Overview
Wazuh is the host-based intrusion detection and security monitoring platform bundled with Xloud Cloud Platform. It provides agentless visibility into what is happening inside each virtual machine — without requiring custom tooling or modifying the guest OS kernel. The Wazuh manager runs as a centralized service; lightweight agents are deployed to each instance and stream security events, file changes, and vulnerability data back for real-time correlation. Xloud ships this platform pre-integrated with XDeploy, so agents can be mass-deployed across projects using the standard automation pipeline.Xloud-Developed — This capability is developed by Xloud and ships with XAVS. The integrated security platform is surfaced in the Xloud Dashboard as the Security Posture Panel, providing a unified view of agent status, threat alerts, and compliance results across the cluster.
Prerequisites
- Wazuh Manager deployed (enabled via XDeploy → Security → HIDS)
- Network reachability from guest VMs to the Wazuh Manager on ports 1514/1515
- Agent registration token available from the Wazuh Manager dashboard
Architecture
| Component | Role |
|---|---|
| Wazuh Agent | Collects logs, file events, process activity, and vulnerability data from each VM |
| Wazuh Manager | Correlates events, applies detection rules, triggers alerts |
| Wazuh Dashboard | OpenSearch-based UI for alert triage, compliance reports, and forensic queries |
| Ruleset | MITRE ATT&CK-mapped detection rules — over 3,000 out of the box |
Capabilities
File Integrity Monitoring
Track every create, modify, and delete on monitored paths. Alert on unauthorized changes to
/etc/passwd, SSH keys, cron files, and application configs.Intrusion Detection
Real-time log analysis against MITRE ATT&CK-mapped rules. Detects brute-force attempts, privilege escalation, rootkits, and lateral movement.
Vulnerability Assessment
Continuous scan of installed packages against CVE databases. Reports vulnerable packages per host with severity scores and remediation guidance.
Compliance Auditing
Built-in checks for PCI-DSS, HIPAA, NIST 800-53, CIS benchmarks, and GDPR. Generates per-host compliance reports with pass/fail details.
Deploy Wazuh Agent
- Linux (Ansible)
- Linux (Manual)
- Windows
Use the bundled Ansible role to deploy agents across all instances in a project:The role installs the agent, registers it with the manager, and starts the
Deploy Wazuh agents via xavs-ansible
wazuh-agent service automatically.Agent appears in the Wazuh Dashboard under Agents within 60 seconds of deployment.
File Integrity Monitoring Configuration
Configure which paths are monitored for changes in/var/ossec/etc/ossec.conf:
/var/ossec/etc/ossec.conf — FIM configuration
| Option | Description |
|---|---|
realtime="yes" | Alert immediately on change (inotify-based), not at next scan cycle |
check_all="yes" | Monitor permissions, ownership, size, MD5, SHA1, SHA256, and mtime |
frequency | Scan interval in seconds for non-realtime paths |
Vulnerability Assessment
Wazuh continuously scans installed packages against NVD and vendor CVE feeds. Results appear in the Dashboard under Vulnerability Detector.Trigger an on-demand vulnerability scan
| Severity | CVSS Score Range | Action |
|---|---|---|
| Critical | 9.0–10.0 | Immediate patching required |
| High | 7.0–8.9 | Patch within 7 days |
| Medium | 4.0–6.9 | Patch within 30 days |
| Low | 0.1–3.9 | Track and remediate at next maintenance window |
Compliance Reports
Wazuh ships with built-in compliance checks. Enable a framework inossec.conf:
Enable PCI-DSS compliance checks
| Framework | File |
|---|---|
| PCI-DSS 3.2.1 | pci_dss_reqs.txt |
| HIPAA | hipaa_reqs.txt |
| NIST 800-53 | nist800_53_reqs.txt |
| GDPR | gdpr_reqs.txt |
| CIS Benchmark | cis_debian_linux_rcl.txt / cis_rhel_linux_rcl.txt |
Alert Integration
Forward Wazuh alerts to external systems:- Slack / Webhook
- Syslog / SIEM
/var/ossec/etc/ossec.conf — webhook integration
Next Steps
Lynis Security Auditing
Run automated OS security audits and generate hardening recommendations
OpenSCAP Compliance Scanning
Scan instances against CIS, STIG, and PCI-DSS profiles using SCAP content
Hardening Guide
Apply pre-deployment OS and platform hardening before enabling agents
Compliance and Auditing
Understand audit logging and compliance frameworks supported by Xloud