Explore how to deploy a defensive Raspberry Pi for IoT security in this 36-minute conference talk from BSidesSF 2016. Learn about using open-source software and free tools to monitor, protect, and mitigate threats in IoT environments. Discover the implementation of Network Security Monitoring, Log Stash, Elastic Search Database, and Kabana on inexpensive hardware. Dive into log normalization, custom patterns, conditional statements, GeoIP integration, and email alerts. Gain insights on creating Cabana dashboards, incorporating threat intel feeds, and setting up network scanning. Understand the benefits of Suite Security, auto-patching, and firewall integration. Get recommendations for cost-effective solutions using Raspberry Pi 3 and explore the potential of Security Onion for enhanced protection.
Sweet Security - Deploying a Defensive Raspberry Pi