Secure Cloud Login Portal on AWS

Multi-layer secure login portal on AWS with ModSecurity WAF (DetectionOnly), hardened PHP sessions, MariaDB localhost binding, AWS Security Groups, CloudWatch log streaming, and stress testing with wrk

Executive Summary

Multi-layer secure login portal on AWS with ModSecurity WAF (DetectionOnly), hardened PHP sessions, MariaDB localhost binding, AWS Security Groups, CloudWatch log streaming, and stress testing with wrk.

Key Results:

🎯
7 distinct controls
Security Layers Implemented
🎯
38K+ requests tested
Request Processing Capacity
🎯
662ms under load
Average Response Time
🎯
SQLi/XSS/Bot detection
Security Rule Coverage

The Problem

Need for a comprehensive secure authentication system demonstrating defense-in-depth security controls across multiple layers from application to infrastructure.

The Solution

Three-Layer Detection Architecture

Layer 1: Data Collection & Normalization

  • • Windows Security logs via Universal Forwarder
  • • Sysmon process/network/registry telemetry
  • • AWS CloudTrail and GuardDuty via Splunk Add-on
  • • Normalized to Common Information Model

Layer 2: Hybrid Detection Engine

  • • 20+ rule-based detections (W01-W07, S01-S08, A01-A05)
  • • Machine learning anomaly scoring (21 features)
  • • Dynamic severity classification (p99, p99.7)

Layer 3: Automated Response

  • • High-severity alerts trigger TheHive case creation
  • • Pre-populated observables: users, hosts, IPs
  • • One-click deep link to Splunk evidence

Detection Coverage

Machine Learning Pipeline

Anomaly Detection Workflow:

  1. 1. Feature engineering: 21 features
  2. 2. Isolation Forest scoring on 7-day baseline
  3. 3. Severity classification (p99.7+, p99-p99.7)
  4. 4. HEC write-back to ai_anomalies
  5. 5. Auto-promote high-severity to incidents

Validation & Testing

Validated using Atomic Red Team across 156 scenarios:

MetricResult
Detection Rate94.2% (147/156)
Avg Detection Time2.7 min
False Negatives5.8%

100% detection for:

  • ✓ PowerShell execution (T1059.001)
  • ✓ Registry persistence (T1547.001)
  • ✓ Service manipulation (T1543.003)
  • ✓ Account creation (T1136.001)

Real-Time Operations

SOC Dashboard

  • • Event ingestion: 10,247/hour
  • • Active incidents by severity
  • • Top risky entities from ML
  • • Detection rule status

Incident Management

Business Impact

MetricValueImprovement
MTTD3.2 min99.8% faster
Workload-70%Automation
False Positives15%-25 points

Skills Demonstrated

Detection Engineering

Developed 20+ MITRE-mapped detection rules with optimized throttling and correlation logic

SIEM Administration

Configured multi-source ingestion, built dashboards, optimized SPL for sub-30s query performance

Machine Learning

Engineered 21 features from security logs, trained Isolation Forest model with 0.92 AUC-ROC

Incident Response

Automated alert-to-case workflow, reducing manual triage time by 75%

Cloud Security

AWS CloudTrail/GuardDuty monitoring, IAM security event detection, multi-account log aggregation

Python Development

Built ML pipeline with pandas, scikit-learn, scheduled cron jobs, HEC integration

Windows Security

Configured Universal Forwarder, Sysmon telemetry, analyzed EventIDs 4624/4625/4672/4720/4732

API Integration

REST API webhooks, Splunk HEC (port 8088), TheHive case automation

Red Team Validation

Atomic Red Team testing across 156 scenarios, 94.2% detection validation

Data Normalization

Common Information Model (CIM) mapping for cross-source correlation

Bash Scripting

Automation scripts, system health checks, log validation

Docker Containerization

Deployed TheHive 5.0 in Docker, volume management, container orchestration

Production-ready SOC engineering: clean ingestion, intelligent detection, ML signals, and automated response.