Skip to main content

Design Principles

The Enterprise SOC Architecture is built on a foundation of proven security and architectural principles. This page documents the core design philosophy, technology selection rationale, and best practices that guide the architecture.

Core Design Principles

The following principles shape every architectural decision in this SOC design:

Defense in Depth

Layered Security Approach

The architecture implements multiple overlapping security layers to ensure that if one control fails, others continue to provide protection.
Implementation in the Architecture:
1

Network Layer

IDS/IPS systems (Snort, Suricata) provide the first line of detection at the network perimeter, analyzing traffic patterns and signatures.
2

Endpoint Layer

Wazuh agents provide endpoint detection and response (EDR) capabilities, monitoring host-based activities and file integrity.
3

Application Layer

Log aggregation captures application-level events, enabling detection of attacks that bypass network controls.
4

Infrastructure Layer

Monitoring tools (Zabbix, Prometheus) detect anomalies in system behavior that may indicate compromise.
Defense in depth ensures that no single point of failure can compromise the entire security posture. Each layer provides independent detection and protection capabilities.

Scalability and Performance

The architecture must handle growing data volumes and infrastructure expansion without degradation:

Horizontal Scalability

Components like Elasticsearch, Logstash, and IDS sensors can be deployed in distributed configurations to handle increased load

Vertical Scalability

Critical components can scale resources (CPU, memory, storage) to meet performance requirements

Elastic Capacity

Cloud-native components support dynamic resource allocation based on workload

Performance Optimization

High-performance tools like Suricata and Prometheus are selected for efficiency
The modular design allows you to scale individual components independently based on specific bottlenecks, rather than scaling the entire stack.

Modularity and Flexibility

Each component is designed to operate independently while integrating seamlessly:
Individual components can be deployed, upgraded, or replaced without affecting the entire system. For example:
  • IDS systems operate independently and feed data to the aggregation layer
  • Elasticsearch can be replaced with alternative storage backends
  • Monitoring tools provide value even without SIEM integration
The architecture supports gradual rollout:
  1. Start with core detection and logging (IDS + Logstash + Elasticsearch)
  2. Add unified security platform (Wazuh)
  3. Implement incident management (TheHive)
  4. Enable orchestration and automation (Cortex, Terraform/PyInfra)
  5. Deploy advanced capabilities (Honeypots, VPN, advanced firewall)
Standard protocols and APIs ensure components can be swapped:
  • Syslog for log transmission
  • REST APIs for orchestration
  • Standard alert formats for incident management

Automation and Orchestration

Manual security operations don’t scale. The architecture emphasizes automation at every layer: Automated Response Capabilities:
  • Event Correlation: Wazuh automatically correlates events to detect complex attack patterns
  • Incident Creation: Security events automatically generate tickets in TheHive
  • Response Playbooks: Cortex executes automated response actions based on incident type
  • Infrastructure Management: Terraform/PyInfra automate deployment and configuration
While automation improves efficiency, critical response actions should include human approval gates to prevent unintended consequences.
Benefits of Automation:

Reduced MTTR

Mean Time To Response decreases dramatically with automated playbooks

Consistency

Automated responses are consistent and repeatable, eliminating human error

24/7 Operations

Automation provides continuous response capability even outside business hours

Analyst Efficiency

Automation handles repetitive tasks, allowing analysts to focus on complex investigations

Technology Selection Rationale

Every technology in the architecture was selected based on specific criteria:

Selection Criteria

1

Open Source Priority

Preference for open-source solutions to avoid vendor lock-in, enable customization, and reduce licensing costs
2

