Creating a logical diagram

Project Overview

As part of the 30-Day MyDfir SOC Analyst Challenge, I kicked off my journey by building a logical diagram of a hypothetical security operations center (SOC) environment. This diagram serves as a foundational blueprint, illustrating the interactions and data flow between various components.

Key Objectives

  • Gain hands-on experience in creating logical diagrams.
  • Understand the fundamental structure of a SOC environment.
  • Visualize the data flow and interactions between different components.

Process and Methodology

  1. Cloud Provider Selection: I chose Vulture as the cloud provider for this project.
  2. Server Creation: I created icons representing different types of servers, including Elastic & Kibana, Windows Server, Ubuntu Server, Fleet Server, OS Ticket Server, and a C2 Server.
  3. Connection Establishment: Arrows were used to depict the connections between these servers, symbolizing data flow and interactions.
Internet
Internet
Soc Analyst Laptop
Soc Analyst…
Connect to Elastic/Kibana
via Web GUI
Connect to Elastic/Kibana…
Windows Server
RDP Enabled
Windows…
OS Ticket 
Server
OS Ticke…
Attack laptop
Kali Linux
Attack l…
C2 Server Mythic
C2 Serve…
Vultr
Vultr
VPC
VPC
Elastic and 
Kibana
Elastic…
Ubuntu Server
SSH Enabled
Ubuntu S…
Managed Agents
Managed Agents
Fleet Server
Fleet Se…
Managed
Managed
Forward Logs
via Agent
Forward Logs…
Private Network: 172.31.0.0/24
IP Range: 172.31.0.1- 254
Subnet Mask: 255.255.255.0
Private Network: 172.31.0.0/24…
Managed
Managed
Alert/Tickets
Alert/Tickets
Forward Logs
via Agent
Forward Logs…
Text is not SVG – cannot display

Key Components and Interactions

  • Elastic & Kibana: This server acts as a central hub for data analysis and visualization.
  • Windows Server: A traditional server running the Windows operating system.
  • Ubuntu Server: A Linux-based server with SSH enabled for remote access.
  • Fleet Server: A server responsible for managing and monitoring other servers.
  • OS Ticket Server: A server used for managing and tracking security incidents.
  • C2 Server: A command and control server used for malicious activities.

Data Flow

  • Logs: Logs from Windows and Ubuntu servers are forwarded to Elastic & Kibana for analysis.
  • Management: The Fleet Server manages and monitors other servers.
  • Incident Tickets: Security incidents are tracked and managed on the OS Ticket Server.

Conclusion

This project provided me with valuable insights into the structure of a SOC environment and the importance of logical diagrams in visualizing data flow. By understanding these concepts, I’m well-prepared to tackle more complex challenges in the upcoming days of the challenge.