All Projects → wazuh → wazuh-cloudformation

wazuh / wazuh-cloudformation

Licence: other
Wazuh - Amazon AWS Cloudformation

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to wazuh-cloudformation

Wazuh
Wazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+9756.25%)
Mutual labels:  log-analysis, incident-response, ids, pci-dss, security-hardening, vulnerability-detection, ossec, openscap, wazuh, policy-monitoring, security-awareness
wazuh-packages
Wazuh - Tools for packages creation
Stars: ✭ 54 (+68.75%)
Mutual labels:  log-analysis, incident-response, ids, pci-dss, security-hardening, vulnerability-detection, ossec, wazuh, policy-monitoring, security-awareness
wazuh-ansible
Wazuh - Ansible playbook
Stars: ✭ 166 (+418.75%)
Mutual labels:  log-analysis, incident-response, ids, pci-dss, security-hardening, vulnerability-detection, ossec, wazuh, policy-monitoring, security-awareness
wazuh-puppet
Wazuh - Puppet module
Stars: ✭ 25 (-21.87%)
Mutual labels:  log-analysis, incident-response, pci-dss, security-hardening, vulnerability-detection, ossec, wazuh, policy-monitoring, security-awareness
Wazuh Ruleset
Wazuh - Ruleset
Stars: ✭ 305 (+853.13%)
Mutual labels:  log-analysis, incident-response, ids, pci-dss, security-hardening, vulnerability-detection
Wazuh Chef
Wazuh - Chef cookbooks
Stars: ✭ 9 (-71.87%)
Mutual labels:  log-analysis, incident-response, ids, pci-dss, security-hardening, vulnerability-detection
Wazuh Kibana App
Wazuh - Kibana plugin
Stars: ✭ 212 (+562.5%)
Mutual labels:  log-analysis, incident-response, ids, pci-dss, security-hardening, vulnerability-detection
Wazuh Docker
Wazuh - Docker containers
Stars: ✭ 213 (+565.63%)
Mutual labels:  log-analysis, incident-response, ids, pci-dss, security-hardening, vulnerability-detection
Wazuh Documentation
Wazuh - Project documentation
Stars: ✭ 82 (+156.25%)
Mutual labels:  log-analysis, incident-response, pci-dss, security-hardening, vulnerability-detection
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+28453.13%)
Mutual labels:  pci-dss, security-hardening, vulnerability-detection
Ossec Hids
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+11087.5%)
Mutual labels:  pci-dss, ossec, policy-monitoring
The Practical Linux Hardening Guide
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Stars: ✭ 8,790 (+27368.75%)
Mutual labels:  pci-dss, openscap
Content
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+3709.38%)
Mutual labels:  pci-dss, security-hardening
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+1034.38%)
Mutual labels:  incident-response, vulnerability-detection
Siac
SIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (+212.5%)
Mutual labels:  incident-response, pci-dss
Patrowldocs
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (+228.13%)
Mutual labels:  incident-response, vulnerability-detection
Marsnake
System Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-50%)
Mutual labels:  security-hardening, vulnerability-detection
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+27537.5%)
Mutual labels:  security-hardening, vulnerability-detection
Patrowlengines
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (+406.25%)
Mutual labels:  incident-response, vulnerability-detection
siemstress
Very basic CLI SIEM (Security Information and Event Management system).
Stars: ✭ 24 (-25%)
Mutual labels:  log-analysis, security-awareness

Wazuh for Amazon AWS Cloudformation

Slack Email Documentation Web

This repository contains CloudFormation templates and provision scripts to deploy both a Wazuh production-ready environment and a Wazuh demo environment in Amazon Web Services (AWS):

Production-ready environment:

  • A VPC with two subnets, one for Wazuh servers, and another for Elastic Stack
  • Wazuh managers cluster with two nodes, a master and a worker
  • An Elasticsearch cluster with a minimum of 3 data nodes, auto-scalable to a maximum of 6 nodes
  • A Kibana node that includes a local elasticsearch client node, and an Nginx for HTTP basic authentication
  • Wazuh servers sit behind an internet-facing load balancer for agents to communicate with the cluster
  • Kibana server sit behind an internet facing load balancer, that optionally loads an SSL Certificate for HTTPS
  • Route53 DNS records for the loadbalancer, Wazuh and Elastic Stack nodes (optional).

Demo environment:

  • A VPC with two subnets, one for Wazuh servers, and another for Elastic Stack
  • Wazuh managers cluster with two nodes, a master and a worker
  • An Elasticsearch cluster with a minimum of 3 data nodes, auto-scalable to a maximum of 6 nodes
  • A Kibana node that includes a local elasticsearch client node, and an Nginx for HTTP basic authentication
  • Wazuh servers sit behind an internet-facing load balancer for agents to communicate with the cluster
  • Kibana server sit behind an internet facing load balancer, that optionally loads an SSL Certificate for HTTPS
  • A Splunk Indexer instance with a Splunk app for Wazuh installed on it.
  • Six Wazuh agents installed on different operating systems: Red Hat 7, CentOS 7, Ubuntu, Debian, Amazon Linux and Windows.

Unattendend all-in-one

  • Use install script, following Wazuh unattended all-in-one installation
  • Resources:
    • WazuhAIO: EC2 instance
    • SecurityGroup: EC2 Security Group. It enables the following ports:
      • 443 ( HTTPS) -> 0.0.0.0
      • 22 (SSH) -> 0.0.0.0

Unattended distributed

  • Use install script, following Wazuh unattended distributed installation
  • Reosurces:
    • WazuhVPC: EC2 VPC
    • SubnetWazuh: EC2 Subnet over WazuhVPC
    • SubnetElasticsearch: EC2 Subnet over WazuhVPC
    • InternetGateway: EC2 InternetGateway between WazuhVPC and public network
    • GatewayToInternet: EC2 VPCGatewayAttachment attached to WazuhVPC
    • PublicRouteTable: EC2 RouteTable for WazuhVPC
    • PublicRoute: EC2 Route of PublicRouteTable with a specific destination CIDR
    • SubnetWazuhPublicRouteTable: EC2 SubnetRouteTableAssociation attached to SubnetWazuh
    • SubnetElasticPublicRouteTable: EC2 SubnetRouteTableAssociation attached to SubnetElasticsearch
    • WazuhSecurityGroup: EC2 SecurityGroup over WazuhVPC. It enables the following ports and protocols:
      • 22 (SSH) -> 0.0.0.0
      • ICMP -> 0.0.0.0
      • 1514-1516 (Wazuh manager) -> WazuhVPC
      • 55000 (Wazuh API) -> WazuhVPC
    • ElasticSecurityGroup: EC2 SecurityGroup over WazuhVPC. It enables the following ports and protocols:
      • 22 (SSH) -> 0.0.0.0
      • ICMP -> 0.0.0.0
      • 443 (HTTPS) -> 0.0.0.0
      • 9200-9400 (Wazuh manager) -> WazuhVPC
      • 5000 (wazuh manager) -> WazuhVPC
    • Elastic1: EC2 Instance Elasticsearch initial node (with Kibana)
    • Elastic2: EC2 Instance Elasticsearch node
    • Elastic3: EC2 Instance Elasticsearch node
    • WazuhMaster: EC2 Instance Wazuh master node
    • WazuhWorker: EC2 Instance Wazuh worker node
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].