Simplico simpliSOC
Features Stack Coverage How it works Articles All posts ↗
Language
Get in touch
Open-Source SOC Platform

Security operations,
simplified and unified

simpliSOC is a production-ready, open-source SOC stack built on Wazuh, IRIS, and Shuffle. Real-time threat detection, automated incident management, and a custom integrator that ties it all together — deployed in one stack.

50+
Detection rules
9
Threat categories
3
IOC threat feeds
100%
Open-source stack
Live pipeline
Log sources
FortiGate · ESXi · Sysmon · Windows AD
live
Wazuh SIEM
Decode · Correlate · Alert
detect
SOC Integrator
Sync · Dedup · Enrich
route
IRIS + Shuffle
Case · Response · Automate
resolve
Open-source stack

Built on proven open-source tools

simpliSOC orchestrates four battle-tested platforms into a single cohesive security pipeline, with a custom integrator as the connective tissue.

Wazuh

SIEM · XDR

The detection engine. Ingests syslog from firewalls, endpoints, VMware, and Windows AD. Applies 50+ custom rules across 9 appendix categories with correlation chaining.

  • Real-time log correlation & alerting
  • IOC / CDB list matching (IP, domain, hash)
  • Custom decoders for FortiGate & VMware ESXi
  • OpenSearch indexing with dashboard

SOC Integrator

Custom · FastAPI

The brain of the pipeline. A FastAPI service with 5 background workers that continuously syncs Wazuh alerts to IRIS, enforces dedup policies, refreshes IOC feeds, and monitors log health.

  • Alert deduplication with per-rule cooldowns
  • Severity mapping & rule-based filtering
  • IOC feed refresh (Feodo, URLhaus, ThreatFox)
  • Log-loss & system health monitoring

IRIS

IRP · Case Mgmt

Incident response platform where analysts triage, investigate, and close security cases. Alerts from Wazuh land here automatically, enriched with context and severity classification.

  • Structured case & alert management
  • IOC/asset tracking within cases
  • Custom alert detail page with ICT time display
  • REST API for automated case lifecycle
Optional

Shuffle

SOAR

Security orchestration, automation, and response. Trigger playbooks from IRIS cases or Wazuh alerts — enrich with VirusTotal, notify via LINE/email, or auto-block IPs.

  • Visual no-code workflow builder
  • VirusTotal & threat intel enrichment
  • Webhook triggers from Wazuh & IRIS
  • Notification via LINE, Slack, PagerDuty
Architecture

From raw log to resolved case

A fully automated pipeline from log ingestion through detection, enrichment, and incident management — with a human analyst in the loop where it counts.

01

Ingest

Syslog over UDP from FortiGate firewalls, VMware ESXi hosts, Windows agents with Sysmon, and Windows AD domain controllers.

FortiGate ESXi Sysmon Win AD
02

Detect

Wazuh decodes, correlates, and matches events against 50+ custom rules and live IOC CDB lists updated every cycle from threat feeds.

Wazuh rules IOC CDB Correlation
03

Route

SOC Integrator polls Wazuh indexer, deduplicates, applies exceptions, maps severity, and creates enriched alerts in IRIS — idempotently.

Dedup Enrichment Exceptions
04

Respond

Analysts triage cases in IRIS. Shuffle playbooks automate enrichment, notifications, and optional containment actions via API.

IRIS cases Playbooks Notifications
System architecture

Component flow in detail

How services, threat feeds, and notification channels connect — what talks to what, and over which protocol.

