Unicis SOC Plan
Comprehensive breakdown of features and integrations for UNICIS SOC stack that includes Wazuh, TheHive, Zabbix, MISP, Cortex, and Shuffle SOAR.
Integrated Features
1. Centralised Incident Management
- Wazuh + TheHive:- Automate alert ingestion from Wazuh into TheHive to create structured cases.
- Analysts triage Wazuh alerts in TheHive and enrich them with observables from threat intelligence (via Cortex and MISP).
 
- Zabbix + TheHive:- Send Zabbix performance or anomaly alerts to TheHive for further analysis.
- Automatically create cases in TheHive when Zabbix detects critical infrastructure issues that may indicate security concerns.
 
- TheHive + Shuffle SOAR:- Use Shuffle to automate TheHive workflows, such as escalating alerts to incidents, assigning tasks, or notifying teams.
 
2. Automated Threat Intelligence Integration
- Wazuh + MISP:- Export Wazuh-detected IoCs (e.g., IPs, domains, hashes) to MISP for community sharing.
- Use MISP threat feeds in Wazuh for correlation with logs and real-time alerts.
 
- MISP + TheHive:- Automatically correlate IoCs from MISP with incidents in TheHive.
- Enrich TheHive cases with detailed threat actor profiles, tactics, and related indicators from MISP.
 
- MISP + Cortex:- Leverage Cortex analyzers to validate and enrich MISP IoCs (e.g., domain reputation, IP geolocation).
- Cortex results can be fed back into MISP to keep threat intelligence updated.
 
- Shuffle + MISP:- Automate the ingestion of new threat feeds into MISP and push updates to Wazuh.
- Trigger Shuffle workflows for MISP when new IoCs are detected, such as adding alerts to Wazuh or sharing them with other organisations.
 
3. Proactive Alert Management
- Wazuh + Zabbix:- Correlate Wazuh alerts with Zabbix metrics to identify suspicious activities with infrastructure context.
 
- Zabbix + Shuffle SOAR:- Automate responses to Zabbix alerts, such as restarting failing services or notifying teams about resource exhaustion.
 
- TheHive + Cortex:- When alerts in TheHive contain observables (IPs, domains, hashes), Cortex analyzers automatically enrich them with actionable intelligence.
 
- TheHive + Shuffle SOAR:- Use Shuffle to assign tasks in TheHive, send notifications to teams, and escalate alerts based on severity or case type.
 
4. Enhanced Visualisations
- Zabbix Dashboards:- Combine security alerts from Wazuh with performance metrics from Zabbix into unified dashboards.
 
- TheHive Analytics:- Analyse incident trends and response times, enhanced by enriched threat data from MISP and Cortex.
 
- Shuffle Dashboards:- Use Shuffle to create centralised dashboards displaying SOC-wide metrics: alert counts, case statuses, response SLAs, and resolved incidents.
 
5. Automated Playbooks
- Shuffle SOAR:- Automate multi-step responses, such as:- Triggering Cortex enrichment for new TheHive observables.
- Updating MISP with new IoCs detected by Wazuh or validated by Cortex.
- Quarantining affected endpoints using Wazuh triggers.
 
- TheHive Playbooks:- Guide analysts through consistent incident response workflows:
- Example: Phishing case playbook → Analyze email headers in Cortex → Cross-check domains in MISP → Update case findings in TheHive.
 
 
6. Improved Threat Detection
- Wazuh + Cortex:- Automatically enrich Wazuh alerts using Cortex analyzers (e.g., VirusTotal for file hashes, AbuseIPDB for IPs).
- Highlight false positives or flag high-risk threats based on enrichment data.
 
- MISP + Shuffle SOAR:- Detect changes in MISP IoCs and trigger Shuffle workflows to alert Wazuh or update TheHive cases.
 
- Zabbix + MISP:- Correlate Zabbix anomaly alerts with known threat patterns in MISP, enabling proactive detection of infrastructure-based attacks.
 
Standalone Features
Wazuh
- Intrusion detection through log monitoring, anomaly detection, and file integrity checks.
- Host-based monitoring with custom rule sets for advanced threat detection.
- Compliance audits for standards like PCI-DSS, HIPAA, and GDPR.
TheHive
- Incident management with case tracking, observables, and collaboration tools.
- Playbook automation for standardised incident handling.
- Trend analysis for understanding recurring threats and response efficiency.
Zabbix
- Resource monitoring across servers, applications, networks, and databases.
- Trend analysis for resource utilisation and performance anomalies.
- Custom alerting for proactive response to potential issues.
MISP
- Centralised threat intelligence management and sharing platform.
- Import/export of IoCs in formats like STIX, JSON, and CSV.
- Advanced IOC correlation and search for identifying related campaigns.
Cortex
- Observable enrichment using powerful analyzers like VirusTotal, PassiveTotal, and WHOIS lookup.
- Automation of threat intelligence workflows with integration to other tools like MISP and TheHive.
- Supports hundreds of analyzers for advanced threat data insights.
Shuffle SOAR
- Orchestrates and automates workflows across all integrated tools.
- Provides a centralised automation hub to connect Wazuh, Zabbix, MISP, TheHive, and Cortex.
- Simplifies repetitive tasks like alert forwarding, case creation, and threat enrichment.