I run an in-house deployment using the Docker conf they supply. It requires a couple of hours per month and mainly a lot of disparate skills.
The real thing that takes time is the installation and configuration of the rules and agents. That’s something that you have to do for any SIEM really, irrespective of open source / paid: you have to understand your nominal feed and that takes time.
Sadly OSSEC is largely abandoned. Back in the day it was very good for a lightweight and effective security system for those that didn't want to install full-blown antivirus on everything. I wish they would donate the project to Linux Foundation or CNCF, but it seems destined for decline.
It would be great to be able to use VictoriaLogs underneath instead of Elasticsearch. This would simplify the configuration and maintenance, since VictoriaLogs works optimally with default configs on any hardware. This will also help reducing hardware costs for large amounts of stored security logs, since VictoriaLogs usually needs up to 30x less RAM and up to 15x less disk space than Elasticsearch for the same amounts of logs. See https://itnext.io/how-do-open-source-solutions-for-logs-work... for details.
Kicked the tires on it, but the agent requirement was a no-go for me. Coming from Enterprise Infrastructure, mandating Yet Another Agent is already knocking your product down several grades versus those leveraging OpenTelemetry or standardized collectors and forwarders.
An agentless Nessus scan (man, I miss Nessus) gets you 90% of the way there for all but the most security-conscious organizations, and its agent is honestly kind of light and simple if I have to install it.
Wazuh does much more than Nessus, for instance you can instruct the agent to temporarily drop networking if you identify a compromised machine. Agentless scans will do nothing of the like.
TIL that SIEM, SCA, XDR (and more?) exist. Now to go and find out what they actually mean (and please don't point out that SIEM is already explained on their page).
Clearly parent could have phrased it more explicitly that he knows nothing about this field. But I also see downvoting him as a form of gatekeeping.
They're implying that you have a single agent which does the EDR (antivirus) and SIEM (logging) functionality instead of two separate agents. This is becoming more commonplace throughout the security industry as multiple agents can be burdensome from both a security and maintenance perspective.
Some mailing lists at [1], like oss-security & kernel-hardening. CISA (Cybersecurity and Infrastructure Security Agency) [2] has a few different areas they report on. Mozilla has the dev-security-policy mailing list for all things PKI (public key infrastructure) [3], and a few other lists as well. There's the Full Disclosure [4] mailing list for vulnerabilities/exploits, etc. Quite a few others at [5], though sadly many are no longer active.
You have different areas of security. Sadly our space is full of grifters and wanna be security "experts". For a very technical security podcast I recommend Critical Thinking Bug Bounty [1].
When I see a project of this complexity advertise itself as "open source' these days my first thought is the rug pull. Will this STAY free, or turn into an eventual cash grab one it's insinuated itself so deeply into your environment that it would be hard to replace?
Well your other choice is you pay for a non open source SIEM that's $10 per endpoint per month and cross your fingers that they don't do a rugpull and start charging you $20 after it's insinuated itself into your environment is hard to replace..
With an Open Source project you at least have the possibility that if it has enough users and companies using it then someone will fork the code if the company ever makes it closed source and keep the project going.
My first thought isn't the "rug pull" but rather that the real product being produced by the "FOSS company", from the get go, are the expensive support contracts.
Two different business models:
- Sell a great+differentiated product, support is ~free and rarely needed
- Give a away a terrible product (usually an over-engineered CRUD), constant $upport is required to use it effectively
[+] [-] krunck|1 year ago|reply
[1] - https://www.ossec.net/
[+] [-] ArnoVW|1 year ago|reply
I run an in-house deployment using the Docker conf they supply. It requires a couple of hours per month and mainly a lot of disparate skills.
The real thing that takes time is the installation and configuration of the rules and agents. That’s something that you have to do for any SIEM really, irrespective of open source / paid: you have to understand your nominal feed and that takes time.
[+] [-] yabones|1 year ago|reply
[+] [-] valyala|1 year ago|reply
[+] [-] stego-tech|1 year ago|reply
An agentless Nessus scan (man, I miss Nessus) gets you 90% of the way there for all but the most security-conscious organizations, and its agent is honestly kind of light and simple if I have to install it.
