Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
pub:soc [26.11.2024 09:05] – created Predrag Tasevski | pub:soc [26.11.2024 16:00] (current) – Predrag Tasevski | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Unicis SOC Plan ====== | ====== Unicis SOC Plan ====== | ||
+ | <WRAP center round info> | ||
Comprehensive breakdown of features and integrations for UNICIS SOC stack that includes Wazuh, TheHive, Zabbix, MISP, Cortex, and Shuffle SOAR. | Comprehensive breakdown of features and integrations for UNICIS SOC stack that includes Wazuh, TheHive, Zabbix, MISP, Cortex, and Shuffle SOAR. | ||
+ | </ | ||
- | Integrated Features | ||
- | 1. Centralised Incident Management | ||
- | Wazuh + TheHive: | ||
- | Automate alert ingestion from Wazuh into TheHive to create structured cases. | ||
- | Analysts triage Wazuh alerts in TheHive and enrich them with observables from threat intelligence (via Cortex and MISP). | ||
- | Zabbix + TheHive: | ||
- | Send Zabbix performance or anomaly alerts to TheHive for further analysis. | ||
- | Automatically create cases in TheHive when Zabbix detects critical infrastructure issues that may indicate security concerns. | ||
- | TheHive + Shuffle SOAR: | ||
- | Use Shuffle to automate TheHive workflows, such as escalating alerts to incidents, assigning tasks, or notifying teams. | ||
- | 2. Automated Threat Intelligence Integration | + | ===== Integrated Features ===== |
- | Wazuh + MISP: | + | |
- | Export Wazuh-detected IoCs (e.g., IPs, domains, hashes) to MISP for community sharing. | + | |
- | Use MISP threat feeds in Wazuh for correlation with logs and real-time alerts. | + | |
- | MISP + TheHive: | + | |
- | Automatically correlate IoCs from MISP with incidents in TheHive. | + | |
- | Enrich TheHive cases with detailed threat actor profiles, tactics, and related indicators from MISP. | + | |
- | MISP + Cortex: | + | |
- | Leverage Cortex analyzers to validate and enrich MISP IoCs (e.g., domain reputation, IP geolocation). | + | |
- | Cortex results can be fed back into MISP to keep threat intelligence updated. | + | |
- | Shuffle + MISP: | + | |
- | Automate the ingestion of new threat feeds into MISP and push updates to Wazuh. | + | |
- | Trigger Shuffle workflows for MISP when new IoCs are detected, such as adding alerts to Wazuh or sharing them with other organisations. | + | |
- | 3. Proactive Alert Management | + | ==== 1. Centralised Incident |
- | Wazuh + Zabbix: | + | |
- | Correlate Wazuh alerts with Zabbix metrics to identify suspicious activities with infrastructure context. | + | |
- | Zabbix + Shuffle SOAR: | + | |
- | Automate responses to Zabbix alerts, such as restarting failing services or notifying teams about resource exhaustion. | + | |
- | TheHive + Cortex: | + | |
- | When alerts in TheHive contain observables (IPs, domains, hashes), Cortex analyzers automatically enrich them with actionable intelligence. | + | |
- | TheHive + Shuffle SOAR: | + | |
- | Use Shuffle to assign tasks in TheHive, send notifications to teams, and escalate alerts based on severity or case type. | + | |
- | 4. Enhanced Visualisations | + | * Wazuh + TheHive: |
- | Zabbix Dashboards: | + | * Automate alert ingestion |
- | Combine security alerts | + | * Analysts triage Wazuh alerts in TheHive and enrich them with observables |
- | TheHive | + | * Zabbix + TheHive: |
- | Analyse incident trends | + | * Send Zabbix performance or anomaly alerts to TheHive for further analysis. |
- | Shuffle | + | * Automatically create cases in TheHive when Zabbix detects critical infrastructure issues that may indicate security concerns. |
- | Use Shuffle to create centralised dashboards displaying SOC-wide metrics: alert counts, case statuses, response SLAs, and resolved incidents. | + | * TheHive + Shuffle |
+ | * Use Shuffle to automate TheHive workflows, such as escalating alerts to incidents, assigning tasks, or notifying teams. | ||
- | 5. Automated | + | ==== 2. Automated |
- | Shuffle SOAR: | + | |
- | Automate multi-step responses, such as: | + | |
- | Triggering Cortex enrichment for new TheHive observables. | + | |
- | Updating MISP with new IoCs detected by Wazuh or validated by Cortex. | + | |
- | Quarantining affected endpoints using Wazuh triggers. | + | |
- | TheHive Playbooks: | + | |
- | Guide analysts through consistent incident response workflows: | + | |
- | Example: Phishing case playbook → Analyze email headers in Cortex → Cross-check domains in MISP → Update case findings in TheHive. | + | |
- | 6. Improved Threat Detection | + | * Wazuh + MISP: |
- | Wazuh + Cortex: | + | * Export |
- | Automatically enrich | + | * Use MISP threat feeds in Wazuh for correlation with logs and real-time alerts. |
- | Highlight false positives or flag high-risk threats based on enrichment data. | + | |
- | MISP + Shuffle SOAR: | + | * Automatically correlate IoCs from MISP with incidents |
- | Detect changes | + | * Enrich TheHive cases with detailed threat actor profiles, tactics, and related indicators from MISP. |
- | Zabbix | + | * MISP + Cortex: |
- | Correlate Zabbix anomaly alerts with known threat | + | * Leverage Cortex analyzers to validate |
+ | * Cortex results can be fed back into MISP to keep threat intelligence updated. | ||
