate lifecycle management is supported via SCEP (for network devices), EST (RFC 7030), and ACME (for cloud deployments). Certificate expiry monitoring is integrated with the alerting system to provide 90/30/7-day advance warnings.

Monitoring & Alerting

System health metrics are exported via Prometheus (for Grafana dashboards) or SNMP (for legacy NMS platforms). Alerts are delivered via PagerDuty, OpsGenie, or email/SMS. The alerting system supports escalation policies with configurable thresholds for EPS drop, buffer fill level, hash chain gaps, and certificate expiry.

Ticketing & GRC Platforms

Compliance reports and integrity verification results can be automatically pushed to GRC platforms (ServiceNow GRC, Archer, MetricStream) via REST API. Integrity failure alerts automatically create incidents in ITSM platforms (ServiceNow, Jira Service Management) with pre-populated evidence packages. Audit evidence packages are formatted for direct upload to compliance portals.

← Chapter 6: Security & Risks Chapter 8: Tools & Accessories →