Skip to content
@Kaleidoscope-s

Kaleidoscope

Logo

Problem Domain 😕

Kaleidoscope has been contracted to improve the cybersecurity processes and systems for a client company, focusing on logging, monitoring, and detection of adversarial activity on cloud infrastructure.

Solution 💡

Kaleidoscope, successfully implemented various measures to enhance the overall security posture of the infrastructure. We began by implementing proper IAM best practices, ensuring secure access and control by implementing IAM for the root account and all team members following AWS best practices. This approach ensured least privilege access and proper authentication.

In terms of server hardening and data protection, Kaleidoscope deployed a CIS-compliant Windows Server Domain Controller (DC) hosted on a private subnet of a VPC. To ensure secure remote access, we configured access to the DC only via VPN tunneling. We also implemented encryption at rest to protect sensitive data stored on the server and encryption in transit to secure data communication between the server and other systems. Additionally, Kaleidoscope deployed Sysmon to generate security-relevant system logs, enhancing monitoring and threat detection capabilities.

For the CIS-compliant data server, Kaleidoscope deployed a Linux server instance containing PII and PCI data. They prioritized data protection by ensuring encryption at rest for the data stored on the server and implementing encryption in transit for secure data communication.

In terms of log aggregation and monitoring, Kaleidoscope configured and integrated the SIEM solution CloudWatch. We enabled real-time ingestion of event logs from key assets, including EC2 instances, which facilitated centralized log monitoring and analysis. Additionally, we demonstrated an attack scenario using a Python script with the netmiko library, triggering an event that was ingested by the SIEM solution.

For cloud monitoring, Kaleidoscope utilized VPC Flow Logs to capture and monitor traffic within the AWS Cloud environment. They developed an AWS Lambda function to trigger relevant responses to detected threats, improving automated threat detection and mitigation capabilities. Furthermore, they actively monitored the AWS environment for threat activity, including monitoring security logs for failed SSH attempts on instances.

Overall, Kaleidoscope's comprehensive security implementation encompassed IAM best practices, server hardening, data protection, SIEM integration, and cloud monitoring. These efforts significantly enhanced the security infrastructure at Code Fellows, enabling efficient threat detection, response, and mitigation.


Links 🔗

Below are the links and details for our 401 End of course project.

Meet the team 🤘

Ademola Olatunbosun Joshua Phipps
I am Epidemiologist by profession, US Army Vet, transitioned into Cybersecurity. I am currently a Georgia National Guard soldier transitioning into Cybersecurity. xD
Image of Ademola Image of Ademola Image of Joshua Image of Joshua
Nickolaus Alderete Andrew Perry
US Army Veteran, low voltage electrician transitioning into the cybersecurity realm. I am Andrew and I am currently an emergency medical technician expanding into the cyber security field
Image of Nick A Image of Nick Image of Andrew Image of Andrew
Justin "Sage" Tabios
Howzit My name is Justin 'Sage' Tabios. What I enjoy most about tech is the gaming sector of it.
Image of Sage Image of Sage

Kaleidoscope is a group of cohorts currently enrolled at Code Fellows OPS Cybersecurity class. This is a collection of our 401 Cybersecurity Engineering Mid-Term project.

Popular repositories Loading

  1. Kaleidoscope Kaleidoscope Public

    Kaleidoscope is a cohort of students at Code Fellows

    2

  2. SOPs SOPs Public

  3. Scripting Scripting Public

    Python

  4. .github .github Public

    Kaleidoscope is a cohort of students at Code Fellows

    1

Repositories

Showing 4 of 4 repositories

Top languages

Loading…

Most used topics

Loading…