Overview
Compliance monitoring ensures your infrastructure meets regulatory and industry security requirements. Wazuh Dashboard provides comprehensive compliance tracking, reporting, and evidence collection for multiple frameworks.Supported Compliance Frameworks
Wazuh Dashboard monitors compliance with:PCI DSS
GDPR
HIPAA
NIST 800-53
TSC
GDPR
Understanding Compliance Dashboards
Common Dashboard Elements
All compliance modules share similar structures:Requirements Overview
Requirements Overview
- Total requirements monitored
- Compliance percentage/score
- Requirements by status (passed, failed, not applicable)
- Trend over time
- Critical violations
Requirements Breakdown
Requirements Breakdown
- Requirement ID and description
- Control objectives
- Current compliance status
- Number of events per requirement
- Affected agents
- Related security events
Top Agents by Violations
Top Agents by Violations
- Agent names and IDs
- Violation counts
- Most common requirement failures
- Trend analysis
Compliance Events Table
Compliance Events Table
- Event timestamp and description
- Mapped requirements
- Severity and risk level
- Affected resources
- Remediation guidance
PCI DSS Compliance
Overview
PCI DSS applies to any organization that stores, processes, or transmits cardholder data. The standard includes 12 requirements across 6 control objectives.Accessing PCI DSS Dashboard
- Navigate to PCI DSS in the main menu
- Select time range for compliance review
- Optionally filter by specific agent or agent group
Key PCI DSS Requirements Monitored
Requirement 1: Firewall Configuration
- Firewall rule changes
- Network configuration modifications
- Unauthorized network access attempts
Requirement 2: Default Passwords
- Default account usage detection
- Weak password configurations
- Insecure default settings
- Default admin accounts still enabled
- Unchanged default passwords
- Default SNMP community strings
Requirement 8: User Identification
- Failed authentication attempts
- Account creation and deletion
- Privileged account usage
- Multi-factor authentication status
Requirement 10: Access Logging
- All user access to cardholder data environment
- Administrative actions
- Access to audit logs
- Failed access attempts
- Audit log deletion or modification
- Logging service failures
- Unauthorized access to log files
PCI DSS Compliance Workflow
Daily Monitoring
- Check for new violations
- Review failed requirements
- Identify affected systems
- Prioritize remediation
Investigate Violations
- Click the requirement to see details
- Review related security events
- Identify root cause
- Document findings
Remediate Issues
- Apply security configurations
- Patch vulnerabilities
- Update access controls
- Enhance monitoring rules
Generating PCI DSS Reports
- Set appropriate time range (typically quarterly or annually)
- Export compliance data:
- Requirements summary
- Violation details
- Trend analysis
- Remediation evidence
- Include in compliance documentation
GDPR Compliance
Overview
GDPR focuses on data protection and privacy for EU citizens. Key principles include lawfulness, fairness, transparency, and data subject rights.GDPR Requirements in Wazuh
Wazuh maps security events to GDPR articles:Article 32: Security of Processing
Article 32: Security of Processing
- Encryption status and changes
- Access control violations
- Data breach indicators
- System security configurations
Article 30: Records of Processing
Article 30: Records of Processing
- Data access logging
- Processing activity tracking
- Audit trail completeness
- Log retention compliance
Article 33: Breach Notification
Article 33: Breach Notification
- Unauthorized data access
- Data exfiltration attempts
- System compromises
- Privilege escalations
Article 35: Data Protection Impact Assessment
Article 35: Data Protection Impact Assessment
- High-risk system changes
- New data processing activities
- Security control modifications
- Privacy control effectiveness
GDPR Breach Detection
Set up alerts for potential GDPR breaches:- Unauthorized access to personal data
- Data exfiltration attempts
- Encryption failures
- Access control bypasses
HIPAA Compliance
Overview
HIPAA protects Protected Health Information (PHI) in healthcare environments.HIPAA Security Rule Monitoring
Administrative Safeguards
- Security management processes
- Assigned security responsibility
- Workforce security and training
- Access authorization and establishment
- Administrative account usage
- Policy violations
- Training compliance tracking
Physical Safeguards
- Facility access controls
- Workstation security
- Device and media controls
- Physical access logs
- Unauthorized device connections
- Media handling violations
PHI Access Monitoring
Critical for HIPAA compliance:-
Track all PHI access:
- User identification
- Timestamp
- Data accessed
- Action performed (view, modify, delete)
-
Monitor for violations:
- Unauthorized access attempts
- Access outside normal patterns
- Bulk data access
- After-hours access
-
Audit regularly:
- Review access logs monthly
- Investigate anomalies
- Document findings
- Report violations
NIST 800-53 Compliance
Overview
NIST 800-53 provides comprehensive security and privacy controls for federal systems and organizations.Control Families
Wazuh maps events to NIST control families:AC - Access Control
AU - Audit and Accountability
CM - Configuration Management
IA - Identification and Authentication
SI - System and Information Integrity
SC - System and Communications Protection
NIST Compliance Dashboard
Navigate to NIST 800-53 to view:- Control Coverage: Which controls are monitored
- Compliance Status: Current compliance levels per control
- Top Violations: Most frequently failed controls
- Control Effectiveness: Trend analysis over time
Example: Implementing AC-2 (Account Management)
AC-2: Account Management Requirements
AC-2: Account Management Requirements
-
Monitor account creation:
-
Track account modifications:
- Password changes
- Group membership changes
- Permission modifications
-
Detect account misuse:
- Disabled accounts being used
- Shared account access
- Privileged account abuse
-
Review regularly:
- Weekly account status review
- Quarterly access recertification
