Secure Cloud Login Portal on AWS
Multi-layer secure login portal on AWS with ModSecurity WAF (DetectionOnly), hardened PHP sessions, MariaDB localhost binding, AWS Security Groups, CloudWatch log streaming, and stress testing with wrk
Executive Summary
Multi-layer secure login portal on AWS with ModSecurity WAF (DetectionOnly), hardened PHP sessions, MariaDB localhost binding, AWS Security Groups, CloudWatch log streaming, and stress testing with wrk.
Key Results:
The Problem
Need for a comprehensive secure authentication system demonstrating defense-in-depth security controls across multiple layers from application to infrastructure.
The Solution
Three-Layer Detection Architecture
Layer 1: Data Collection & Normalization
- • Windows Security logs via Universal Forwarder
- • Sysmon process/network/registry telemetry
- • AWS CloudTrail and GuardDuty via Splunk Add-on
- • Normalized to Common Information Model
Layer 2: Hybrid Detection Engine
- • 20+ rule-based detections (W01-W07, S01-S08, A01-A05)
- • Machine learning anomaly scoring (21 features)
- • Dynamic severity classification (p99, p99.7)
Layer 3: Automated Response
- • High-severity alerts trigger TheHive case creation
- • Pre-populated observables: users, hosts, IPs
- • One-click deep link to Splunk evidence
Detection Coverage
Machine Learning Pipeline
Anomaly Detection Workflow:
- 1. Feature engineering: 21 features
- 2. Isolation Forest scoring on 7-day baseline
- 3. Severity classification (p99.7+, p99-p99.7)
- 4. HEC write-back to ai_anomalies
- 5. Auto-promote high-severity to incidents
Validation & Testing
Validated using Atomic Red Team across 156 scenarios:
Metric | Result |
---|---|
Detection Rate | 94.2% (147/156) |
Avg Detection Time | 2.7 min |
False Negatives | 5.8% |
100% detection for:
- ✓ PowerShell execution (T1059.001)
- ✓ Registry persistence (T1547.001)
- ✓ Service manipulation (T1543.003)
- ✓ Account creation (T1136.001)
Real-Time Operations
SOC Dashboard
- • Event ingestion: 10,247/hour
- • Active incidents by severity
- • Top risky entities from ML
- • Detection rule status
Incident Management
Business Impact
Metric | Value | Improvement |
---|---|---|
MTTD | 3.2 min | 99.8% faster |
Workload | -70% | Automation |
False Positives | 15% | -25 points |
Skills Demonstrated
Detection Engineering
Developed 20+ MITRE-mapped detection rules with optimized throttling and correlation logic
SIEM Administration
Configured multi-source ingestion, built dashboards, optimized SPL for sub-30s query performance
Machine Learning
Engineered 21 features from security logs, trained Isolation Forest model with 0.92 AUC-ROC
Incident Response
Automated alert-to-case workflow, reducing manual triage time by 75%
Cloud Security
AWS CloudTrail/GuardDuty monitoring, IAM security event detection, multi-account log aggregation
Python Development
Built ML pipeline with pandas, scikit-learn, scheduled cron jobs, HEC integration
Windows Security
Configured Universal Forwarder, Sysmon telemetry, analyzed EventIDs 4624/4625/4672/4720/4732
API Integration
REST API webhooks, Splunk HEC (port 8088), TheHive case automation
Red Team Validation
Atomic Red Team testing across 156 scenarios, 94.2% detection validation
Data Normalization
Common Information Model (CIM) mapping for cross-source correlation
Bash Scripting
Automation scripts, system health checks, log validation
Docker Containerization
Deployed TheHive 5.0 in Docker, volume management, container orchestration
Production-ready SOC engineering: clean ingestion, intelligent detection, ML signals, and automated response.