Skip to content

πŸ“– Documentation of my cybersecurity homelab, cloud infrastructure engineering, and defensive security operations. Includes configurations for Coolify, Docker, and T-Pot honeypots.

Notifications You must be signed in to change notification settings

PanLuvme/security-ops-journal

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

24 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

logo

Cloud Infrastructure Engineering β€’ Defensive Security β€’ Homelab Operations

Status License LinkedIn


Documentation of secure infrastructure builds, hardening work, and detection/response engineering.


Start Here

If you only have a few minutes:

  1. Capstone: CAPSTONE.md β€” design β†’ deploy β†’ monitor β†’ respond
  2. Featured Projects: 01_projects β€” production-style builds + docs
  3. Detections & Runbooks: 03_detection + 04_runbooks β€” operational security maturity

What I Build (Capabilities)

  • Secure cloud infrastructure using IaC (Terraform modules, environment layouts, secure defaults)
  • Identity-first security: least privilege IAM, federation patterns, access reviews, break-glass workflows
  • Cloud telemetry and defense: logging, detection logic, tuning notes, and incident response runbooks
  • Hardening and operations: Linux baselines, service segmentation, backups/DR procedures, postmortems

Capstone (End-to-End Cloud Security Build)

A complete build with reproducible artifacts.


View Roadmap
Weekly learning plan, milestones, and upcoming work.

Featured Engineering Projects

Outcome-driven builds with architecture + validation.

Project Stack Security / Engineering Focus Proof Link
Homelab Infrastructure Coolify Docker Cloudflare Segmentation, secure access patterns, ops runbooks diagrams β€’ hardening notes β€’ evidence View
Honeypot Network T-Pot Elastic Stack Telemetry pipeline, attacker behavior analysis, dashboards detections β€’ dashboards β€’ writeups View
Custom Compiler Python C Systems fundamentals, parsing discipline, safe coding patterns tests β€’ design notes View

Each project folder includes: architecture, security notes, validation steps, and sanitized evidence where applicable.


Repository Map

  • 01_projects β€” production-style builds (IaC, deployments, architecture, ops)
  • 02_labs β€” focused experiments (AWS, Linux, networking, AppSec, Kubernetes)
  • 03_detection β€” detections-as-code, test events, tuning notes
  • 04_runbooks β€” incident response + operational procedures
  • 05_study β€” certification-aligned notes + concept deep dives
  • 06_writeups β€” CTF/wargame writeups with defensive takeaways
  • 07_diagrams β€” architecture diagrams, DFDs, threat models
  • 08_scripts β€” automation utilities (audits, log parsing, helpers)
  • 09_evidence β€” validation artifacts (sanitized)

Detection Engineering & Incident Response


Knowledge Base


Labs (Skill Proof)

  • AWS β€” IAM experiments, logging, secure S3/KMS patterns
  • Linux Hardening β€” baselines, audits, system logging
  • AppSec β€” auth patterns, input validation, regression tests
  • Containers & K8s β€” RBAC, network policies, admission controls
  • Networking β€” captures, troubleshooting, protocol behavior

Current Focus

  • Expand AWS detection pack (identity + persistence signals)
  • Terraform module hardening + reusable secure defaults
  • IR tabletop exercises and runbook iteration

Documentation Standards

Every project/lab aims to include:

  • Architecture diagram (where relevant)
  • Threat model (DFD + top risks)
  • Secure-by-default configuration (IaC or hardening steps)
  • Validation evidence (tests, screenshots, commands, outputs)
  • Lessons learned / postmortem notes

Folder Structure

.
β”œβ”€β”€ 01_projects/        # Production-style builds (IaC, architecture, ops)
β”œβ”€β”€ 02_labs/            # Focused experiments with validation steps
β”œβ”€β”€ 03_detection/       # Detections-as-code + testing + tuning
β”œβ”€β”€ 04_runbooks/        # IR + operational playbooks
β”œβ”€β”€ 05_study/           # Certification and concept notes
β”œβ”€β”€ 06_writeups/        # CTF/wargame writeups (defensive takeaways)
β”œβ”€β”€ 07_diagrams/        # Diagrams (architecture, DFDs)
β”œβ”€β”€ 08_scripts/         # Automation utilities
β”œβ”€β”€ 09_evidence/        # Sanitized proof artifacts
β”œβ”€β”€ CAPSTONE.md
β”œβ”€β”€ ROADMAP.md
β”œβ”€β”€ LICENSE
└── README.md

View Full Folder Structure
Click to view the complete repository folder structure (expanded).

About

πŸ“– Documentation of my cybersecurity homelab, cloud infrastructure engineering, and defensive security operations. Includes configurations for Coolify, Docker, and T-Pot honeypots.

Topics

Resources

Stars

Watchers

Forks