Skip to content

Built a mini honeynet in Azure and ingest log sources from various resources into a Log Analytics workspace, which is then used by Microsoft Sentinel to build attack maps, trigger alerts, and create incidents.

Notifications You must be signed in to change notification settings

latchkeylex/Cloud-SOC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 

Repository files navigation

Building a SOC + Honeynet in Azure (Live Traffic)

Cloud Honeynet / SOC

Introduction

In this project, I established a small-scale honeynet within the Azure cloud environment. I gathered log data from diverse sources and channeled it into a Log Analytics workspace. Microsoft Sentinel then leveraged these logs to construct attack visualizations, trigger security alerts, and manage security incidents.

To assess the security posture, I conducted a 24-hour measurement of security metrics within the initial, less secure environment. Subsequently, I applied a series of security controls to fortify the environment and performed another 24-hour metric assessment. The security metrics under examination include..

  • SecurityEvent (Windows Event Logs)
  • Syslog (Linux Event Logs)
  • SecurityAlert (Log Analytics Alerts Triggered)
  • SecurityIncident (Incidents created by Sentinel)
  • AzureNetworkAnalytics_CL (Malicious Flows allowed into our honeynet)

Technologies, Azure Components, and Regulations Employed

  • Azure Virtual Network (VNet)
  • Azure Network Security Groups (NSG)
  • Virtual Machines (2 Windows VMs, 1 Linux VM)
  • Log Analytics Workspace with Kusto Query Language (KQL) Queries
  • Azure Key Vault for Secure Secrets Management
  • Azure Storage Account for Data Storage
  • Microsoft Sentinel for Security Information and Event Management (SIEM)
  • Microsoft Defender for Cloud to Protect Cloud Resources
  • Windows Remote Desktop for Remote Access
  • Command Line Interface (CLI) for System Management
  • PowerShell for Automation and Configuration Management
  • NIST SP 800-53 Revision 5 for Security Controls
  • NIST SP 800-61 Revision 2 for Incident Handling Guidance

Architecture Before Hardening / Security Controls

For the "BEFORE" metrics, all resources were originally deployed, exposed to the internet for bad actors to discover. The purpose for doing so was to attract bad actors and observe their attack patterns. The Virtual Machines had both their Network Security Groups and built-in firewalls wide open, and all other resources are deployed with public endpoints visible to the Internet; aka, no use for private endpoints.

Architecture Diagram

Architecture After Hardening / Security Controls

For the "AFTER" metrics of the project, security enhancements were made to comply with NIST SP 800-53 Rev4 SC-7(3) Access Points requirements. These measures involved strengthening Network Security Groups (NSGs) to allow access only to authorized public IP addresses for virtual machines, configuring built-in Azure firewalls to restrict unauthorized access and minimize attack surface, and replacing Public Endpoints with Private Endpoints for Azure Key Vault and Storage Containers, ensuring limited access to sensitive resources within the virtual network and not from the public internet.

Architecture Diagram

Attack Maps Before Hardening / Security Controls

NSG Allowed Inbound Malicious Flows
Linux Syslog Auth Failures
Windows RDP/SMB Auth Failures

Metrics Before Hardening / Security Controls

The following table shows the metrics we measured in our insecure environment for 24 hours: Start Time 2023-03-15 17:04:29 Stop Time 2023-03-16 17:04:29

Metric Count
SecurityEvent 19470
Syslog 3028
SecurityAlert 10
SecurityIncident 348
AzureNetworkAnalytics_CL 843

Attack Maps Before Hardening / Security Controls

All map queries actually returned no results due to no instances of malicious activity for the 24 hour period after hardening.

Metrics After Hardening / Security Controls

The following table shows the metrics we measured in our environment for another 24 hours, but after we have applied security controls: Start Time 2023-03-18 15:37 Stop Time 2023-03-19 15:37

Metric Count
SecurityEvent 8778
Syslog 25
SecurityAlert 0
SecurityIncident 0
AzureNetworkAnalytics_CL 0

Conclusion

In this project, we established a mini honeynet within the Microsoft Azure environment to enhance security monitoring. We integrated various log sources into a dedicated Log Analytics workspace. Microsoft Sentinel was employed to implement a proactive security approach, utilizing ingested logs to trigger alerts and manage security incidents effectively.

We conducted initial security metrics assessments within an environment that lacked robust security controls, and then subsequently assessed security metrics after implementing enhanced security measures. It's noteworthy that the post-improvement assessment revealed a significant reduction in the number of security events and incidents, underscoring the efficacy of the security controls we implemented.

Additionally, it's important to consider that if the network resources were under heavier regular user utilization, the 24-hour post-security control period might have generated a higher volume of security events and alerts, but our interventions effectively mitigated these potential risks.

About

Built a mini honeynet in Azure and ingest log sources from various resources into a Log Analytics workspace, which is then used by Microsoft Sentinel to build attack maps, trigger alerts, and create incidents.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published