I agree with you, but unfortunately, I'm required to have some sort of HIDS 
running. Commercial solutions won't work because of $$. 
Moving away from Tripwire has saved my sanity as i used to spend half my 
week dealing with it when i first started this job. OSSEC is so much 
better, even if it was designed in 2002. 
Are you going to go the ELK stack route? Wazuh has some nice pre-built 
dashboards you could use. 



On Friday, June 17, 2016 at 3:01:28 AM UTC-7, Tahir Hafiz wrote:
>
> My feeling is that the nature of creating, managing and maintaining 
> systems has changed recently - part of it is this concept or idea of DevOps 
> tools (the Cloud, configuration management like Chef, Puppet, Salt, 
> Continuous Integration tools like Jenkins or Travis)
> Bear in mind that OSSEC was created in 2002 when each server was 
> individually configured (if you were lucky there would have been some 
> custom bash scripts to set-up a server, they would run once and wouldn’t be 
> repeatedly run). 
> Limited stuff. But now with configuration management tools like Salt, 
> Chef, Puppet, Salt you run recipes or whatever on thousands of servers (the 
> scale of the server estate has increased exponentially because it is so 
> easy to spin up thousands of systems in the Cloud) - OSSEC was simply not 
> designed for that kind of environment.
>
> We are looking into pushing the alerts into a log analysis tool so it can 
> try and figure out when something bad has happened. 
>
> There also seems to be more modern, unfortunately commercial, tools 
> designed for the modern cloud based DevOps type environment:
>
> https://www.threatstack.com/
>
> https://evident.io/about/
>
>
>
>
>
>
>
>
> On Thursday, 16 June 2016 22:40:34 UTC+1, Audrey Gallimore wrote:
>>
>> I'm wondering the same. I'm testing OSSEC as a Tripwire replacement, but 
>> its little things like adjusting a config with Chef and 40 alerts come in. 
>> I suppose I can whitelist in local_rules for some things like our Sensu 
>> config, but there are lots of changes via Chef that will happen across the 
>> board that can result in a lot of email. 
>>
>>
>>
>> On Wednesday, June 15, 2016 at 3:19:19 AM UTC-7, Tahir Hafiz wrote:
>>>
>>> We are tuning our OSSEC server/agent environment. 
>>> We have multiple environments and use Puppet for configuration 
>>> management and AWS for our cloud based systems. 
>>>
>>> We baseline (run OSSEC) at the start of an environment build, and then 
>>> do a Puppet apply. 
>>> We seem to have thousands of alerts coming in (many to do with syscheck 
>>> on subsequent Puppet applys). 
>>>
>>> How do you guys deal with so many alerts - do you try and whitelist all 
>>> of them in the local_rules.xml file or just let them all go in to the 
>>> alerts file?
>>> How do you know if an intruder has compromised a system if you 
>>> constantly have login sessions opened and closed by system users and have 
>>> level 7 syscheck alerts by Puppet applys happening as part of the normal 
>>> running of your environment?
>>> How do you have warning systems based on alerts set-up (e.g. a script 
>>> that triggers to Nagios ? or something else?).
>>>
>>> Cheers
>>>
>>>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to