Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ketsapiwiq/siem-infra
Vulnerability detection, OSquery, fully-fledged Wazuh ELK stack with Linux and Windows Wazuh + osquery enrollment via Ansible.
https://github.com/ketsapiwiq/siem-infra
ansible elasticsearch kibana osquery security siem vulnerability-detection wazuh
Last synced: 1 day ago
JSON representation
Vulnerability detection, OSquery, fully-fledged Wazuh ELK stack with Linux and Windows Wazuh + osquery enrollment via Ansible.
- Host: GitHub
- URL: https://github.com/ketsapiwiq/siem-infra
- Owner: ketsapiwiq
- License: other
- Created: 2020-06-25T12:39:29.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2022-06-14T12:43:58.000Z (over 2 years ago)
- Last Synced: 2023-03-05T10:34:06.989Z (over 1 year ago)
- Topics: ansible, elasticsearch, kibana, osquery, security, siem, vulnerability-detection, wazuh
- Language: PowerShell
- Homepage:
- Size: 1.77 MB
- Stars: 2
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Wazuh-based SIEM with Linux and Windows osquery-enabled agents with Ansible + Vagrant
Fully-fledged Wazuh (OSSEC HIDS + Elastic stack) installation with Linux and Windows Wazuh agents and osquery, via Ansible and Vagrant.
## Run
### With Ansible, Vagrant and VirtualBox
1. Install Vagrant
2. Run `vagrant up`
### With Terraform (deprecated and not up-to-date)
**_Careful: no firewall has been setup, your Terraform servers are listening on a public IP by default with NO KIBANA or ELASTIC AUTHENTICATION_**
1. Set your `terraform.tfvars`
2. Install Terraform plugin for your cloud provider
3. `terraform apply`
4. Install Ansible Terraform dynamic inventory binary at [adammck/terraform-inventory](https://github.com/adammck/terraform-inventory)
5. Set some variable due to a plugin issue: `export TF_STATE=./;` (see https://github.com/adammck/terraform-inventory/issues/144)
6. Run the Ansible playbooks### Known issues
- `Get-Service OssecSvc` on Windows hosts: service is stopped after the playbook played.
- Troubleshoot Windows osquery bugs## Workarounds
On MacOS Catalina, trying to use Ansible with WinRM, if you get:
```
objc[11628]: +[NSNumber initialize] may have been in progress in another thread when fork() was called.
objc[11628]: +[NSNumber initialize] may have been in progress in another thread when fork() was called. We cannot safely call it or ignore it in the fork() child process. Crashing instead. Set a breakpoint on objc_initializeAfterForkError to debug.
ERROR! A worker was found in a dead state
```You need to set some variable: `export OBJC_DISABLE_INITIALIZE_FORK_SAFETY=YES`
See https://github.com/ansible/ansible/issues/32499## External documentation
- https://documentation.wazuh.com/current/user-manual/capabilities/vulnerability-detection/index.html#vulnerability-detection
- https://documentation.wazuh.com/current/user-manual/capabilities/osquery.html
- https://documentation.wazuh.com/current/user-manual/capabilities/log-data-collection/how-to-collect-wlogs.html## TODO
### Known issues
- Troubleshoot Windows osquery bugs
### Features
- Add Powershell command execution logging and alerting
- Setup X-pack auth config + HTTPS/TLS certs everywhere
- [Active response](https://documentation.wazuh.com/3.13/user-manual/capabilities/active-response/how-it-works.html#when-is-an-active-response-triggered)## Possible evolutions
- add minotring of node modules security output recurring task (npm audit)
- integrate other tools/sysinternals into ansible playbooks: https://docs.microsoft.com/en-us/sysinternals/downloads/rootkit-revealer
- with a script to suspend all processes and dump RAM and disk (sysinternals) as an action response
- VirusTotal API / [Malice](https://github.com/maliceio/malice) / Cuckoo integration
- Suricata integration
- Multi-cluster / load-balanced Ansible playbook
- K8s/Helm ?### Low priority
- WAF / CI/CD for application security?
- more robust osquery configuration for Linux? https://github.com/palantir/osquery-configuration