ADR-002 - Centralized Logging and Security Monitoring (SOC)
Context
At the current stage, most systems (VPS, services, applications) generate logs locally.
This creates several limitations:
- no centralized visibility across the environment
- limited ability to correlate events
- delayed detection of suspicious activity
- weak audit trail in case of incident
Given the hybrid nature of the lab (Heaven + Hell), this lack of centralization is identified as a major detection and response gap.
Decision
Implement a centralized logging architecture:
- all systems forward logs to a central SOC platform hosted in Hell
- log collection is performed using agents or secure protocols (Syslog/TLS, Wazuh agent)
- the SOC platform becomes the primary location for:
- log aggregation
- correlation
- detection logic
Rationale
-
Detection capability improvement
Centralization enables correlation across multiple systems. -
Separation of duties
The logging system does not depend on compromised hosts. -
Auditability
Provides a consistent and reviewable evidence source. -
Alignment with risk scenarios
Directly addresses risks related to undetected compromise.
Alternatives Considered
1. Keep local logs only
Rejected
Insufficient for detection and incident response.
2. Partial centralization (only critical systems)
Rejected
Creates blind spots and inconsistent visibility.
3. Full centralization to SOC (selected)
Accepted
Provides consistent and scalable monitoring foundation.
Security Impact
Positive
- improved detection capability
- better incident investigation support
- centralized evidence collection
- stronger monitoring coverage
Negative / Trade-offs
- increased infrastructure complexity
- dependency on SOC availability
- need for secure log transport
Implementation Notes
- deploy SOC platform in Hell (Wazuh or equivalent)
- configure log forwarding from:
- VPS (Heaven)
- internal systems (Hell)
- enforce encrypted transport (TLS)
- restrict inbound-only communication to SOC
- define initial detection rules and coverage scope
Evidence & Traceability
Linked to:
- risk scenarios involving delayed or missed detection
- monitoring and validation documentation
- future audit and incident response workflows
Current Maturity
At the current stage, centralized logging is considered in progress.
Established
- identification of logging gaps
- definition of centralized logging target architecture
In Progress
- deployment of SOC platform
- onboarding of systems for log forwarding
- initial detection logic definition
Planned / Next Phase
- correlation rules improvement
- detection coverage review
- integration with incident response workflows