top | item 41967127

Wazuh – Open-source security platform

110 points| LorenDB | 1 year ago |wazuh.com

59 comments

order
[+] krunck|1 year ago|reply
This is built upon OSSec[1]. While it works ok, with Elastic underneath it's far too much maintenance for my 30 servers.

[1] - https://www.ossec.net/

[+] ArnoVW|1 year ago|reply
There is a hosted offering https://wazuh.com/cloud

I run an in-house deployment using the Docker conf they supply. It requires a couple of hours per month and mainly a lot of disparate skills.

The real thing that takes time is the installation and configuration of the rules and agents. That’s something that you have to do for any SIEM really, irrespective of open source / paid: you have to understand your nominal feed and that takes time.

[+] yabones|1 year ago|reply
Sadly OSSEC is largely abandoned. Back in the day it was very good for a lightweight and effective security system for those that didn't want to install full-blown antivirus on everything. I wish they would donate the project to Linux Foundation or CNCF, but it seems destined for decline.
[+] valyala|1 year ago|reply
It would be great to be able to use VictoriaLogs underneath instead of Elasticsearch. This would simplify the configuration and maintenance, since VictoriaLogs works optimally with default configs on any hardware. This will also help reducing hardware costs for large amounts of stored security logs, since VictoriaLogs usually needs up to 30x less RAM and up to 15x less disk space than Elasticsearch for the same amounts of logs. See https://itnext.io/how-do-open-source-solutions-for-logs-work... for details.
[+] stego-tech|1 year ago|reply
Kicked the tires on it, but the agent requirement was a no-go for me. Coming from Enterprise Infrastructure, mandating Yet Another Agent is already knocking your product down several grades versus those leveraging OpenTelemetry or standardized collectors and forwarders.

An agentless Nessus scan (man, I miss Nessus) gets you 90% of the way there for all but the most security-conscious organizations, and its agent is honestly kind of light and simple if I have to install it.

[+] waihtis|1 year ago|reply
Wazuh does much more than Nessus, for instance you can instruct the agent to temporarily drop networking if you identify a compromised machine. Agentless scans will do nothing of the like.
[+] cyberpunk|1 year ago|reply
Spoiler alert: agent based. Ran it before, was a maint burden of the first order.
[+] deskr|1 year ago|reply
It's not exactly the surprise of the century that running your own services, let alone a security platform, requires maintenance.

What was it specifically that made it a "maint burden of the first order?"

[+] heraldgeezer|1 year ago|reply
Did you think it was set and forget? There is a reason companies have entire SOC teams only looking at EDR and SIEM.

What SIEM did you move to that was less of a burden?

[+] thesuitonym|1 year ago|reply
I know of no similar package that isn't agent based, at least when it comes to endpoints. I'd be happy to hear an alternative, though.
[+] ArnoVW|1 year ago|reply
There is an agentless option that just requires ssh access. Not something I’d prefer from a security point of view, but it’s possible.
[+] lfkdev|1 year ago|reply
Agent based is not really a big burden, most monitoring systems work like this (Prometheus). Companys use Ansible etc.
[+] arnejenssen|1 year ago|reply
It is mind-blowing that such a good SIEM (Security information and event management) software can be free.
[+] alias_neo|1 year ago|reply
I'd like to give you a virtual cookie, for being the only person in the comments so far to spell out what SIEM stands for.

I appreciate you.

[+] candiddevmike|1 year ago|reply
> such a good SIEM

Source? The value a SIEM provides these days is mostly the out of the box integrations and log parses. Wazuh is far from that, IME.

[+] BrandoElFollito|1 year ago|reply
My team tested it when we were choosing an EDR and SIEM. The experience was horrendous.

The maintenance is huge, you need to hunt for rulesets, the EDR is half baked, etc.

[+] pphysch|1 year ago|reply
What net benefits does a full blown "SIEM" add over a simple log database w/ alerting support?
[+] lousken|1 year ago|reply
Building on top of elastic was an easy win. However, SCAs need a lot more love. Some of them are wrong/outdated, while many are missing.
[+] bks|1 year ago|reply
So what SIEM do people suggest? AWS shop, EC2, VPC, Lamba, RDS
[+] lionkor|1 year ago|reply
> Unified XDR and SIEM protection for endpoints and cloud workloads

Guess IDC ABT this. Jokes aside, read the page, still don't know if I care about this or need it...

