Skip to content

Latest commit

 

History

History
44 lines (34 loc) · 1.82 KB

File metadata and controls

44 lines (34 loc) · 1.82 KB

Use cases

The Wazuh platform helps organizations and individuals protect their data assets through threat prevention, detection, and response. Besides, Wazuh is also employed to meet regulatory compliance requirements, such as PCI DSS or HIPAA, and configuration standards like CIS hardening guides.

Moreover, Wazuh is also a solution for users of IaaS (Amazon AWS, Azure, or Google Cloud) to monitor virtual machines and cloud instances. This is done at a system level utilizing the :doc:`Wazuh security agent <../components/wazuh-agent>` and at an infrastructure level pulling data directly from the cloud provider API.

Additionally, Wazuh is employed to protect containerized environments by providing cloud-native runtime security. This feature is based on an integration with the Docker engine API and the Kubernetes API. The Wazuh security agent can run on the Docker host providing a complete set of threat detection and response capabilities.

Below you can find examples of some of the most common use cases of the Wazuh platform.

:doc:`log-analysis` :doc:`file-integrity`
:doc:`rootkits-detection` :doc:`active-response`
:doc:`configuration-assessment` :doc:`system-inventory`
:doc:`vulnerability-detection` :doc:`cloud-security`
:doc:`container-security` :doc:`regulatory-compliance`
.. toctree::
   :hidden:

   log-analysis
   file-integrity
   rootkits-detection
   active-response
   configuration-assessment
   system-inventory
   vulnerability-detection
   cloud-security
   container-security
   regulatory-compliance