[+] [-] waihtis|1 year ago|reply
[+] [-] cyberpunk|1 year ago|reply
[+] [-] deskr|1 year ago|reply
What was it specifically that made it a "maint burden of the first order?"
[+] [-] heraldgeezer|1 year ago|reply
What SIEM did you move to that was less of a burden?
[+] [-] thesuitonym|1 year ago|reply
[+] [-] rafaelalb|1 year ago|reply
[+] [-] ArnoVW|1 year ago|reply
[+] [-] lfkdev|1 year ago|reply
[+] [-] arnejenssen|1 year ago|reply
[+] [-] alias_neo|1 year ago|reply
I appreciate you.
[+] [-] candiddevmike|1 year ago|reply
Source? The value a SIEM provides these days is mostly the out of the box integrations and log parses. Wazuh is far from that, IME.
[+] [-] BrandoElFollito|1 year ago|reply
The maintenance is huge, you need to hunt for rulesets, the EDR is half baked, etc.
[+] [-] pphysch|1 year ago|reply
[+] [-] lousken|1 year ago|reply
[+] [-] bks|1 year ago|reply
[+] [-] lionkor|1 year ago|reply
Guess IDC ABT this. Jokes aside, read the page, still don't know if I care about this or need it...
[+] [-] amne|1 year ago|reply
Clearly parent could have phrased it more explicitly that he knows nothing about this field. But I also see downvoting him as a form of gatekeeping.
[+] [-] ThinkBeat|1 year ago|reply
"Universal agent" is some form of antivirus, ransomware software like ESET, or McAffee?
Or does the universal agent listen to "endpoint security, somebody elses antivirus that reports what it finds up the chain?
And the next step is that the data gets to the server, is parsed, stored etc and present on a nice gui?
"Someone proped computer3 with a known exsploit at (somedatetime)" ?
[+] [-] stevenAthompson|1 year ago|reply
[+] [-] lfkdev|1 year ago|reply
[+] [-] RecycledEle|1 year ago|reply
Then I ask the class to guess at where Wazuh's name came from.
It's not a concept from The Art of War in the original Chinese.
It's not an ancient Samurai motto.
It's from "Up you wazuh"
[+] [-] ris|1 year ago|reply
[+] [-] bigblackrooster|1 year ago|reply
[+] [-] ris|1 year ago|reply
[+] [-] jaderobbins1|1 year ago|reply
[+] [-] ziddoap|1 year ago|reply
Some mailing lists at [1], like oss-security & kernel-hardening. CISA (Cybersecurity and Infrastructure Security Agency) [2] has a few different areas they report on. Mozilla has the dev-security-policy mailing list for all things PKI (public key infrastructure) [3], and a few other lists as well. There's the Full Disclosure [4] mailing list for vulnerabilities/exploits, etc. Quite a few others at [5], though sadly many are no longer active.
[1] https://openwall.com/lists/
[2] https://www.cisa.gov/about/contact-us/subscribe-updates-cisa
[3] https://groups.google.com/a/mozilla.org/g/dev-security-polic...
[4] https://seclists.org/fulldisclosure/
[5] https://seclists.org/
[+] [-] alligatorplum|1 year ago|reply
I add new blogs as I run into them on twitter/reddit/HN/etc
[+] [-] xnorswap|1 year ago|reply
They always have a lot of outgoing links in their show-notes that should get you started with the rest.
[+] [-] danfoxley|1 year ago|reply
[+] [-] Carbonade|1 year ago|reply
[+] [-] InfoSecErik|1 year ago|reply
[+] [-] Sytten|1 year ago|reply
[1] https://www.criticalthinkingpodcast.io/
[+] [-] dengolius|1 year ago|reply
[+] [-] stevenAthompson|1 year ago|reply
[+] [-] KetoManx64|1 year ago|reply
With an Open Source project you at least have the possibility that if it has enough users and companies using it then someone will fork the code if the company ever makes it closed source and keep the project going.
[+] [-] pphysch|1 year ago|reply
Two different business models:
- Sell a great+differentiated product, support is ~free and rarely needed
- Give a away a terrible product (usually an over-engineered CRUD), constant $upport is required to use it effectively