chrisbensch / soc_lab_setup

This repo contains scripts to install a SIEM (Elasticsearch, Kibana and Filebeat) , HIDS (Wazuh Manager) and NIDS (Suricata)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Automated SOC Components Setup Script

Overview

main_pic

This script automates the setup of a comprehensive security monitoring environment, including a Security Information and Event Management (SIEM) system,Network-based Intrusion Detection System (NIDS) and Host-based Intrusion Detection System (HIDS) on a single machine. It streamlines the installation process, making it accessible to users with different levels of technical expertise.

Note: This script is intended to install all the components on a single machine, meaning the same box will have the SIEM, NIDS, and HIDS core components.

Components

The script facilitates the installation of the following SOC components:

  1. SIEM (Security Information and Event Management): This component combines Elasticsearch, Kibana, and Filebeat to provide a powerful platform for monitoring and analyzing security events in your environment. The SIEM setup includes Elasticsearch, Kibana and Filebeat version 7.17.13 as it is the compatible version to integrate with Wazuh manager version 4.5 siem_setup_1

    elasticsearch
  2. NIDS (Network-based Intrusion Detection System): Suricata, a high-performance NIDS, is configured to help protect your network from intrusions and suspicious activities. Note: Suricata will monitor the local interface of the machine where it is installed. To monitor the entire network traffic, it should receive traffic from a TAP device or a SPAN port.

Suricata_setup suricata_dashboard
  1. HIDS (Host-based Intrusion Detection System): The script installs the Wazuh Manager, an open-source HIDS. It aids in monitoring, detecting, and responding to security threats on individual hosts. The setup includes the installation of Wazuh Manager version 4.5
wazuh_setup wazuh

System Requirements

Before running the script, please ensure that your system meets the following requirements:

  • Ubuntu OS
  • Minimum 4GB of RAM
  • Minimum 20GB of free disk space

If your system doesn't meet these requirements, the script will issue a warning and allow you to proceed at your own risk.

Usage

  1. Clone this repository to your local machine:

    git clone https://github.com/samiul008ghub/soc_setup/
    
  2. Navigate to the repository's directory:

    cd soc_setup
  3. Make the setup_script.sh executable:

    chmod +x setup_script.sh
  4. Execute the setup_script.sh:

    ./setup_script.sh
  5. Follow the on-screen prompts to choose which components you want to install and continue with the setup. Post-Installation Steps

  6. After successfully running the script and completing the NIDS (Suricata) setup, consider the following post-installation steps:

Verify NIDS Logs:

Check if logs are getting written to the /var/log/suricata/eve.json file. This is essential for monitoring network traffic. Besides, you need to check from kibana if data is being displayed in Suricata Dashboard.

Wazuh-Agent Installation:

To complete the setup and ensure effective security monitoring, install Wazuh agents on Linux or Windows machines in your network. This allows you to ingest logs into the SIEM, enhancing your security monitoring capabilities.

Warnings and Considerations

Data Backup: Before proceeding, it's advisable to backup your data, especially if you plan to run the script on a production system.

Security Best Practices

After setting up the security components, consider following best practices for system hardening, firewall configurations, and securing sensitive data.

About

This repo contains scripts to install a SIEM (Elasticsearch, Kibana and Filebeat) , HIDS (Wazuh Manager) and NIDS (Suricata)

License:MIT License


Languages

Language:Shell 100.0%