This project simulates a small healthcare related cloud environment to demonstrate foundational cloud security, logging, and threat detection concepts. The focus is on visibility and detection rather than exploitation, aligned with enterprise healthcare security practices.
The environment consists of an Ubuntu Server EC2 instance hosted in AWS, a simulated S3 bucket containing non sensitive placeholder data, and centralized logging using AWS CloudTrail and CloudWatch. A Kali Linux virtual machine is used to generate controlled security events.
- Cloud Platform: AWS
- Server OS: Ubuntu Server LTS (EC2)
- Attacker/Test OS: Kali Linux
- Logging: AWS CloudTrail, CloudWatch Logs, VPC Flow Logs
The following diagram shows the overall architecture of the environment, including traffic flow, logging, and monitoring components.
- IAM least-privilege roles and policies
- Restricted security group rules (SSH limited to administrator IP)
- CloudTrail enabled for management and data events
- Centralized log visibility via CloudWatch
Security group configuration:
- Network reconnaissance using Nmap
- Failed SSH authentication attempts
- Unauthorized S3 access attempts
Each simulated event was analyzed to identify where it appeared in AWS logs and how it could be detected in a real SOC environment.
CloudTrail was configured to forward API activity into CloudWatch Logs for centralized visibility:
VPC Flow Logs were enabled at the VPC level to capture accepted and rejected network traffic:
Simulated network reconnaissance was performed using Nmap against the EC2 public IP. The scan results show all tested ports in a filtered state, indicating effective network level restrictions.
VPC Flow Logs captured both accepted and rejected traffic and forwarded events to Amazon CloudWatch Logs. Rejected inbound connections were successfully logged, demonstrating effective security group enforcement and monitoring visibility.
Accepted traffic example:
Rejected traffic example:
- Launch an EC2 instance with a restricted security group (SSH limited to admin IP).
- Enable AWS CloudTrail and forward logs to CloudWatch Logs.
- Enable VPC Flow Logs (ALL traffic) and send to CloudWatch Logs.
- Perform network scanning using: nmap -Pn -p 22,80,443 <EC2_PUBLIC_IPv4ADDR>
- Observe ACCEPT and REJECT logs in Cloudwatch.