![](https://evanmost.tech/wp-content/themes/my-portfolio/assets/img/arrow-back.png)
Career
Built a SOC + Honeynet in Azure (Live Traffic)
![](https://evanmost.tech/wp-content/uploads/2024/01/azureSOC-1.jpg)
Company: Internship Program
The architecture of the mini honeynet in Azure consists of the following components:
Metrics Before Hardening / Security Controls
The following table shows the metrics we measured in our insecure environment for 24 hours:
Start Time: 2024-01-03 20:39
Stop Time: 2024-01-09 17:36
Introduction
In this project, I built a mini honeynet in Azure and ingest log sources from various resources into a Log Analytics workspace, which is then used by Microsoft Sentinel to build attack maps, trigger alerts, and create incidents. I measured some security metrics in the insecure environment for 24 hours, apply some security controls to harden the environment, measure metrics for another 24 hours, then show the results below. The metrics we will show are:- SecurityEvent (Windows Event Logs)
- Syslog (Linux Event Logs)
- SecurityAlert (Log Analytics Alerts Triggered)
- SecurityIncident (Incidents created by Sentinel)
- AzureNetworkAnalytics_CL (Malicious Flows allowed into our honeynet)
Architecture Before Hardening / Security Controls
![Architecture Diagram](https://i.imgur.com/aBDwnKb.jpg)
Architecture After Hardening / Security Controls
![Architecture Diagram](https://i.imgur.com/YQNa9Pp.jpg)
- Virtual Network (VNet)
- Network Security Group (NSG)
- Virtual Machines (2 windows, 1 linux)
- Log Analytics Workspace
- Azure Key Vault
- Azure Storage Account
- Microsoft Sentinel
Attack Maps Before Hardening / Security Controls
![NSG Allowed Inbound Malicious Flows](https://i.imgur.com/DhZPWTb.png)
![Linux Syslog Auth Failures](https://i.imgur.com/7ZDER1s.png)
![Windows RDP/SMB Auth Failures](https://i.imgur.com/P8xnAOZ.png)
Metrics Before Hardening / Security Controls
The following table shows the metrics we measured in our insecure environment for 24 hours:
Start Time: 2024-01-03 20:39
Stop Time: 2024-01-04 20:39
Metric | Count |
---|---|
SecurityEvent | 55292 |
Syslog | 1921 |
SecurityAlert | 3 |
SecurityIncident | 185 |
AzureNetworkAnalytics_CL | 86582 |
Attack Maps After Hardening / Security Controls
All map queries actually returned no results due to no instances of malicious activity for the 24-hour period after hardening.Metrics After Hardening / Security Controls
The following table shows the metrics we measured in our environment for another 24 hours, but after we have applied security controls: Start Time: 2024-01-08 17:36Stop Time: 2024-01-09 17:36
Metric | Count |
---|---|
SecurityEvent | 13348 |
Syslog | 5 |
SecurityAlert | 0 |
SecurityIncident | 0 |
AzureNetworkAnalytics_CL | 0 |