Skip to content

JoeCoolBackInSchool/Cloud-SOC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 

Repository files navigation

Building a SOC + Honeynet in Azure

Screenshot 2024-01-10 at 23 46 41

Introduction

In this project, I built a honeynet in Azure and analyzed the live traffic with Microsoft Sentinel to learn a bit more about enhancing network security and handling incident responses. I utilized Sentinel to help me structure attack maps, trigger alerts, and record some metrics.

Metrics:

  • Windows Event Logs (SecurityEvent)
  • Linux Event Logs (Syslog)
  • Log Analytics Alerts (SecurityAlert)
  • Incidents created by Sentinel (SecurityIncident)
  • Malicious Flows / Possible Malware allowed into our honeynet (AzureNetworkAnalytics_CL)

Architecture Before Implementing Security Controls

Screenshot 2024-01-09 at 21 40 16

Architecture After Hardening and Implementing Security Controls

Screenshot 2024-01-09 at 23 45 54

The architecture of the honeynet in Azure consists of the following components:

  • A Virtual Network (VNet)
  • Multiple Network Security Groups (NSGs)
  • 3 Virtual Machines (2 windows, 1 linux)
  • A Log Analytics Workspace
  • An Azure Key Vault
  • An Azure Storage Account
  • And Microsoft Sentinel

In the "BEFORE" metrics, all resources were deployed with unrestricted exposure to the internet. Both the Virtual Machines and their Network Security Groups, alongside built-in firewalls, were configured with wide-open settings that completely exposed the environments to potential threats.

For the "AFTER" metrics, Network Security Groups were hardened by blocking ALL network traffic (except for administrative entities), and all other resources were protected with firewalls as well as private endpoints.

Attack Maps Before Hardening / Security Controls

Network Security Groups Allowed Inbound Malicious Flows (BEFORE)nsg-malicious-allowed-in
Linux Syslog Authentication Failures (BEFORE)linux-ssh-auth-fail
Windows RDP/SMB Authentication Failures (BEFORE)windows-rdp-auth-fail
MS SQL Server Authentication Failures (BEFORE)mssql-auth-fail

Metrics Before Hardening / Security Controls

The following table shows the metrics measured in the insecure environment for 24 hours:

Start Time 2024-01-08 18:35

Stop Time 2024-01-09 18:35

Metric Count
SecurityEvent 53615
Syslog 17373
SecurityAlert 11
SecurityIncident 361
AzureNetworkAnalytics_CL 1648

Attack Maps After Hardening / Security Controls

Screenshot 2024-01-10 at 11 23 59 Screenshot 2024-01-10 at 23 54 51

All map queries returned no results due to no instances of malicious activity for the 24 hour period after hardening.

Metrics After Hardening / Security Controls

The following table shows the metrics measured in my environment for another 24 hours, but after applying security controls:

Start Time 2024-01-09 19:58

Stop Time 2024-01-10 19:58

Metric Count
SecurityEvent 12048
Syslog 31
SecurityAlert 0
SecurityIncident 0
AzureNetworkAnalytics_CL 0

Conclusion

I created a honeypot in Azure and analyzed live network traffic by incorporating log sources and Microsoft Sentinel to facilitate the generation of alerts and incidents based on the ingested logs. Metrics were initially measured in the insecure environment before applying NIST security controls. Subsequently, the same metrics were assessed after the implementation of NIST security controls.

The results showcased a significant reduction in the number of security events and incidents post-implementation.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published