Skip to content

ldodson10/cyber-range-lab-aws

Cyber Range Lab on AWS

A hands-on cybersecurity lab built on AWS to simulate and defend against real-world threats. This project provisions a Bastion host, a Defender instance, and integrates AWS GuardDuty and Security Hub using Terraform.

Table of Contents

Overview

The AWS Cyber Range Lab provides a controlled environment to practice:

  • Deploying infrastructure with Terraform (IaC)
  • Monitoring threats with AWS GuardDuty
  • Validating compliance with AWS Security Hub
  • Testing connectivity between public and private subnets
  • Blue team defensive security practices

Architecture

The environment consists of:

  • Bastion Host → Public subnet, SSH access
  • Defender Instance → Private subnet, accessed only through Bastion
  • AWS GuardDuty → Threat detection and monitoring
  • AWS Security Hub → Centralized security findings
  • VPC Endpoints → Secure SSM communication for private instances

Network Topology

Project Structure

cyber-range-lab-aws/
├── docs/                           # Project documentation
│   ├── technical-documentation.md  # Technical implementation details
│   └── workflow.md                # Step-by-step deployment workflow
├── diagrams/                       # Architecture diagrams
│   └── aws_cyberrange_topology.png
├── evidence/                       # Screenshots and evidence
│   ├── aws/                        # AWS console screenshots
│   └── localOS/                    # Local terminal screenshots
├── terraform/                      # Infrastructure as Code
│   ├── main.tf                     # Main infrastructure definitions
│   ├── variables.tf                 # Variable definitions
│   ├── outputs.tf                  # Output definitions
│   └── provider.tf                 # AWS provider configuration
├── LICENSE                         # MIT License
├── CODE_OF_CONDUCT.md             # Community guidelines
├── CONTRIBUTING.md                 # Contribution guidelines
├── SECURITY.md                     # Security policy
└── README.md                       # This file

Setup & Usage

  1. Clone this repository:

    git clone https://github.com/ldodson10/cyber-range-lab-aws.git
    cd cyber-range-lab-aws
  2. Configure AWS credentials:

    aws configure
  3. Navigate to the terraform directory:

    cd terraform
  4. Initialize Terraform:

    terraform init
  5. Plan the deployment:

    terraform plan -out=tfplan
  6. Apply the infrastructure:

    terraform apply tfplan
  7. Clean up when finished:

    terraform destroy

Documentation

Evidence & Screenshots

The evidence/ directory contains comprehensive screenshots documenting the entire deployment process:

AWS Console Evidence (evidence/aws/)

  • EC2 instances configuration
  • Security groups and networking
  • VPC and subnet setup
  • GuardDuty and Security Hub activation

Local Terminal Evidence (evidence/localOS/)

  • Terraform initialization and validation
  • AWS CLI configuration
  • Deployment process screenshots
  • SSH connectivity testing
  • Security service verification

Blue Team (Defensive) – Latrisha Dodson

This section documents the defensive security aspects implemented in the lab:

Security Monitoring

  • AWS GuardDuty: Enabled for threat detection and monitoring
  • AWS Security Hub: Centralized security findings and compliance validation
  • Security Group Hardening: Restrictive inbound rules, least privilege access

Defensive Measures

  • Network Segmentation: Public/private subnet isolation
  • Bastion Host: Secure jump box for private instance access
  • IAM Roles: Least privilege access for EC2 instances
  • VPC Endpoints: Secure communication for SSM services

Monitoring & Detection

  • Real-time threat detection through GuardDuty
  • Compliance monitoring via Security Hub
  • Network traffic analysis capabilities
  • Log aggregation and analysis setup

Note: Additional blue team detection rules and MITRE ATT&CK mappings can be found in the technical documentation.

Credits & Acknowledgments

This project was developed by a dedicated cybersecurity team:

  • Lead Cloud Architect (Project Lead): Shannon Kelly
  • Infrastructure Engineer (Terraform & Automation Specialist): Fausto Rosado
  • Red Team Engineer (Offensive Security Specialist): Zeinab Ali
  • Blue Team Engineer (Defensive Security Specialist): Latrisha Dodson
  • Documentation & Reporting Lead (Knowledge Manager): Javier Acosta

License

This project is licensed under the MIT License - see the LICENSE file for details.

About

No description, website, or topics provided.

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages