Skip to main content

Current Project Status

Conceptual Design Phase: This project is currently in the conceptual design and planning stage. No implementation has begun. All components, architecture, and workflows are subject to change based on project requirements.

Phase

Conceptual DesignPlanning and architecture definition

Status

Not ImplementedNo deployment or configuration started

Timeline

To Be DeterminedImplementation timeline not yet defined

Development Phases

1

Phase 0: Conceptual Design (Current)

Objective: Define complete SOC architecture and componentsActivities:
  • Architecture design and documentation
  • Technology stack evaluation
  • Data flow planning
  • Integration requirements analysis
  • Resource and infrastructure planning
Status: In ProgressDeliverables:
  • Complete architecture diagram
  • Component specifications
  • Data flow documentation
  • Integration design
2

Phase 1: Core Infrastructure (Planned)

Objective: Deploy foundational monitoring and logging infrastructureComponents:
  • Elasticsearch cluster setup
  • Logstash/Fluentd pipeline configuration
  • Wazuh manager and dashboard deployment
  • Basic Wazuh agent deployment on endpoints
Prerequisites:
  • Infrastructure provisioning (servers, storage, network)
  • Base OS installation and hardening
  • Network segmentation implementation
Estimated Duration: To Be DeterminedSuccess Criteria:
  • Centralized log collection operational
  • Wazuh dashboard accessible
  • Basic security event visibility
3

Phase 2: Detection Layer (Planned)

Objective: Implement network intrusion detection capabilitiesComponents:
  • Suricata IDS/IPS deployment
  • Snort IDS configuration (alternative/complementary)
  • Network tap/mirror configuration
  • Integration with Logstash pipeline
  • Rule tuning and baseline establishment
Dependencies: Phase 1 completionEstimated Duration: To Be DeterminedSuccess Criteria:
  • IDS actively monitoring network traffic
  • Alerts flowing to Wazuh
  • False positive rate < 5%
4

Phase 3: Monitoring & Metrics (Planned)

Objective: Add infrastructure monitoring and performance metricsComponents:
  • Prometheus deployment and configuration
  • Zabbix server and agent setup
  • Integration with Wazuh platform
  • Dashboard creation for unified visibility
  • Alert threshold configuration
Dependencies: Phase 1 completionEstimated Duration: To Be DeterminedSuccess Criteria:
  • All critical infrastructure monitored
  • Availability metrics > 99%
  • Performance baselines established
5

Phase 4: Incident Response (Planned)

Objective: Implement incident management and automated responseComponents:
  • TheHive platform deployment
  • Cortex SOAR setup and analyzer configuration
  • Integration with Wazuh alerting
  • Response playbook development
  • Team training on incident workflow
Dependencies: Phases 1-3 completionEstimated Duration: To Be DeterminedSuccess Criteria:
  • Automated case creation from alerts
  • 3+ response playbooks operational
  • Mean time to response < 15 minutes
6

Phase 5: Automation & IaC (Planned)

Objective: Implement infrastructure as code and automationComponents:
  • Terraform modules for infrastructure
  • PyInfra scripts for configuration management
  • CI/CD pipeline for SOC infrastructure
  • Automated deployment and rollback procedures
Dependencies: Phases 1-4 completionEstimated Duration: To Be DeterminedSuccess Criteria:
  • Complete infrastructure defined as code
  • Automated deployment tested
  • Rollback capability verified

Long-Term Roadmap

The following components are planned for long-term implementation after the core SOC architecture is operational and stable.

Advanced Security Capabilities

Purpose: Deception technology to attract and analyze attackersImplementation Plan:
  • Deploy Proxmox virtualization cluster
  • Create honeypot VM templates (SSH, HTTP, SMB services)
  • Configure network isolation and monitoring
  • Integrate honeypot logs with Wazuh
  • Develop threat intelligence pipeline
Timeline: After Phase 5 completion + 6 monthsRequirements:
  • Dedicated hardware for Proxmox cluster
  • Isolated network segment
  • Automated threat analysis tools
Success Metrics:
  • Capture real attack patterns
  • Generate actionable threat intelligence
  • Zero honeypot compromise of production systems
Purpose: Advanced perimeter security and network segmentationImplementation Plan:
  • Deploy OPNsense on dedicated hardware or VM
  • Configure network zones and VLANs
  • Implement firewall rules and IPS
  • Set up VPN capabilities
  • Integrate with central logging
Timeline: After Phase 4 completion + 3 monthsRequirements:
  • High-availability hardware pair
  • Network reconfiguration for segmentation
  • Failover testing
Success Metrics:
  • Zero unplanned outages
  • Effective network segmentation
  • Centralized firewall rule management
Purpose: Secure remote access to SOC infrastructureImplementation Plan:
  • Deploy Tailscale control plane
  • Configure access control policies
  • Enroll SOC administrators and analysts
  • Integrate with identity provider (SAML/OIDC)
  • Enable audit logging to Wazuh
Timeline: After Phase 3 completion + 2 monthsRequirements:
  • Identity provider integration
  • Multi-factor authentication
  • Endpoint compliance checking
Success Metrics:
  • Secure remote access for all team members
  • Complete audit trail of VPN access
  • Zero unauthorized access incidents

Roadmap Visualization

Key Milestones

MilestonePhaseTargetStatus
Architecture Design Complete0Q1 2026In Progress
Core Logging Operational1To Be DeterminedNot Started
IDS Detection Active2To Be DeterminedNot Started
Monitoring Dashboard Live3To Be DeterminedNot Started
First Automated Response4To Be DeterminedNot Started
Infrastructure as Code5To Be DeterminedNot Started
Honeypot DeploymentLong-termTo Be DeterminedNot Started
VPN Access EnabledLong-termTo Be DeterminedNot Started

Considerations & Constraints

Scalability

  • Design supports gradual growth
  • Modular architecture allows phased implementation
  • Components can scale independently

Flexibility

  • Architecture is adaptable to changing requirements
  • Component substitution possible
  • Open standards and protocols preferred

Resource Requirements

  • Significant hardware and infrastructure needed
  • Dedicated team for implementation and operations
  • Ongoing maintenance and tuning required

Risk Management

  • Pilot testing before production deployment
  • Rollback procedures for all changes
  • High availability for critical components

Next Steps

Immediate Actions:
  1. Finalize architecture documentation
  2. Define detailed requirements for Phase 1
  3. Secure budget and resources
  4. Establish implementation team
  5. Create detailed project timeline
  6. Begin vendor/solution evaluation

Contributing to the Roadmap

This roadmap is a living document and will evolve based on:
  • Organizational security requirements
  • Technology advancements
  • Threat landscape changes
  • Resource availability
  • Lessons learned during implementation
Feedback and suggestions for roadmap improvements are welcome during the planning phase.

Build docs developers (and LLMs) love