- Annual compliance assessment
TSC (Trust Services Criteria)
Overview
TSC framework covers five principles:- Security: Protection against unauthorized access
- Availability: System availability for operation and use
- Processing Integrity: Complete, valid, accurate, timely processing
- Confidentiality: Protection of confidential information
- Privacy: Collection, use, retention, disclosure, and disposal of personal information
TSC Monitoring in Wazuh
Security (CC6)
Security (CC6)
- Authentication events
- Authorization violations
- Network access controls
- System access logging
- Failed login attempts
- Unauthorized access attempts
- Privilege escalations
Availability (A1)
Availability (A1)
- Service availability
- System resource usage
- Backup completion status
- Disaster recovery capabilities
Confidentiality (C1)
Confidentiality (C1)
- Data access controls
- Encryption status
- Data transmission security
- Confidential data handling
Security Configuration Assessment (SCA)
Overview
SCA provides automated configuration compliance scanning based on security benchmarks.Accessing SCA
- Navigate to Security Configuration Assessment
- Select an agent or view all agents
- Choose a security policy
SCA Policy Structure
Policy Selection
- CIS Benchmarks: Industry-standard security configurations
- Operating Systems: Linux, Windows, macOS
- Applications: Web servers, databases, containers
- Compliance: PCI DSS, HIPAA, NIST configurations
Check Results
- Passed: Configuration meets requirement
- Failed: Configuration does not meet requirement
- Not Applicable: Check doesn’t apply to this system
Check Details
- Requirement description
- Rationale
- Remediation steps
- Compliance mappings
- Current configuration
SCA Best Practices
Baseline Configuration
Baseline Configuration
- Run SCA scans on reference systems
- Document intentional deviations
- Mark expected failures as exceptions
- Use baselines for new deployments
Regular Scanning
Regular Scanning
- Daily: Production systems and critical infrastructure
- Weekly: Development and test environments
- On-demand: After configuration changes
Prioritize Remediation
Prioritize Remediation
- Critical security controls first
- Systems with most failures
- Compliance-required configurations
- Recently introduced failures
Track Improvement
Track Improvement
- Set target compliance percentages
- Track score trends
- Report on improvement
- Identify regression
Compliance Reporting
Report Types
Executive Summary
Detailed Findings
Trend Analysis
Audit Evidence
Creating Compliance Reports
Define Scope
- Compliance framework
- Time period (month, quarter, year)
- Systems included
- Requirements covered
Gather Data
- Set time range
- Apply agent filters if needed
- Export requirement status
- Export violation details
- Capture screenshots of key visualizations
Analyze Results
- Overall compliance percentage
- Top violations
- Most affected systems
- Trend compared to previous period
- Critical issues requiring attention
Document Remediation
- Description and impact
- Root cause analysis
- Corrective actions taken
- Preventive measures implemented
- Evidence of resolution
Audit Preparation
Pre-Audit Checklist
Verify Coverage
- All agents active and reporting
- Compliance modules enabled
- Index patterns configured
- Data retention meets requirements
Review Compliance Status
- Review compliance dashboards
- Address critical violations
- Document exceptions
- Update remediation status
Prepare Evidence
- Compliance reports
- SCA scan results
- Violation remediation records
- Change management documentation
- Incident response records
Common Auditor Requests
Demonstrate Access Logging
Demonstrate Access Logging
Show Failed Access Attempts
Show Failed Access Attempts
Prove Configuration Management
Prove Configuration Management
- Monitored files and directories
- Change detection
- Change approval process
- Rollback capabilities
Vulnerability Management Process
Vulnerability Management Process
- Navigate to Vulnerability Detection
- Show scan frequency and coverage
- Demonstrate risk prioritization
- Show remediation tracking
- Prove patching timelines
Continuous Compliance
Maintaining Compliance
Daily Reviews
- Check compliance dashboards
- Review new violations
- Verify agent status
- Monitor critical systems
Weekly Analysis
- Review compliance trends
- Update remediation tracking
- Test key controls
- Update documentation
Monthly Reporting
- Generate compliance reports
- Executive briefings
- Exception reviews
- Policy updates
Quarterly Assessments
- Comprehensive compliance review
- Gap analysis
- Control effectiveness testing
- Audit preparation
Automation Opportunities
- Automated Remediation: Fix common misconfigurations automatically
- Alert Integration: Send compliance violations to ticketing systems
- Scheduled Reports: Generate and distribute reports automatically
- Dashboard Monitoring: Alert on compliance score degradation
Tips and Best Practices
Understand Your Requirements
Understand Your Requirements
- PCI DSS: Focus on cardholder data protection
- HIPAA: Emphasize PHI access controls and encryption
- GDPR: Prioritize data subject rights and breach detection
- NIST: Comprehensive controls across all security domains
Map Controls to Multiple Frameworks
Map Controls to Multiple Frameworks
- Access logging (PCI DSS 10, HIPAA 164.312.b, GDPR Article 30)
- Encryption (PCI DSS 3, HIPAA 164.312.a, GDPR Article 32)
- Vulnerability management (PCI DSS 6, NIST SI-2)
Document Everything
Document Everything
- Compliance policies and procedures
- Control implementation details
- Exception approvals and justifications
- Remediation activities and timelines
- Testing and validation results
Regular Testing
Regular Testing
- Conduct internal compliance reviews
- Test controls regularly
- Perform gap assessments
- Update configurations proactively
Stakeholder Communication
Stakeholder Communication
- Regular compliance status updates
- Immediate notification of critical violations
- Trend reporting and analysis
- Audit readiness status
Next Steps
- Review Threat Analysis for security event investigation
- Check Agent Deployment to expand monitoring coverage
- See Getting Started for dashboard navigation basics