Deployable SOC building blocks for SMEs: log collection, detection, dashboards, automation, and optional AI-assisted triage.
Goal: Provide a clean, reproducible reference implementation and tooling to deploy a SOC stack in a customer environment (on-prem or lab) using open-source components.
- Centralized logging (SIEM layer) with dashboards
- Endpoint telemetry (Linux/Windows) via agents
- Network detection (Suricata/Zeek) optional
- Health checks, backups, and baseline hardening
- Automation hooks for response actions (safe, opt-in)
- Alert summarization / ticket drafting
- Triage suggestions (next steps)
- Natural-language helper using ShellGPT (optional integration)
- SIEM/Storage: Elastic/OpenSearch-compatible stack via Docker Compose (templates provided)
- Endpoint layer: Wazuh agents (Linux/Windows) (installers + enrollment helpers)
- Network layer (optional): Suricata (IDS) + Zeek (NSM) on a sensor host
- Automation: shell scripts + Python helpers
See: docs/architecture.md
This repository provides templates and automation. You will choose the final stack (Elastic/OpenSearch/Wazuh bundle) according to your environment.
git clone https://github.com/PCarba/Modular-SOC-Platform.git
cd Modular-SOC-Platformcp infrastructure/.env.example infrastructure/.env
docker compose -f infrastructure/docker-compose.yml up -d./scripts/health_check.sh- Linux:
scripts/deploy_wazuh_agent_linux.sh - Windows:
scripts/deploy_wazuh_agent_windows.ps1
.
├── docs/ # Technical docs (architecture, deployment, ops)
├── infrastructure/ # Docker Compose templates + environment file
├── scripts/ # Install, hardening, backup, health checks, response hooks
├── detection-rules/ # Suricata / Wazuh rule templates and notes
├── dashboards/ # Exported dashboard templates (placeholders)
├── ai/ # Optional AI helpers (summaries, triage)
└── lab/ # Example log samples + simulation notes (optional)
This project is for defensive security and SOC enablement. Any testing must be performed only on systems you own or have explicit authorization to test.
See: SECURITY.md
- Review
infrastructure/docker-compose.ymland set credentials ininfrastructure/.env - Place this stack behind a firewall, restrict access, enable TLS
- Maintain updates and backups (see
scripts/backup.sh)
- MITRE ATT&CK mapping for detections
- SOAR-style playbooks (opt-in)
- Threat intel ingestion templates
- CI checks (shellcheck, python lint)
Pablo Carballeira Baamonde
GitHub: PCarba