flowchart LR classDef src fill:#0b1220,stroke:#334155,color:#e2e8f0 classDef feed fill:#0b1220,stroke:#334155,color:#e2e8f0 classDef siem fill:#082f49,stroke:#38bdf8,color:#e0f2fe classDef integ fill:#3a1f0a,stroke:#f97316,color:#fed7aa classDef resp fill:#083344,stroke:#22d3ee,color:#cffafe classDef notif fill:#052e16,stroke:#22c55e,color:#dcfce7 subgraph S["Log sources"] direction TB FG[FortiGate]:::src ESXi[VMware ESXi]:::src WIN[Windows + Sysmon]:::src AD[Windows AD]:::src end subgraph F["Threat feeds"] direction TB F1[Feodo Tracker]:::feed F2[URLhaus]:::feed F3[ThreatFox]:::feed end WZ["Wazuh Manager
decoders · 50+ rules"]:::siem OS[("OpenSearch indexer")]:::siem subgraph I["SOC Integrator (FastAPI)"] direction TB SYNC["Wazuh→IRIS sync
dedup · severity"]:::integ IOC["IOC refresh
writes CDB lists"]:::integ HM["Log-loss + health"]:::integ end IR["IRIS-web
case management"]:::resp SH["Shuffle SOAR
(optional)"]:::resp subgraph N["Notifications"] direction TB LINE[LINE]:::notif SLK[Slack]:::notif PD[PagerDuty]:::notif EM[Email]:::notif end S -->|syslog UDP| WZ F -->|HTTPS pull| IOC IOC -->|CDB reload| WZ WZ -->|alerts| OS OS -->|REST poll| SYNC SYNC -->|create alert| IR IR -->|webhook| SH SH --> LINE SH --> SLK SH --> PD SH --> EM IR -->|on case| PD
Detection rules

Coverage across your full estate

Rules organized across three appendix groups covering perimeter, infrastructure, endpoint, and correlation scenarios.

A1

IOC / Threat Intel

CDB list matches on malicious IPs, domains, and file hashes sourced from Feodo Tracker, URLhaus, and ThreatFox — auto-refreshed.

A2

FortiGate Firewall & IPS

RDP brute-force, port scanning, DoS detection, IPS alerts, and policy violations on FortiGate firewall logs.

A3

FortiGate VPN

IPsec and SSL-VPN tunnel monitoring — failed negotiations, certificate errors, and abnormal session patterns.

A4

Windows AD & Auth

Failed logins on privileged accounts, password spraying, account lockouts, and suspicious Kerberos/NTLM activity.

B1

VMware ESXi

SSH enable detection, failed host logins, hypervisor warnings, and management plane anomalies from ESXi syslog.

B2

Log Monitor & Sysmon

Log-loss alerting when no events arrive within threshold, plus Sysmon endpoint telemetry: process creation, network connects, registry changes.

C

Correlation Rules (C1–C3)

Multi-stage detection

Cross-source correlation spanning firewall, VPN, endpoint, and identity — catching lateral movement, credential stuffing, and multi-vector attacks that individual rules miss.

Capabilities

What makes simpliSOC production-ready

Smart deduplication

Per-rule cooldowns suppress repeated alerts from the same host/user tuple. No alert storms — analysts see signal, not noise.

Live IOC feeds

Feodo Tracker, URLhaus, and ThreatFox feeds refresh automatically. Wazuh CDB lists are updated without restarts — new IOCs take effect immediately.

Alert exceptions

Suppress IRIS ticket creation for known-legitimate activity via REST API — no rule changes, no restarts. Exceptions are stored in DB and applied on the next sync.

Severity triage

Wazuh rule levels map to IRIS severity buckets: critical ≥12, high ≥8, medium ≥5. Configurable minimum threshold keeps low-noise events out of IRIS.

Log-loss monitoring

Automatic alerting when no log events arrive within a configured window — catch silent failures, disconnected agents, or network outages before they become blind spots.

API-first design

Full REST API with Swagger UI on every integrator endpoint. Manual syncs, exception management, IOC refresh, and health checks — all scriptable without a restart.

Open source

No vendor lock-in.
No per-alert pricing.

simpliSOC is assembled entirely from open-source components — Wazuh, IRIS-web, and Shuffle are all free, community-backed, and production-proven. The custom integrator is the only proprietary layer, and it's yours.

  • Deploy on-premise or private cloud — your data never leaves your infrastructure
  • Docker Compose deployment — full stack up in minutes with a single script
  • Extend detection rules in XML — no proprietary query language to learn
  • Integrate with existing tooling via REST — PagerDuty, Slack, LINE, email
Technology stack
Wazuh 4.x
SIEM / XDR
IRIS-web
Incident Response
Shuffle
SOAR
FastAPI
SOC Integrator
OpenSearch
Log indexing
Docker Compose
Deployment
Get in touch

Ready to secure your operations?

Talk to us about deploying simpliSOC in your environment — on-premise, private cloud, or hybrid. We'll assess your log sources and threat coverage needs.

LINE
ID: iiitum1984
Call / WhatsApp
(+66) 83001 0222