🛡️ Section 15: Security Operations Procedures (SecOps SOPs)
🎯 Objective
This section defines the routine security tasks required to maintain, monitor, and verify the operational security of the OpenCMMC Stack. These procedures support ongoing compliance with System and Information Integrity (SI) , Configuration Management (CM) , Access Control (AC) , and Audit and Accountability (AU) domains in CMMC Level 2.
📆 Daily Operations Checklist
Task
Responsible Role
Tools
Evidence
Review Wazuh dashboard alerts
Security Officer
Wazuh Web UI
Screenshot or exported alert logs
Check Podman service health
System Admin
podman ps
, systemctl status
CLI output
Verify overnight backup success
System Admin
journalctl -u restic-backup.timer
Timer log
Tailscale device review
Network Admin
Tailscale Admin Panel
Screenshot or audit log
📅 Weekly Operations Checklist
Task
Responsible Role
Tools
Evidence
Apply pending OS updates (non-emergency)
System Admin
apt
, ansible-pull
Ansible log or apt list --upgradable
Review Keycloak login history and MFA failures
Security Officer
Keycloak Admin Console
Audit log export
Rotate logs to archive
System Admin
logrotate
, tar
Archived .gz
file list
Compare current container image versions
DevSecOps
podman image ls
, skopeo inspect
Version report or SBOM diff
🗓️ Monthly Operations Checklist
Task
Responsible Role
Tools
Evidence
Run backup restore test
Security Officer
restic
, diff
Screenshot or diff report
Review all Wazuh rule overrides
Security Officer
Wazuh Rules Config
Rule diff or exported rules
Conduct user access review
HR + IT
Keycloak Groups
Access report
Test disaster recovery procedure
System Admin
Runbook or manual
Checklist completion or script output
restic-backup.sh
— backup and retention
podman
— container monitoring and updates
ansible
— patch automation, drift detection
journalctl
— log source for backup and security events
Wazuh
— security alerts and compliance reporting
Keycloak
— access logging and user behavior
🗂️ Audit Artifacts to Maintain
Artifact
Source
Frequency
Wazuh alerts (critical/high)
Wazuh dashboard
Daily
Backup logs
systemd journal
Daily
Restore test success/fail log
CLI/Restic output
Monthly
Patch application log
Ansible/Apt
Weekly
Keycloak login audit
Exported .csv
Weekly
📌 CMMC Practices Addressed
Practice
Description
SI.2.216
Monitor system security alerts and logs
SI.1.210
Identify unauthorized use or modification
CM.2.067
Monitor system configuration
AC.1.001
Maintain access restrictions
✅ Next Step
In the next section, you’ll document how new users and devices are securely provisioned and scoped using identity-based Zero Trust policies.