Skip to content

Repo to hold Group Security AWS research scripts and code

License

Notifications You must be signed in to change notification settings

chrdunne/gs-aws-research

 
 

Repository files navigation

gs-aws-research

Git repository to hold Group Security AWS research scripts, playbooks and code.

The goal of this project is to design, deploy and configure a AWS research environment focused on Security Event visualisation and AWS Security capabilities

Project main tasks:

Pre-requisites

In order to run these automation playbooks and scripts the following is needed:

  • A Unix host(macOS or Linux)
  • Virtualenv / pyenv
  • Ansible
  • AWS CLI
  • Boto3

Download and install

# Download respository
$ cd Projects; git clone https://github.com/photobox/gs-aws-research.git

# Change directory
$ cd gs-aws-research

# Create new virtualenvironment with pyenv
$ pyenv virtualenv 3.4.0 venv

# Activate the virtual environment
$ pyenv activate venv

# Install requirements.txt
$ pip install -r requirements.txt

Configure AWS CLI

Run the aws configure command and enter your AWS Access Key ID and AWS Secret Access Key

$ aws configure
$ AWS Access Key ID [****************7MKA]:
AWS Secret Access Key [****************u1eV]:
Default region name [eu-central-1]:
Default output format [json]:

Tools

The following tools and technologies will be used in the environment.

ELK

Elasticsearch will be used for consuming and visualising logs in the Environment

Prometheus

Prometheus will be used for monitoring metrics in the enviroment

Ansible

Ansible automation tool will be used for provisioning, configuration and orchestration of the whole AWS environment and components deployed in the environment.

Cloud custodian

Cloud-custodian will be used for house-keeping tasks in the AWS environment. Cleaning and destroying old EC2 instances, ensuring security and compliance AWS configurations end setups.

Damn Vulnerable Web Application

The environment will be provisionesd with vulnerable web applications that will be protected and monitored by Amazon WAF and logs visualised by ELK from AWS logs storewd in S3 buckets. The logs will be consumed and analysed and AWS Lambda used to update WAF configurations based on the attacks detected in the logs.

Naming Conventions

Naming and tagging AWS services and components is important and has to be done in order to identify and work with the correct resoures in the AWS environment.

Below are some good examples of naming conventions that can be used:

About

Repo to hold Group Security AWS research scripts and code

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • CoffeeScript 89.2%
  • JavaScript 10.8%