Wazuh: The Open-Source SIEM for NIS 2 Compliance


Wazuh: The Open-Source SIEM for NIS 2 Compliance

Wazuh: The Open-Source SIEM for NIS 2 Compliance

Wazuh can help NIS 2 entities build centralized logging, detection, vulnerability visibility, and audit evidence. It does not make an organization “NIS 2 compliant” by itself. It is a technical control that must sit inside governance, incident response, evidence management, and documented risk treatment.

Sources: Wazuh official site, Wazuh architecture documentation, ACN baseline obligations determination, ENISA NIS2 technical implementation guidance.

Key takeaways

  • Wazuh is a free and open-source security platform that provides SIEM and XDR capabilities.
  • The documented architecture uses a multi-platform agent plus Wazuh server, indexer, and dashboard components.
  • For NIS 2, Wazuh is most relevant to logging, monitoring, alerting, vulnerability visibility, and evidence production.
  • The compliance result still depends on operating model, incident procedures, retention choices, and board-level accountability.
  • DIY deployment reduces license cost but increases internal engineering, tuning, maintenance, and response workload.

Scope of this article

This article explains what Wazuh is and when it can support a NIS 2 compliance program. It does not replace a legal assessment, an ACN filing analysis, or a full SOC design.

What is Wazuh?

Wazuh is an open-source security platform used for SIEM and XDR use cases. In practical terms, it collects endpoint and infrastructure signals, normalizes and analyzes events, raises alerts, and exposes dashboards for security operations. Wazuh documentation states that the platform is free and open source, with components under GPLv2 and Apache License 2.0.

For SMEs, the attraction is clear: a SIEM-like capability without a traditional per-GB or per-endpoint commercial SIEM license model. The tradeoff is equally clear: the organization must still design, run, secure, tune, and evidence the platform.

Wazuh architecture: agent, server, indexer, dashboard

ComponentRoleNIS 2 relevance
Wazuh agentCollects endpoint telemetry and forwards events to the manager.Endpoint visibility, asset evidence, event collection.
Wazuh serverAnalyzes events, applies decoders and rules, and coordinates agents.Detection logic, alert generation, operating evidence.
Wazuh indexerIndexes and stores alert/event data for search and analysis.Log retention, investigation, audit trail.
Wazuh dashboardProvides the web interface for alerts, configuration, and visualization.Operational monitoring and reporting.

The architecture can be all-in-one for labs and small environments, single-node with separated components for medium environments, or multi-node for higher throughput and availability. Wazuh also supports agentless monitoring and syslog ingestion for devices where an agent is not possible.

Why Wazuh is relevant for NIS 2

NIS 2 and the Italian implementation model require cybersecurity risk-management measures, incident handling, and evidence that controls are operating. ACN baseline materials and ENISA technical guidance both make logging, monitoring, detection, and incident-response evidence central to operational readiness.

Wazuh can support these needs in four ways:

  • Centralized logging: agents and syslog collection can feed a common evidence base.
  • Detection: decoders and rules can identify suspicious activity and policy violations.
  • Vulnerability visibility: software inventory and vulnerability detection can support risk treatment.
  • Reporting: dashboards and exports can help demonstrate operating controls to management and auditors.

Comparison: Wazuh vs commercial SIEM

CriterionWazuhCommercial SIEM
License modelOpen-source core, lower entry cost.Usually subscription, ingestion, or endpoint pricing.
DeploymentRequires internal Linux, storage, indexer, and security skills.Often supported by vendor or integrator.
Detection contentStrong baseline, but needs tuning for the environment.Vendor-managed content is often broader, but still needs tuning.
Compliance evidencePossible, if governance and retention are designed properly.Often easier to package, but not automatic.
ResponsibilityMostly on the implementing organization.Shared with vendor, MSSP, or integrator depending on contract.

When to choose Wazuh

Wazuh is a strong candidate when the organization has Linux and security engineering skills, wants transparency over detection logic, and can maintain retention, hardening, backup, and response processes. It is also suitable for labs, phased NIS 2 readiness programs, and organizations that need more visibility before purchasing a commercial SIEM.

