simpliSOC is a production-ready, open-source SOC stack built on Wazuh, IRIS, and Shuffle. Real-time threat detection, automated incident management, and a custom integrator that ties it all together — deployed in one stack.
simpliSOC orchestrates four battle-tested platforms into a single cohesive security pipeline, with a custom integrator as the connective tissue.
The detection engine. Ingests syslog from firewalls, endpoints, VMware, and Windows AD. Applies 50+ custom rules across 9 appendix categories with correlation chaining.
The brain of the pipeline. A FastAPI service with 5 background workers that continuously syncs Wazuh alerts to IRIS, enforces dedup policies, refreshes IOC feeds, and monitors log health.
Incident response platform where analysts triage, investigate, and close security cases. Alerts from Wazuh land here automatically, enriched with context and severity classification.
Security orchestration, automation, and response. Trigger playbooks from IRIS cases or Wazuh alerts — enrich with VirusTotal, notify via LINE/email, or auto-block IPs.
A fully automated pipeline from log ingestion through detection, enrichment, and incident management — with a human analyst in the loop where it counts.
Syslog over UDP from FortiGate firewalls, VMware ESXi hosts, Windows agents with Sysmon, and Windows AD domain controllers.
Wazuh decodes, correlates, and matches events against 50+ custom rules and live IOC CDB lists updated every cycle from threat feeds.
SOC Integrator polls Wazuh indexer, deduplicates, applies exceptions, maps severity, and creates enriched alerts in IRIS — idempotently.
Analysts triage cases in IRIS. Shuffle playbooks automate enrichment, notifications, and optional containment actions via API.
How services, threat feeds, and notification channels connect — what talks to what, and over which protocol.
Rules organized across three appendix groups covering perimeter, infrastructure, endpoint, and correlation scenarios.
CDB list matches on malicious IPs, domains, and file hashes sourced from Feodo Tracker, URLhaus, and ThreatFox — auto-refreshed.
RDP brute-force, port scanning, DoS detection, IPS alerts, and policy violations on FortiGate firewall logs.
IPsec and SSL-VPN tunnel monitoring — failed negotiations, certificate errors, and abnormal session patterns.
Failed logins on privileged accounts, password spraying, account lockouts, and suspicious Kerberos/NTLM activity.
SSH enable detection, failed host logins, hypervisor warnings, and management plane anomalies from ESXi syslog.
Log-loss alerting when no events arrive within threshold, plus Sysmon endpoint telemetry: process creation, network connects, registry changes.
Cross-source correlation spanning firewall, VPN, endpoint, and identity — catching lateral movement, credential stuffing, and multi-vector attacks that individual rules miss.
Per-rule cooldowns suppress repeated alerts from the same host/user tuple. No alert storms — analysts see signal, not noise.
Feodo Tracker, URLhaus, and ThreatFox feeds refresh automatically. Wazuh CDB lists are updated without restarts — new IOCs take effect immediately.
Suppress IRIS ticket creation for known-legitimate activity via REST API — no rule changes, no restarts. Exceptions are stored in DB and applied on the next sync.
Wazuh rule levels map to IRIS severity buckets: critical ≥12, high ≥8, medium ≥5. Configurable minimum threshold keeps low-noise events out of IRIS.
Automatic alerting when no log events arrive within a configured window — catch silent failures, disconnected agents, or network outages before they become blind spots.
Full REST API with Swagger UI on every integrator endpoint. Manual syncs, exception management, IOC refresh, and health checks — all scriptable without a restart.
simpliSOC is assembled entirely from open-source components — Wazuh, IRIS-web, and Shuffle are all free, community-backed, and production-proven. The custom integrator is the only proprietary layer, and it's yours.
The engineering decisions, field reports, and lessons behind simpliSOC — published on Simplico's blog.
A commit-by-commit account of building a production SOC using Wazuh 4.x, IRIS-web, and a custom FastAPI integrator — the bugs no one puts in architecture diagrams.
Behind-the-scenes look at building a production SOC for a mid-sized enterprise — what worked, what broke, and the engineering decisions that actually mattered.
Where do fields come from — the rule, the decoder, or the log? A clear guide to how Wazuh decoding and rule matching actually work, with no guesswork.
Why "AI for SOC" mostly doesn't work — and what does. Production failure modes, cost economics, and what LLM agents actually accomplish in real SOC workflows.
Talk to us about deploying simpliSOC in your environment — on-premise, private cloud, or hybrid. We'll assess your log sources and threat coverage needs.