Response Operation Collection Kit
ROCK is a collections platform, in the spirit of Network Security Monitoring, designed by members of the Missouri National Guard's Cyber Team. It's primary focus is to provide a robust, scalable sensor platform for both enduring security monitoring and incident response missions. The platform consists of 3 core capabilities:
- Passive data acquisition via AF_PACKET, feeding systems for metadata (Bro), signature detection (Suricata or Snort), and full packet capture (Stenographer).
- A messaging layer (Kafka and Logstash) that provides flexibility in scaling the platform to meet operational needs, as well as providing some degree of data reliability in transit.
- Reliable data storage and indexing (Elasticsearch) to support rapid retrieval and analysis (Kibana) of the data.
- Full Packet Capture via Google Stenographer.
- Protocol Analysis and Metadata via Bro.
- Signature Based Alerting via Suricata or Snort.
- Recursive File Scanning via FSF.
- Message Queuing and Distribution via Apache Kafka.
- Message Transport via Logstash.
- Data Storage, Indexing, and Search via Elasticsearch.
- Data UI and Visualization via Kibana.
- Security - The system is developed and tested to run with SELinux enabled.
This architecture is made possible by the efforts of the Missouri National Guard Cyber Team for donating talent and resources to further development.
The Ansible playbook that drives this build strives not to use any external roles or other dependencies. The reasoning behind this is to make the rock playbook a "one-stop" reference for a manual build. This allows users to use the build process as a guide when doing larger scale production roll outs without having to decipher a labyrinth of dependencies.
Templated config files have comment sections added near key config items with useful info. They don't all have it, but they get added as remembered.