[+] amne|1 year ago|reply
TIL that SIEM, SCA, XDR (and more?) exist. Now to go and find out what they actually mean (and please don't point out that SIEM is already explained on their page).

Clearly parent could have phrased it more explicitly that he knows nothing about this field. But I also see downvoting him as a form of gatekeeping.

[+] ThinkBeat|1 year ago|reply
I am not familiar with the term.

"Universal agent" is some form of antivirus, ransomware software like ESET, or McAffee?

Or does the universal agent listen to "endpoint security, somebody elses antivirus that reports what it finds up the chain?

And the next step is that the data gets to the server, is parsed, stored etc and present on a nice gui?

"Someone proped computer3 with a known exsploit at (somedatetime)" ?

[+] stevenAthompson|1 year ago|reply
They're implying that you have a single agent which does the EDR (antivirus) and SIEM (logging) functionality instead of two separate agents. This is becoming more commonplace throughout the security industry as multiple agents can be burdensome from both a security and maintenance perspective.
[+] lfkdev|1 year ago|reply
As far as I know it's just a node exporter, similar to prometheues node-exporter
[+] RecycledEle|1 year ago|reply
As a teacher, I love explaining how professional most IT security software is. I go over several acronyms for various software packages.

Then I ask the class to guess at where Wazuh's name came from.

It's not a concept from The Art of War in the original Chinese.

It's not an ancient Samurai motto.

It's from "Up you wazuh"

[+] ris|1 year ago|reply
Just Say No to "endpoint security"
[+] bigblackrooster|1 year ago|reply
What is the good alternative to this? McAffee? AVAST? Kaspersky?
[+] jaderobbins1|1 year ago|reply
Can some folks in the cybersecurity arena recommend some good email newsletters, websites, blogs, accounts, etc to follow to keep up in the space?
[+] ziddoap|1 year ago|reply
Any specific areas of interest?

Some mailing lists at [1], like oss-security & kernel-hardening. CISA (Cybersecurity and Infrastructure Security Agency) [2] has a few different areas they report on. Mozilla has the dev-security-policy mailing list for all things PKI (public key infrastructure) [3], and a few other lists as well. There's the Full Disclosure [4] mailing list for vulnerabilities/exploits, etc. Quite a few others at [5], though sadly many are no longer active.

[1] https://openwall.com/lists/

[2] https://www.cisa.gov/about/contact-us/subscribe-updates-cisa

[3] https://groups.google.com/a/mozilla.org/g/dev-security-polic...

[4] https://seclists.org/fulldisclosure/

[5] https://seclists.org/

[+] xnorswap|1 year ago|reply
I'm not in cyber but "Risky Business" ( https://risky.biz/ ) is a good podcast to keep up to date.

They always have a lot of outgoing links in their show-notes that should get you started with the rest.

[+] Sytten|1 year ago|reply
You have different areas of security. Sadly our space is full of grifters and wanna be security "experts". For a very technical security podcast I recommend Critical Thinking Bug Bounty [1].

[1] https://www.criticalthinkingpodcast.io/

[+] dengolius|1 year ago|reply
What about adding compatibility with VictoriaLogs instead of using Elasticsearch/OpenSearch?
[+] stevenAthompson|1 year ago|reply
When I see a project of this complexity advertise itself as "open source' these days my first thought is the rug pull. Will this STAY free, or turn into an eventual cash grab one it's insinuated itself so deeply into your environment that it would be hard to replace?
[+] KetoManx64|1 year ago|reply
Well your other choice is you pay for a non open source SIEM that's $10 per endpoint per month and cross your fingers that they don't do a rugpull and start charging you $20 after it's insinuated itself into your environment is hard to replace..

With an Open Source project you at least have the possibility that if it has enough users and companies using it then someone will fork the code if the company ever makes it closed source and keep the project going.

[+] pphysch|1 year ago|reply
My first thought isn't the "rug pull" but rather that the real product being produced by the "FOSS company", from the get go, are the expensive support contracts.

Two different business models:

- Sell a great+differentiated product, support is ~free and rarely needed

- Give a away a terrible product (usually an over-engineered CRUD), constant $upport is required to use it effectively