When not to choose Wazuh

Wazuh is not the best starting point when no one owns daily triage, log source onboarding, rule tuning, and incident escalation. A tool without operating capacity becomes shelfware. For regulated entities, that creates a false sense of compliance and weak audit evidence.

Limits and TCO considerations

  • Storage and indexer capacity must be sized against event volume and retention needs.
  • Rules need tuning to reduce false positives and missed detections.
  • Availability, backup, encryption, and administrator access must be designed explicitly.
  • Incident notification remains a process obligation. Wazuh can alert, but it cannot decide regulatory notification alone.

Coordination with a managed service

Organizations that like Wazuh but lack SOC capacity can use it as part of a managed operating model. Aegister’s Cyber Console and vCISO service can help connect telemetry, governance, evidence, and executive reporting instead of leaving the SIEM as a standalone tool.

Implementation model for a NIS 2 program

A practical Wazuh program should be managed as a control implementation project. The organization should first define the services in scope, then identify the systems that support them, then decide which events are needed to prove monitoring and response capability. This prevents the common mistake of collecting logs because they are easy to collect, while missing the systems that matter most for service continuity.

The minimum governance package should include a log-source register, a SIEM ownership matrix, a retention decision, an alert review procedure, and an incident-escalation map. These documents are not bureaucracy. They are the bridge between the technical tool and the evidence expected in a regulated environment.

Evidence checklist for Wazuh readiness

EvidenceWhy it mattersOwner
Log-source registerShows which critical systems are monitored and which are not.IT/security operations
Retention policyExplains how long alerts and archive logs are kept.CISO/legal
Rule-tuning recordDocuments why detection thresholds were changed.SOC or security lead
Escalation procedureConnects alerts to incident response and regulatory triage.Incident manager
Management reportShows coverage, open risks, and control maturity to leadership.CISO/vCISO

Common implementation failure modes

  • Tool-first deployment: Wazuh is installed before the organization defines what it must prove.
  • Unowned alerts: alerts exist, but no role is accountable for triage and closure.
  • Retention without restore: logs are retained, but backup and recovery of the SIEM are not tested.
  • Admin overexposure: dashboard and API access are broader than necessary.
  • No regulatory routing: security incidents are handled technically, but not mapped to NIS 2 notification logic.

How to position Wazuh in the control stack

Wazuh should be treated as one part of the control stack. It can provide telemetry and alerts, but it should integrate with asset management, vulnerability management, ticketing, backup evidence, supplier-risk records, and executive reporting. Without these connections, the SIEM becomes a monitoring island.

The mature target is a traceable chain: critical service → supporting assets → monitored log sources → detection rules → alerts → tickets → incident decision → management evidence. That chain is what makes a technical platform useful for compliance and risk governance.

90-day adoption roadmap

PhaseObjectiveOutput
Days 1-30Design scope and pilot architecture.Service map, log-source register, pilot deployment.
Days 31-60Onboard priority systems and validate alerts.Connected agents, test alerts, escalation path.
Days 61-90Package evidence and decide operating model.Management report, open-gap list, runbook.

This roadmap keeps the first deployment focused. It avoids the common pattern where teams install the platform, connect many noisy sources, and then lack enough time to turn alerts into usable evidence.

Service coverage model

For NIS 2, endpoint count is less important than service coverage. A small number of critical systems may matter more than hundreds of low-impact endpoints. The coverage model should therefore start from services, map dependencies, and only then list log sources. This produces a defensible reason for monitoring priorities.

Governance handoff

At the end of the first implementation phase, Wazuh ownership should move from project mode to operating mode. That handoff should name who owns platform health, rule tuning, source onboarding, evidence exports, backup tests, and management reporting. Without this handoff, the SIEM remains a project artifact rather than a control.

Series navigation

FAQ

Is Wazuh enough for NIS 2 compliance?

No. Wazuh can support several technical controls, but compliance also requires governance, documented policies, risk management, incident procedures, and evidence.

Is Wazuh really open source?

Wazuh documentation describes the platform as free and open source, with components under GPLv2 and Apache License 2.0. Organizations should still review licensing for their exact deployment and integration model.

Can Wazuh replace a SOC?

No. It can support SOC workflows, but someone must monitor alerts, investigate incidents, tune rules, and report outcomes.

Official sources

Share this post