SIEM Protection in 2023 | Wazuh
SIEM Protetion with Wazuh
DATA Breaches today seem to come as features in the world of IT these days. Sites like this show a good list of Data breaches, Hacks, and Exposures in the IT industry. How do all these boiler room/start up companys stay up to date with protection when building applications for the masses? What are some ways to for them to get acclimated without breaking the bank, and how do you determine whats important in your infrastructure when it comes to PCI compliances, SIEM, CIS standards, and all other security available. Well, thats where Wazuh comes in. Why ask all these questions, Why Wazuh, lemme try and break that down what Wazuh is, how to pronounce it, ways to install it, and why it may work for you.
Wazuh and wallets
Wazuh, prounounced ‘wa-zoo’ (unconfirmed but common in the industry) is an SIEM. SIEM, which is pronounced “sim” combines a mix of security information management, and security event management. SIEM itself is an acronym that stands for Security Information & Event Management. Security Information, like data and log aggregation consists of reading and viewing data to help catch exploits, errors in logs, and other issues in data with alerts in place to prepare engineers for mitigating security vulnerabilities. Security Event Management cosists of monitoring and managing security vulnerabilities. Big named companies like Splunk, help with log aggregation and assist with providing logs for security breaches, data leaks, network leaks, and network logs. Other companies like SolarWinds can handle intrusion Detection and Threat Intelligence which can do things like manage hacks, data breaches, or review and report compliance checks to make sure servers are up to date. The bad thing about these applications is that they come with free trials that bind you to a cost per server licenses that can run up to $4,500 a month. Wazuh is free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.
Wazuh components
Wazuh is a security platform that provides unified XDR (extended detection and response) and SIEM protection for multiple endpoints and cloud workloads. Web servers, database servers, cahcing servers, whatever your working with, wazuh can help protect it. The site and docs would say something like this
Wazuh is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity monitoring, policy monitoring, rootkit detection, real-time alerting, active response, vulnerability detector, etc.
The solution is composed of a single universal agent and three central components: the Wazuh server, the Wazuh indexer, and the Wazuh dashboard. The Wazuh server and indexer can be installed on the same host but the dashboard should be installed on a different server. They can be configured in the cloud or, you can pay for a cloud configured platform through Wazuh (where they make their profit). However, this is an open source product, and one I use in my development environment, which means for this blog we will talk about setting up wazuh in your local dev environment as well.The setup can be used in production environments as well, but its suggested to look into whether this is a good fit for you or not first. Many companies will find solutions that seem to fit at one point, and then fail years down the road when no one with the experience is around to maintain it, so its important to test this out locally or talk to the Wazuh team about migration efforts. Lets break down the dev containers and components that break down this version of Wazuh.
- The Wazuh indexer: The indexer is a full-text serach analytics engine that stores alerts generated by the Wazuh Server.
- The Wazuh Server: analyzes the data received from the Wazuh agents and triggers alerts when threats or vulnerabilities are detected.
- The Wazuh dashboard: is the web interface. The visualization for mining, analyzing, and navigating through your data.
Setup
Setting up Wazuh is best deployed using Wazuh’s documentation and their builds. You can find a links for setting up wazuh with docker. Lets break down the docker-compose file and other configuration settings required for sandbox and production servers. The official docs, where this was forked from
Local Deployment & docker-compose
If your following along wih the Wazuh docker repo you can check the README.md file for more documentation on setting up SSL certificates, dashboard access, and more.
To spin up wazuh in a local environment you can run the following.
$ git clone https://github.com/tmeralus/wazuh-docker)
$ cd build-docker-images
$ sh build-images.sh
More blogs about all of wazuh benefits will be provided.
Company Benefits of Wazuh
For most companies looking for a list of these features, wazuh provides all of them for F-R-E-E.
Endpoint Security
Configuration Assessment
Malware Detection
File Integrity Monitoring
Threat Intelligence
Threat Hunting
Log Data Analysis
Vulnerability Detection
Security Operations
Incident Response
Regulatory Compliance
IT Hygiene
Cloud Security
Container Security
Posture Management
Workload Protection
Keep all your data up to date with the latest security standards, analytics, and exploits can be costly. Wazuh helps limit that cost with your application/operations. From security log analysis to vulnerability detection, having an all in one solution to aggregate your data sounds like a win win. Maybe Caesars Palace could have saved millions if they had a solution like this. I am in no way a paid partner of Wazuh, nor do I have any affliation with them but when I come across a solution that I have integrated into a companies architecture I like to talk about it. So check it and and see for yourself.
In 2023, the year of layoffs, budget cuts, hacks, and vulnerabilities, I think Wazuh is a solid solution!