You are here: Home » pub » Unicis SOC Plan

Unicis SOC Plan

This is an old revision of the document!


Unicis SOC Plan

Comprehensive breakdown of features and integrations for UNICIS SOC stack that includes Wazuh, TheHive, Zabbix, MISP, Cortex, and Shuffle SOAR.

Integrated Features 1. Centralised Incident Management Wazuh + TheHive: Automate alert ingestion from Wazuh into TheHive to create structured cases. Analysts triage Wazuh alerts in TheHive and enrich them with observables from threat intelligence (via Cortex and MISP). Zabbix + TheHive: Send Zabbix performance or anomaly alerts to TheHive for further analysis. Automatically create cases in TheHive when Zabbix detects critical infrastructure issues that may indicate security concerns. TheHive + Shuffle SOAR: Use Shuffle to automate TheHive workflows, such as escalating alerts to incidents, assigning tasks, or notifying teams.

2. Automated Threat Intelligence Integration Wazuh + MISP: Export Wazuh-detected IoCs (e.g., IPs, domains, hashes) to MISP for community sharing. Use MISP threat feeds in Wazuh for correlation with logs and real-time alerts. MISP + TheHive: Automatically correlate IoCs from MISP with incidents in TheHive. Enrich TheHive cases with detailed threat actor profiles, tactics, and related indicators from MISP. MISP + Cortex: Leverage Cortex analyzers to validate and enrich MISP IoCs (e.g., domain reputation, IP geolocation). Cortex results can be fed back into MISP to keep threat intelligence updated. Shuffle + MISP: Automate the ingestion of new threat feeds into MISP and push updates to Wazuh. Trigger Shuffle workflows for MISP when new IoCs are detected, such as adding alerts to Wazuh or sharing them with other organisations.

3. Proactive Alert Management Wazuh + Zabbix: Correlate Wazuh alerts with Zabbix metrics to identify suspicious activities with infrastructure context. Zabbix + Shuffle SOAR: Automate responses to Zabbix alerts, such as restarting failing services or notifying teams about resource exhaustion. TheHive + Cortex: When alerts in TheHive contain observables (IPs, domains, hashes), Cortex analyzers automatically enrich them with actionable intelligence. TheHive + Shuffle SOAR: Use Shuffle to assign tasks in TheHive, send notifications to teams, and escalate alerts based on severity or case type.

4. Enhanced Visualisations Zabbix Dashboards: Combine security alerts from Wazuh with performance metrics from Zabbix into unified dashboards. TheHive Analytics: Analyse incident trends and response times, enhanced by enriched threat data from MISP and Cortex. Shuffle Dashboards: Use Shuffle to create centralised dashboards displaying SOC-wide metrics: alert counts, case statuses, response SLAs, and resolved incidents.

5. Automated Playbooks Shuffle SOAR: Automate multi-step responses, such as: Triggering Cortex enrichment for new TheHive observables. Updating MISP with new IoCs detected by Wazuh or validated by Cortex. Quarantining affected endpoints using Wazuh triggers. TheHive Playbooks: Guide analysts through consistent incident response workflows: Example: Phishing case playbook → Analyze email headers in Cortex → Cross-check domains in MISP → Update case findings in TheHive.

6. Improved Threat Detection Wazuh + Cortex: Automatically enrich Wazuh alerts using Cortex analyzers (e.g., VirusTotal for file hashes, AbuseIPDB for IPs). Highlight false positives or flag high-risk threats based on enrichment data. MISP + Shuffle SOAR: Detect changes in MISP IoCs and trigger Shuffle workflows to alert Wazuh or update TheHive cases. Zabbix + MISP: Correlate Zabbix anomaly alerts with known threat patterns in MISP, enabling proactive detection of infrastructure-based attacks.

Standalone Features Wazuh Intrusion detection through log monitoring, anomaly detection, and file integrity checks. Host-based monitoring with custom rule sets for advanced threat detection. Compliance audits for standards like PCI-DSS, HIPAA, and GDPR.

TheHive Incident management with case tracking, observables, and collaboration tools. Playbook automation for standardised incident handling. Trend analysis for understanding recurring threats and response efficiency.

Zabbix Resource monitoring across servers, applications, networks, and databases. Trend analysis for resource utilisation and performance anomalies. Custom alerting for proactive response to potential issues.

MISP Centralised threat intelligence management and sharing platform. Import/export of IoCs in formats like STIX, JSON, and CSV. Advanced IOC correlation and search for identifying related campaigns.

Cortex Observable enrichment using powerful analyzers like VirusTotal, PassiveTotal, and WHOIS lookup. Automation of threat intelligence workflows with integration to other tools like MISP and TheHive. Supports hundreds of analyzers for advanced threat data insights.

Shuffle SOAR Orchestrates and automates workflows across all integrated tools. Provides a centralised automation hub to connect Wazuh, Zabbix, MISP, TheHive, and Cortex. Simplifies repetitive tasks like alert forwarding, case creation, and threat enrichment.