Cost estimate cloud-based security system
Running your own infrastructure does come with real-world costs—especially in terms of time and expertise.
Provider examples: Hetzner, Netcup, 1984 Hosting (avoid AWS/Azure/Google unless legally required)
Recommended specs:
Hardened with:
As in the in-shelter version: Windows, macOS, Android (rooted preferred), iOS (jailbroken or backups)
Use in clinics or satellite offices for local device scans.
# Update server
sudo apt update && sudo apt upgrade -y
# Install basic security
sudo apt install fail2ban ufw unattended-upgrades -y
sudo ufw allow ssh
sudo ufw enable
Same as on-prem:
# Add Wazuh repo
curl -s https://packages.wazuh.com/key/GPG-KEY-WAZUH | sudo gpg --dearmor -o /usr/share/keyrings/wazuh.gpg
echo "deb [signed-by=/usr/share/keyrings/wazuh.gpg] https://packages.wazuh.com/4.x/apt/ stable main" | sudo tee /etc/apt/sources.list.d/wazuh.list
sudo apt update
# Install components
sudo apt install -y wazuh-manager wazuh-api elasticsearch kibana
# Start services
sudo systemctl enable --now wazuh-manager elasticsearch kibana
sudo apt install wireguard -y
# (Generate keys, share with each site. Use port 51820.)
https://your-cloud-ip:5601
pkg update && pkg install curl git
curl -s https://your-cloud-ip/setup_android.sh | bash
Non-rooted Android phones are limited in what can be monitored directly, but you can still extract useful information manually and upload it securely to your SIEM server.
This method requires physical access to the phone and a computer with ADB installed. Step-by-step:
sudo apt install android-tools-adb
Enable USB debugging on the Android device
Connect the phone via USB: Trust the computer if prompted on the phone.
Collect logs and data: On your terminal:
adb devices
adb logcat -d > android_logcat.txt
adb shell dumpsys > android_dumpsys.txt
adb shell pm list packages -f > installed_packages.txt
scp android_*.txt youruser@your-siem.cloud:/opt/forensics/android_logs/
gpg -c android_logcat.txt
If your shelter uses a dedicated intake tablet:
Use the Files or CX File Explorer app on the Android device to:
/Download
, /WhatsApp/
, and /DCIM/
Transfer these files via USB or SD card to the intake tablet
Upload them to the SIEM cloud server securely (using scp
or a secure upload script)
# Backup on client machine
idevicebackup2 backup /tmp/device_backup
# Securely send to cloud server
scp /tmp/device_backup user@your-cloud-ip:/opt/backups/
scp suspicious.pcap user@your-cloud-ip:/opt/forensics/
tshark
or Kibana dashboardstar -czf /opt/backup/siem_logs_$(date +%F).tar.gz /var/ossec/logs/
gpg -c /opt/backup/siem_logs_*.tar.gz
This setup provides secure, centralised threat detection across multiple locations, without relying on third-party cloud tools. All data stays in your hands, encrypted and protected. It does require ongoing care (VPN upkeep, user access management), but it dramatically lowers local risk while keeping survivors’ privacy at the forefront.
With a bit of training, tech-savvy advocates can handle daily tasks, while specialists can support upgrades and deeper forensics remotely.
Running your own infrastructure does come with real-world costs—especially in terms of time and expertise.