Fastly is an edge cloud platform that provides organizations with CDN, image optimization, video and streaming, cloud security, and load balancing services. Panther can collect, normalize, and monitor Fastly logs to help you identify suspicious activity in real time. Your normalized data is then retained to power future security investigations in a data lake powered by Snowflake.
Fastly access logs contain information for each request made by a client, handled by the Fastly CDN. This includes the files that are accessed, how your service responded to a request, what browser a client is using, the IP address of clients, and more. Common SIEM use cases for Fastly logs include:
Panther’s integration for Fastly is fast and easy to configure via the Fastly API. Simply select Fastly from the list of log sources in the Panther console, create an Admin API application in the Fastly Admin Panel, and submit your API key and credentials in the Panther setup menu.
For more details on onboarding Fastly logs or for supported log schema, you can view our Fastly documentation here.
As Panther ingests Fastly logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.
Panther applies normalization fields to all log records, which standardizes names for attributes and empowers users to correlate data across all of your log sources - not just Fastly. Panther’s various search tools - such as Query Builder, Data Explorer, and Indicator Search - allow you to conduct investigations for suspicious activity or vulnerabilities. For more information on searching logs, check out our documentation on Investigations & Search.
Pre-built detections for Fastly are available by default in Panther, offering users immediate value for monitoring common IoCs and threats. You can explore our built-in detection coverage for Fastly logs here.
With Panther, you aren’t confined to restrictive detections or proprietary languages as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detections for your security team.
Panther generates alerts when your detection rules or policies for Fastly are triggered, and integrates with a variety of alert destinations to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.
Alerts are categorized within five severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.
If you have any questions about configuring or monitoring Fastly logs in Panther, our customer support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.
With Panther, your team doesn’t have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with limited detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.
Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts. If you’re searching for an ideal SIEM solution for Fastly, request a demo today.
Identify any suspicious or malicious domain addresses or DNS requests.
Gain complete visibility into your managed endpoints.
Monitor network traffic for attack attempts or probes.
Identify any suspicious traffic or domain activity.
Inspect network traffic and DNS protocols for suspicious activity.
Inspect network traffic for signs of suspicious behavior.
Inspect all web activity for signs of suspicious behavior.
Monitor your team’s Tailscale network.