Skip to content

Hubble is a modular, open-source security compliance framework. The project provides on-demand profile-based auditing, real-time security event notifications, automated remediation, alerting and reporting.

License

akzaks/hubble-1

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hubble

An alternate version of Hubblestack which can be run without an existing SaltStack infrastructure.

Packaging / Installing

Installing using setup.py

sudo yum install git -y
git clone https://github.com/hubblestack/hubble
cd hubble
sudo python setup.py install

Installs a hubble "binary" into /usr/bin/.

Building standalone packages (CentOS)

sudo yum install git -y
git clone https://github.com/hubblestack/hubble
cd hubble/pkg
./build_rpms.sh  # note the lack of sudo, that is important

Packages will be in the hubble/pkg/dist/ directory. The only difference between the packages is the inclusion of /etc/init.d/hubble for el6 and the inclusion of a systemd unit file for el7. There's no guarantee of glibc compatibility.

Building standalone packages (Debian)

sudo yum install git -y
git clone https://github.com/hubblestack/hubble
cd hubble/pkg
./build_debs.sh  # note the lack of sudo, that is important

Package will be in the hubble/pkg/dist/ directory. There's no guarantee of glibc compatibility.

Usage

A config template has been placed in /etc/hubble/hubble. Modify it to your specifications and needs.

You can do hubble -h to see the available options.

The first two commands you should run to make sure things are set up correctly are hubble --version and hubble test.ping. If those run without issue you're probably in business!

Single invocation

Hubble supports one-off invocations of specific functions:

[root@host1 hubble-v2]# hubble hubble.audit cis.centos-7-level-1-scored-v2-1-0 tags=CIS-3.\*
{'Compliance': '45%',
 'Failure': [{'CIS-3.4.2': 'Ensure /etc/hosts.allow is configured'},
             {'CIS-3.4.3': 'Ensure /etc/hosts.deny is configured'},
             {'CIS-3.6.2': 'Ensure default deny firewall policy'},
             {'CIS-3.6.3': 'Ensure loopback traffic is configured'},
             {'CIS-3.6.1_running': 'Ensure iptables is installed'},
             {'CIS-3.2.4': 'Ensure suspicious packets are logged'},
             {'CIS-3.2.2': 'Ensure ICMP redirects are not accepted'},
             {'CIS-3.2.3': 'Ensure secure ICMP redirects are not accepted'},
             {'CIS-3.1.2': 'Ensure packet redirect sending is disabled'},
             {'CIS-3.3.1': 'Ensure IPv6 router advertisements are not accepted'},
             {'CIS-3.3.2': 'Ensure IPv6 redirects are not accepted'}],
 'Success': [{'CIS-3.6.1_installed': 'Ensure iptables is installed'},
             {'CIS-3.4.1': 'Ensure TCP Wrappers is installed'},
             {'CIS-3.4.5': 'Ensure permissions on /etc/hosts.deny are 644'},
             {'CIS-3.4.4': 'Ensure permissions on /etc/hosts.allow are configured'},
             {'CIS-3.2.5': 'Ensure broadcast ICMP requests are ignored'},
             {'CIS-3.2.6': None},
             {'CIS-3.2.1': 'Ensure source routed packets are not accepted'},
             {'CIS-3.1.1': 'Ensure IP forwarding is disabled'},
             {'CIS-3.2.8': 'Ensure TCP SYN Cookies is enabled'}]}

Scheduler

Hubble supports scheduled jobs. See the docstring for schedule for more information, but it follows the basic structure of salt scheduled jobs. The schedule config should be placed in /etc/hubble/hubble along with any other hubble config:

schedule:
  job1:
    function: hubble.audit
    seconds: 60
    splay: 30
    args:
      - cis.centos-7-level-1-scored-v2-1-0
    kwargs:
      verbose: True
      show_profile: True
    returner: splunk_nova_return
    run_on_start: True

Note that you need to have your hubblestack splunk returner configured in order to use the above block:

hubblestack:
  returner:
    splunk:
      - token: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
        indexer: splunk-indexer.domain.tld
        index: hubble
        sourcetype_nova: hubble_audit
        sourcetype_nebula: hubble_osquery
        sourcetype_pulsar: hubble_fim

When using the scheduler, you can just run hubble in the foreground, or use the included sysvinit and systemd files to run it as a service in the background. You can also start it as a daemon without any scripts by using the -d argument.

Use -vvv to turn on debug logging.

About

Hubble is a modular, open-source security compliance framework. The project provides on-demand profile-based auditing, real-time security event notifications, automated remediation, alerting and reporting.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 87.5%
  • NSIS 8.1%
  • Shell 2.6%
  • PowerShell 1.8%