This script automates the setup of a comprehensive security monitoring environment, including a Security Information and Event Management (SIEM) system,Network-based Intrusion Detection System (NIDS) and Host-based Intrusion Detection System (HIDS) on a single machine. It streamlines the installation process, making it accessible to users with different levels of technical expertise.
Note: This script is intended to install all the components on a single machine, meaning the same box will have the SIEM, NIDS, and HIDS core components.
The script facilitates the installation of the following SOC components:
-
SIEM (Security Information and Event Management): This component combines Elasticsearch, Kibana, and Filebeat to provide a powerful platform for monitoring and analyzing security events in your environment. The SIEM setup includes Elasticsearch, Kibana and Filebeat version 7.17.13 as it is the compatible version to integrate with Wazuh manager version 4.5
-
NIDS (Network-based Intrusion Detection System): Suricata, a high-performance NIDS, is configured to help protect your network from intrusions and suspicious activities. Note: Suricata will monitor the local interface of the machine where it is installed. To monitor the entire network traffic, it should receive traffic from a TAP device or a SPAN port.
- HIDS (Host-based Intrusion Detection System): The script installs the Wazuh Manager, an open-source HIDS. It aids in monitoring, detecting, and responding to security threats on individual hosts. The setup includes the installation of Wazuh Manager version 4.5
Before running the script, please ensure that your system meets the following requirements:
- Ubuntu OS
- Minimum 4GB of RAM
- Minimum 20GB of free disk space
If your system doesn't meet these requirements, the script will issue a warning and allow you to proceed at your own risk.
-
Install necessary packages
apt install lolcat figlet net-tools git curl -y
-
Clone this repository to your local machine:
git clone https://github.com/curioumehedi/soc_setup/
-
Navigate to the repository's directory:
cd soc_setup
-
Make the setup_script.sh executable:
chmod +x setup_script.sh
-
Execute the setup_script.sh:
./setup_script.sh
-
Follow the on-screen prompts to choose which components you want to install and continue with the setup. Post-Installation Steps
-
After successfully running the script and completing the NIDS (Suricata) setup, consider the following post-installation steps:
Check if logs are getting written to the /var/log/suricata/eve.json file. This is essential for monitoring network traffic. Besides, you need to check from kibana if data is being displayed in Suricata Dashboard.
To complete the setup and ensure effective security monitoring, install Wazuh agents on Linux or Windows machines in your network. This allows you to ingest logs into the SIEM, enhancing your security monitoring capabilities.
Data Backup: Before proceeding, it's advisable to backup your data, especially if you plan to run the script on a production system.
After setting up the security components, consider following best practices for system hardening, firewall configurations, and securing sensitive data.