Comprehensive glossary of security terms, acronyms, and technologies used in the Enterprise SOC Architecture
This glossary provides definitions for key security operations, technologies, and concepts used throughout the Enterprise SOC Architecture documentation.
A set of protocols and tools that allows different software applications to communicate with each other. In the SOC context, APIs enable integrations between security tools like TheHive, Cortex, Wazuh, and Elasticsearch.
Alert
A notification generated when a security system detects suspicious activity or a policy violation. Alerts are typically generated by IDS/IPS, SIEM, or monitoring systems and require investigation.
Analyzer
In Cortex, an analyzer is a module that performs automated analysis of observables (IPs, domains, file hashes) using external services like VirusTotal, MISP, or custom threat intelligence feeds.
The process of tracking, managing, and documenting security incidents from detection through resolution. TheHive provides case management capabilities in the SOC architecture.
Correlation
The process of identifying relationships between multiple security events to detect complex attack patterns. SIEM systems like Wazuh perform event correlation to reduce false positives and identify sophisticated threats.
Cortex
A SOAR (Security Orchestration, Automation and Response) platform that works with TheHive to automate security incident analysis and response actions through analyzers and responders.
A visual interface displaying security metrics, alerts, and system status. Wazuh, Prometheus, and Zabbix all provide dashboards for monitoring different aspects of the SOC infrastructure.
Deception Technology
Security systems like honeypots designed to detect attackers by luring them to interact with fake assets. The SOC roadmap includes honeypots as a long-term component.
Security technology that continuously monitors endpoint devices (workstations, servers) to detect and respond to threats. Wazuh provides EDR capabilities through its agent-based architecture.
Elasticsearch
A distributed search and analytics engine used in the SOC architecture for storing, searching, and analyzing large volumes of security events and logs in near real-time.
Event
Any observable occurrence in a system or network, such as a user login, network connection, or file modification. Security events are collected, normalized, and analyzed to detect threats.
EVE JSON (Extensible Event Format)
A JSON-based log format used by Suricata IDS to output alerts and network metadata. EVE JSON makes it easy to integrate Suricata with log processing pipelines like Logstash.
An alert that incorrectly identifies benign activity as malicious. Tuning security rules and correlation logic helps reduce false positive rates in SOC operations.
Firewall
A network security device that monitors and controls incoming and outgoing traffic based on security rules. OPNsense is planned as the perimeter firewall in the long-term roadmap.
Fluentd
An open-source data collector for unified logging layer. Fluentd (alternative to Logstash) aggregates logs from multiple sources and routes them to destinations like Elasticsearch.
A decoy system designed to attract attackers and collect information about attack techniques. The SOC roadmap includes Proxmox-based honeypots for threat intelligence gathering.
The practice of managing infrastructure through code and automation rather than manual processes. Terraform and PyInfra provide IaC capabilities for the SOC infrastructure.
Incident
A security event or series of events that indicates a potential compromise or policy violation requiring investigation and response. TheHive manages incident workflow.
IDS (Intrusion Detection System)
A security system that monitors network traffic or system activity for malicious behavior or policy violations. Snort and Suricata serve as IDS in the architecture.
IPS (Intrusion Prevention System)
An active security system that not only detects but also blocks malicious traffic. Suricata can operate in IPS mode to prevent attacks in real-time.
Indexing
The process of organizing data to enable fast search and retrieval. Elasticsearch indexes security events to allow rapid querying across millions of log entries.
The process of collecting logs from multiple sources into a centralized location for analysis. Logstash and Fluentd handle log aggregation in the SOC pipeline.
Logstash
A server-side data processing pipeline that ingests, transforms, and forwards log data. Logstash normalizes data from various sources before sending to Elasticsearch.
In Cortex, a responder is a module that executes automated response actions such as blocking IPs, isolating endpoints, or sending notifications.
Retention
The duration that log data is stored before deletion or archival. Elasticsearch retention policies balance storage costs with forensic investigation needs.
A platform that provides real-time analysis of security alerts generated by network hardware and applications. Wazuh serves as the SIEM in the architecture.
SOAR (Security Orchestration, Automation and Response)
Technology that enables organizations to collect security data and automate responses to security incidents. Cortex provides SOAR capabilities.
SOC (Security Operations Center)
A centralized team and facility that monitors, detects, analyzes, and responds to cybersecurity incidents using a combination of technology and processes.
Snort
A widely-used open-source intrusion detection system that uses rule-based detection to identify malicious network traffic patterns.
Suricata
A high-performance, multi-threaded IDS/IPS engine capable of protocol identification, file extraction, and advanced threat detection.
Syslog
A standard protocol for sending log messages across IP networks. Many SOC components use syslog for log transmission.
A unified XDR and SIEM platform that provides threat detection, integrity monitoring, incident response, and compliance capabilities. Central component of the SOC architecture.
Webhook
An HTTP callback that allows systems to send real-time data to other applications. Used for integrations between Wazuh, TheHive, and Prometheus.
A security approach that unifies threat detection and response across multiple security layers (network, endpoint, cloud). Wazuh provides XDR capabilities.
An enterprise-class open-source monitoring solution for networks, servers, and applications, providing availability and performance metrics.
Zero-Day
A previously unknown vulnerability or attack that exploits a security flaw before the vendor has released a patch. SOC detection capabilities help identify zero-day attacks through behavioral analysis.