Community Support

Active community and commercial support availability for critical components
3

Scalability

Proven ability to scale to enterprise workloads
4

Integration Capabilities

Standard APIs and protocols for seamless integration
5

Performance

Efficient resource utilization and high throughput

Component Justification

Dual IDS Approach: Using both provides:
  • Snort: Mature rule set, lightweight footprint, proven detection capabilities
  • Suricata: Multi-threading, advanced features like file extraction, modern architecture
Running both ensures maximum detection coverage with different detection engines and rule sets.
Elasticsearch + Logstash provide:
  • Industry-standard log aggregation and storage
  • Powerful search and analytics capabilities
  • Horizontal scalability for petabyte-scale data
  • Rich ecosystem of integrations and plugins
  • Alternative to FluentD offers flexibility in pipeline design
Wazuh was selected as the unified security platform because:
  • Open-source SIEM/XDR with no licensing costs
  • Built-in EDR capabilities for endpoint visibility
  • Extensive compliance frameworks (PCI-DSS, HIPAA, GDPR)
  • Integration with Elastic Stack for storage and visualization
  • Active development and strong community support
  • File integrity monitoring, vulnerability detection, and configuration assessment
Dual Monitoring Strategy:
  • Zabbix: Traditional infrastructure monitoring with agent-based collection, ideal for availability and resource monitoring
  • Prometheus: Modern metrics collection with pull-based architecture, excellent for application metrics and cloud-native environments
Together they provide comprehensive infrastructure visibility with redundancy.
Integrated Incident Response:
  • TheHive: Open-source incident response platform designed for SOC workflows
  • Cortex: Purpose-built for automation and orchestration with TheHive
  • Native integration between the two platforms
  • Extensible through custom analyzers and responders
  • Case management with collaboration features
Infrastructure as Code:
  • Terraform: Industry-standard IaC for provisioning infrastructure across multiple providers
  • PyInfra: Python-based automation for configuration management and deployment
  • Both enable version-controlled, auditable infrastructure changes
  • Automation reduces manual errors and ensures consistency

SOC Design Best Practices

The architecture incorporates industry best practices for Security Operations Centers:

Centralized Logging and Visibility

All security-relevant events flow to a central repository (Elasticsearch) where they can be correlated, searched, and analyzed. This centralized approach enables:
  • Cross-system correlation to detect distributed attacks
  • Long-term forensic analysis
  • Compliance reporting and audit trails
  • Single source of truth for security events

Event Correlation and Context

Wazuh provides correlation rules that combine events from multiple sources to detect complex attack patterns that individual alerts would miss.
Example Correlation Scenarios:
  • Failed authentication attempts from IDS alerts + successful login from log data = potential brute force success
  • Vulnerability scan detected + exploit attempt + unusual process execution = active exploitation
  • Network anomaly + infrastructure performance degradation = potential DoS attack

Incident Lifecycle Management

1

Detection

Multiple detection layers identify potential security events
2

Triage

Events are automatically prioritized based on severity and context
3

Investigation

Analysts use TheHive to track investigation progress and findings
4

Response

Cortex executes automated containment and remediation actions
5

Recovery

Infrastructure automation restores systems to known-good state
6

Lessons Learned

Incident data feeds continuous improvement of detection and response

Metrics and Continuous Improvement

The architecture enables SOC metrics tracking:
  • Mean Time to Detect (MTTD): How quickly threats are identified
  • Mean Time to Respond (MTTR): How quickly incidents are contained
  • False Positive Rate: Accuracy of detection mechanisms
  • Coverage: Percentage of infrastructure with monitoring
  • Alert Volume: Trends in security events over time
Regularly review these metrics to identify opportunities for tuning detection rules, improving automation, and optimizing analyst workflows.

Data Retention and Privacy

Balance security requirements with privacy obligations:
  • Implement data retention policies aligned with compliance requirements
  • Anonymize or pseudonymize sensitive data where possible
  • Secure access to security data with role-based access control
  • Document data handling procedures for audit purposes

Adaptability and Future-Proofing

The architecture is designed to evolve with changing threat landscapes:

Extensibility Points

  • Custom Detection Rules: Wazuh, Snort, and Suricata support custom rule development
  • API Integration: All major components expose REST APIs for integration
  • Plugin Architecture: Logstash, Elasticsearch, and Cortex support custom plugins
  • Scripting: Automation tools support custom scripts and playbooks

Long-Term Enhancements

The architecture roadmap includes:

Deception Technology

Honeypots-Proxmox will provide early warning of attacks and threat intelligence

Advanced Networking

OPNsense firewall adds perimeter defense and microsegmentation capabilities

Secure Access

Tailscale VPN enables secure remote access for SOC analysts and administrators
These long-term components (shown in yellow in the architecture diagram) will be evaluated and implemented based on organizational maturity and specific requirements.

Conclusion

The Enterprise SOC Architecture embodies a comprehensive approach to security operations, balancing:
  • Depth of defense with operational efficiency
  • Comprehensive coverage with manageable complexity
  • Automation with human oversight
  • Open-source flexibility with enterprise reliability
These design principles ensure the architecture can adapt to evolving threats while maintaining operational excellence.

Next Steps

For detailed information about specific components:

Build docs developers (and LLMs) love