Back to Floor
Data Engineering • Room 2
The CIM & Normalization
Enterprise Security relies completely on the Common Information Model (CIM). If data isn't mapped to CIM fields (e.g., `src_ip`, `dest_ip`, `action`), correlation searches won't see it.
Engineers use Field Aliases (`FIELDALIAS`), Event Types, and Tags to normalize disparate vendor logs into a unified format.
Knowledge Check
Prove your understanding to clear the room (Rewards XP)
Question 1 of 1
A firewall log contains the proprietary field `fw_destination_address`. Which configuration is best to map this to the CIM?