+ | * Shuffle | ||
+ | * Automate the ingestion of new threat | ||
+ | * Trigger Shuffle workflows for MISP when new IoCs are detected, such as adding alerts to Wazuh or sharing them with other organisations. | ||
- | Standalone Features | + | ==== 3. Proactive Alert Management ==== |
- | Wazuh | + | |
- | Intrusion detection through log monitoring, anomaly detection, and file integrity checks. | + | |
- | Host-based monitoring with custom rule sets for advanced threat detection. | + | |
- | Compliance audits for standards like PCI-DSS, HIPAA, and GDPR. | + | |
- | TheHive | + | * Wazuh + Zabbix: |
- | Incident management | + | * Correlate Wazuh alerts |
- | Playbook automation for standardised incident handling. | + | * Zabbix + Shuffle SOAR: |
- | Trend analysis for understanding recurring threats | + | * Automate responses to Zabbix alerts, such as restarting failing services or notifying teams about resource exhaustion. |
+ | * TheHive + Cortex: | ||
+ | * When alerts in TheHive contain | ||
+ | * TheHive + Shuffle SOAR: | ||
+ | * Use Shuffle to assign tasks in TheHive, send notifications to teams, | ||
- | Zabbix | + | ==== 4. Enhanced Visualisations ==== |
- | Resource monitoring across servers, applications, | + | |
- | Trend analysis for resource utilisation and performance anomalies. | + | |
- | Custom alerting for proactive response to potential issues. | + | |
- | MISP | + | * Zabbix Dashboards: |
- | Centralised threat intelligence management and sharing platform. | + | * Combine security alerts from Wazuh with performance metrics from Zabbix into unified dashboards. |
- | Import/ | + | * TheHive Analytics: |
- | Advanced IOC correlation | + | * Analyse incident trends and response times, enhanced by enriched threat data from MISP and Cortex. |
+ | * Shuffle Dashboards: | ||
+ | * Use Shuffle to create centralised dashboards displaying SOC-wide metrics: alert counts, case statuses, response SLAs, and resolved incidents. | ||
- | Cortex | + | ==== 5. Automated Playbooks ==== |
- | Observable enrichment using powerful analyzers like VirusTotal, PassiveTotal, | + | |
- | Automation of threat intelligence workflows with integration to other tools like MISP and TheHive. | + | |
- | Supports hundreds of analyzers for advanced threat data insights. | + | |
- | Shuffle SOAR | + | * Shuffle SOAR: |
- | Orchestrates and automates workflows across all integrated tools. | + | * Automate multi-step responses, such as: |
- | Provides a centralised automation hub to connect Wazuh, Zabbix, MISP, TheHive, and Cortex. | + | * Triggering Cortex enrichment for new TheHive observables. |
- | Simplifies repetitive tasks like alert forwarding, case creation, and threat enrichment. | + | * Updating MISP with new IoCs detected by Wazuh or validated by Cortex. |
+ | * Quarantining affected endpoints using Wazuh triggers. | ||
+ | * TheHive Playbooks: | ||
+ | * Guide analysts through consistent incident response workflows: | ||
+ | * Example: Phishing case playbook → Analyze email headers in Cortex → Cross-check domains in MISP → Update case findings in TheHive. | ||
+ | |||
+ | ==== 6. Improved Threat Detection ==== | ||
+ | |||
+ | * Wazuh + Cortex: | ||
+ | * Automatically enrich Wazuh alerts using Cortex analyzers (e.g., VirusTotal for file hashes, AbuseIPDB for IPs). | ||
+ | * Highlight false positives or flag high-risk threats based on enrichment data. | ||
+ | * MISP + Shuffle SOAR: | ||
+ | * Detect changes in MISP IoCs and trigger Shuffle workflows to alert Wazuh or update TheHive cases. | ||
+ | * Zabbix + MISP: | ||
+ | * Correlate Zabbix anomaly alerts with known threat patterns in MISP, enabling proactive detection of infrastructure-based attacks. | ||
+ | |||
+ | ===== Standalone Features ===== | ||
+ | |||
+ | ==== Wazuh ==== | ||
+ | |||
+ | * Intrusion detection through log monitoring, anomaly detection, and file integrity checks. | ||
+ | * Host-based monitoring with custom rule sets for advanced threat detection. | ||
+ | * Compliance audits for standards like PCI-DSS, HIPAA, and GDPR. | ||
+ | |||
+ | ==== TheHive ==== | ||
+ | |||
+ | * Incident management with case tracking, observables, | ||
+ | * Playbook automation for standardised incident handling. | ||
+ | * Trend analysis for understanding recurring threats and response efficiency. | ||
+ | |||
+ | ==== Zabbix ==== | ||
+ | |||
+ | * Resource monitoring across servers, applications, | ||
+ | * Trend analysis for resource utilisation and performance anomalies. | ||
+ | * Custom alerting for proactive response to potential issues. | ||
+ | |||
+ | ==== MISP ==== | ||
+ | |||
+ | * Centralised threat intelligence management and sharing platform. | ||
+ | * Import/ | ||
+ | * Advanced IOC correlation and search for identifying related campaigns. | ||
+ | |||
+ | ==== Cortex ==== | ||
+ | |||
+ | * Observable enrichment using powerful analyzers like VirusTotal, PassiveTotal, | ||
+ | * Automation of threat intelligence workflows with integration to other tools like MISP and TheHive. | ||
+ | * Supports hundreds of analyzers for advanced threat data insights. | ||
+ | |||
+ | ==== Shuffle SOAR ==== | ||
+ | |||
+ | * Orchestrates and automates workflows across all integrated tools. | ||
+ | | ||
+ | | ||