We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
As part of Secure Dev, we need to define an access auditing policy, and implement tools/processes to provide this service.
This issue is set up to track work relating to this piece..
Tasks ------------------
Investigate monitoring strategies & applicable tools : Identify tooling for auditing access controls to infrastructure #2968 - Done
Detail Next Steps For Preferred Tool : Create Detailed Analaysis & Plan For Implementing Wazuh #3076 - Done
Deploy Wazuh To All Build Hosts : Done: 08/11/2023 : Deploy Wazuh To All Build Infrastructure Hosts #3235
Create Wazuh Code & Configuration Snippets Area in Infrastructure Repository.: Wazuh: Initial commit of Wazuh code sharing repository. #3262 Complete
Create mechanism for tracing ssh logins: Issue 3212 : - Complete
Update Wazuh to current version, and define upgrade process and policy for both Wazuh server and agents. - 10/07/2024 - Completed: Upgrade Wazuh Server & Agents To Version 4.8.0 #3654
Create DNS Name For Wazuh Server - EF issue raised : https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/issues/5076 ( 04/10/2024 ) - Completed - 07/10/2024
Add certificates & configure https - Wazuh: Configure HTTPS Certificates And DNS #3768
Define critical alerts & create filters.
Create & Configure Slack Integration For Critical Alerts
Deploy Wazuh To All Test Hosts
Investigate how to build Wazuh agent from source on RHEL8 / s390x
Investigate how to build Wazuh agent from source on RISCV build machines
Investigate Auditing SSH/SSHD versions using Wazuh
The text was updated successfully, but these errors were encountered:
For monitoring valid logins on the UNIX platforms we should be able to look at the SSH key fingerprints as per #3212
Sorry, something went wrong.
steelhead31
No branches or pull requests
As part of Secure Dev, we need to define an access auditing policy, and implement tools/processes to provide this service.
This issue is set up to track work relating to this piece..
Tasks
------------------
Investigate monitoring strategies & applicable tools : Identify tooling for auditing access controls to infrastructure #2968 - Done
Detail Next Steps For Preferred Tool : Create Detailed Analaysis & Plan For Implementing Wazuh #3076 - Done
Deploy Wazuh To All Build Hosts : Done: 08/11/2023 : Deploy Wazuh To All Build Infrastructure Hosts #3235
Create Wazuh Code & Configuration Snippets Area in Infrastructure Repository.: Wazuh: Initial commit of Wazuh code sharing repository. #3262 Complete
Create mechanism for tracing ssh logins: Issue 3212 : - Complete
Update Wazuh to current version, and define upgrade process and policy for both Wazuh server and agents. - 10/07/2024 - Completed: Upgrade Wazuh Server & Agents To Version 4.8.0 #3654
Create DNS Name For Wazuh Server - EF issue raised : https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/issues/5076 ( 04/10/2024 ) - Completed - 07/10/2024
Add certificates & configure https - Wazuh: Configure HTTPS Certificates And DNS #3768
Define critical alerts & create filters.
Create & Configure Slack Integration For Critical Alerts
Deploy Wazuh To All Test Hosts
Investigate how to build Wazuh agent from source on RHEL8 / s390x
Investigate how to build Wazuh agent from source on RISCV build machines
Investigate Auditing SSH/SSHD versions using Wazuh
The text was updated successfully, but these errors were encountered: