This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Unicis SOC Plan ====== <WRAP center round info> Comprehensive breakdown of features and integrations for UNICIS SOC stack that includes Wazuh, TheHive, Zabbix, MISP, Cortex, and Shuffle SOAR. </WRAP> ===== Integrated Features ===== ==== 1. Centralised Incident Management ==== * Wazuh + TheHive: * Automate alert ingestion from Wazuh into TheHive to create structured cases. * Analysts triage Wazuh alerts in TheHive and enrich them with observables from threat intelligence (via Cortex and MISP). * Zabbix + TheHive: * Send Zabbix performance or anomaly alerts to TheHive for further analysis. * Automatically create cases in TheHive when Zabbix detects critical infrastructure issues that may indicate security concerns. * TheHive + Shuffle SOAR: * Use Shuffle to automate TheHive workflows, such as escalating alerts to incidents, assigning tasks, or notifying teams. ==== 2. Automated Threat Intelligence Integration ==== * Wazuh + MISP: * Export Wazuh-detected IoCs (e.g., IPs, domains, hashes) to MISP for community sharing. * Use MISP threat feeds in Wazuh for correlation with logs and real-time alerts. * MISP + TheHive: * Automatically correlate IoCs from MISP with incidents in TheHive. * Enrich TheHive cases with detailed threat actor profiles, tactics, and related indicators from MISP. * MISP + Cortex: * Leverage Cortex analyzers to validate and enrich MISP IoCs (e.g., domain reputation, IP geolocation). * Cortex results can be fed back into MISP to keep threat intelligence updated. * Shuffle + MISP: * Automate the ingestion of new threat feeds into MISP and push updates to Wazuh. * Trigger Shuffle workflows for MISP when new IoCs are detected, such as adding alerts to Wazuh or sharing them with other organisations. ==== 3. Proactive Alert Management ==== * Wazuh + Zabbix: * Correlate Wazuh alerts with Zabbix metrics to identify suspicious activities with infrastructure context. * Zabbix + Shuffle SOAR: * Automate responses to Zabbix alerts, such as restarting failing services or notifying teams about resource exhaustion. * TheHive + Cortex: * When alerts in TheHive contain observables (IPs, domains, hashes), Cortex analyzers automatically enrich them with actionable intelligence. * TheHive + Shuffle SOAR: * Use Shuffle to assign tasks in TheHive, send notifications to teams, and escalate alerts based on severity or case type. ==== 4. Enhanced Visualisations ==== * Zabbix Dashboards: * Combine security alerts from Wazuh with performance metrics from Zabbix into unified dashboards. * TheHive Analytics: * Analyse incident trends and response times, enhanced by enriched threat data from MISP and Cortex. * Shuffle Dashboards: * Use Shuffle to create centralised dashboards displaying SOC-wide metrics: alert counts, case statuses, response SLAs, and resolved incidents. ==== 5. Automated Playbooks ==== * Shuffle SOAR: * Automate multi-step responses, such as: * Triggering Cortex enrichment for new TheHive observables. * Updating MISP with new IoCs detected by Wazuh or validated by Cortex. * Quarantining affected endpoints using Wazuh triggers. * TheHive Playbooks: * Guide analysts through consistent incident response workflows: * Example: Phishing case playbook → Analyze email headers in Cortex → Cross-check domains in MISP → Update case findings in TheHive. ==== 6. Improved Threat Detection ==== * Wazuh + Cortex: * Automatically enrich Wazuh alerts using Cortex analyzers (e.g., VirusTotal for file hashes, AbuseIPDB for IPs). * Highlight false positives or flag high-risk threats based on enrichment data. * MISP + Shuffle SOAR: * Detect changes in MISP IoCs and trigger Shuffle workflows to alert Wazuh or update TheHive cases. * Zabbix + MISP: * Correlate Zabbix anomaly alerts with known threat patterns in MISP, enabling proactive detection of infrastructure-based attacks. ===== Standalone Features ===== ==== Wazuh ==== * Intrusion detection through log monitoring, anomaly detection, and file integrity checks. * Host-based monitoring with custom rule sets for advanced threat detection. * Compliance audits for standards like PCI-DSS, HIPAA, and GDPR. ==== TheHive ==== * Incident management with case tracking, observables, and collaboration tools. * Playbook automation for standardised incident handling. * Trend analysis for understanding recurring threats and response efficiency. ==== Zabbix ==== * Resource monitoring across servers, applications, networks, and databases. * Trend analysis for resource utilisation and performance anomalies. * Custom alerting for proactive response to potential issues. ==== MISP ==== * Centralised threat intelligence management and sharing platform. * Import/export of IoCs in formats like STIX, JSON, and CSV. * Advanced IOC correlation and search for identifying related campaigns. ==== Cortex ==== * Observable enrichment using powerful analyzers like VirusTotal, PassiveTotal, and WHOIS lookup. * Automation of threat intelligence workflows with integration to other tools like MISP and TheHive. * Supports hundreds of analyzers for advanced threat data insights. ==== Shuffle SOAR ==== * Orchestrates and automates workflows across all integrated tools. * Provides a centralised automation hub to connect Wazuh, Zabbix, MISP, TheHive, and Cortex. * Simplifies repetitive tasks like alert forwarding, case creation, and threat enrichment.