The SOC Automation Project is designed to create an automated Security Operations Center (SOC) workflow that enhances event monitoring, alerting, and incident response. By leveraging powerful open-source security tools such as Wazuh, Shuffle, and TheHive, this project optimizes SOC operations by automating repetitive tasks, reducing the workload on security analysts, and improving overall efficiency in security monitoring.
- Automate Event Collection and Analysis – Ensures security events are collected, logged, and analyzed in real-time, reducing manual intervention.
- Streamline the Alerting Process – Automates the process of generating, forwarding, and triaging alerts to minimize response times.
- Enhance Incident Response Capabilities – Introduces automated response actions for security incidents, ensuring a swift and structured response.
- Improve SOC Efficiency – Reduces analyst workload by automating log analysis, threat correlation, and case management.
To successfully set up the SOC Automation Lab, ensure your system meets the following hardware requirements:
- Host machine capable of running multiple virtual machines (VMs).
- Minimum 16GB RAM and 4 vCPUs (recommended 32GB RAM for smoother performance).
- 500GB+ disk space to store log files and system images.
- VMware Workstation/Fusion or VirtualBox – Used for virtualization.
- Windows 10 ISO – Acts as the client machine for security event generation.
- Ubuntu 22.04 ISO – Serves as the operating system for Wazuh and TheHive.
- Sysmon – Provides detailed Windows event logging for advanced threat detection.
- Wazuh – A powerful open-source SIEM and XDR platform for log collection and analysis.
- Shuffle – A SOAR (Security Orchestration, Automation, and Response) tool that automates security workflows.
- TheHive – A Security Incident Response Platform (SIRP) for managing security investigations and response actions.
- VirusTotal – A cloud-based malware scanning and intelligence platform for file and URL analysis.
- Familiarity with Virtual Machines (VMs) and virtualization platforms.
- Basic Linux command-line experience (file manipulation, installing packages, editing config files).
- Understanding of SOC operations, log analysis, threat detection, and security automation.
- Download and install VMware Workstation or VirtualBox.
- Create a new virtual machine with:
- 4GB RAM, 2 vCPUs, and 50GB storage.
- Attach the Windows 10 ISO and complete the installation.
- Download Sysmon from the Sysinternals website.
- Obtain a Sysmon configuration file (from GitHub or DFIR resources).
- Extract the Sysmon archive and navigate to the extracted folder in PowerShell.
- Install Sysmon using:
.\Sysmon64.exe -i .\sysmonconfig.xml
- Verify Sysmon installation:
- Open Services.msc and check for Sysmon64.
- Open Event Viewer > Applications and Services Logs > Microsoft > Windows > Sysmon.
- Create a DigitalOcean Droplet with Ubuntu 22.04.
- Set a strong root password and name the droplet Wazuh.
- Configure a firewall:
- Navigate to Networking > Firewalls.
- Restrict inbound traffic and allow only trusted IPs.
- Connect to the server via SSH:
ssh root@[WAZUH-SERVER-IP]
- Update and upgrade packages:
sudo apt-get update && sudo apt-get upgrade -y
- Install Wazuh:
curl -sO https://packages.wazuh.com/4.7/wazuh-install.sh && sudo bash ./wazuh-install.sh -a
- Access the Wazuh Web Interface at:
https://[WAZUH-SERVER-IP]/
- Install Ubuntu 22.04.
- Allocate 8GB RAM, 4 vCPUs, and 50GB Storage.
- Follow the Wazuh Quickstart Guide.
- Create a DigitalOcean Droplet for TheHive (Ubuntu 22.04).
- Install dependencies:
sudo apt install wget gnupg apt-transport-https git ca-certificates curl -y
- Install Java, Cassandra, and Elasticsearch.
- Install TheHive:
sudo apt-get install -y thehive
- Access TheHive Web Interface at:
http://[THEHIVE-SERVER-IP]:9000
- Create a Webhook in Shuffle and copy the URL.
- Modify Wazuh Configuration:
<integration> <name>shuffle</name> <hook_url>https://shuffler.io/api/v1/hooks/webhook</hook_url> <level>3</level> <alert_format>json</alert_format> </integration>
- Restart Wazuh:
systemctl restart wazuh-manager.service
- Extract SHA256 hash from alerts.
- Query VirusTotal for threat intelligence.
- Forward alerts to TheHive for investigation.
- Send Email Notifications to SOC Analysts.
This project successfully integrates Wazuh, TheHive, and Shuffle to create an automated SOC environment. The implementation ensures:
- Real-time event monitoring and automated alerting.
- Seamless integration between security tools for automation.
- Incident response workflows using SOAR capabilities.
Future improvements can include advanced correlation rules, integrating additional threat intelligence sources, and refining automation workflows.
- Microsoft Docs. "Sysmon for Windows". Accessed March 2025.
- Wazuh. "Wazuh Documentation". Accessed March 2025.
- TheHive Project. "TheHive Documentation". Accessed March 2025.
- DigitalOcean. "How to Set Up a SOC Environment". Accessed March 2025.