Architecture Views
Purpose
This section provides multiple views of the Scheol Security Lab architecture.
Each view highlights a specific aspect of the environment:
- structural organization
- trust boundaries
- critical flows and interactions
The goal is not to document every component in detail, but to support:
- risk understanding
- security reasoning
- architectural decision-making
1. High-Level Architecture Overview
Description
The lab is structured around two main environments:
- Heaven - externally exposed infrastructure (public VPS)
- Hell - internal infrastructure (on-premise virtualized environment)
This separation reflects a typical hybrid architecture combining:
- public-facing services
- internal control and monitoring systems
Key Characteristics
- Public services are hosted in Heaven
- Sensitive systems and control functions are hosted in Hell
- Administrative and security functions are progressively centralized in Hell
Security Perspective
- Heaven is considered exposed but controlled
- Hell is considered trusted but not immune
- Interactions between both environments are treated as sensitive flows
2. Trust Zones View
Description
The architecture is divided into multiple trust zones based on exposure and sensitivity.
Core Zones
| Zone | Description | Trust Level |
|---|---|---|
| Public Zone (Heaven) | Internet-exposed services (web, repositories) | Low |
| Service Zone (Heaven internal) | Backend services behind reverse proxy | Medium |
| Internal Core (Hell) | Core infrastructure, identity, automation | High |
| Security Zone (Hell) | Monitoring, detection, logging (SOC) | High |
| Administrative Zone | Administrative access systems | Very High |
| Isolated Zone | Honeypots or experimental systems | Untrusted / Controlled |
Security Principles
- Default-deny between zones
- Controlled and minimal communication paths
- Stronger controls as sensitivity increases
3. Sensitive Flows View
Description
Certain flows are considered critical due to the sensitivity of the data or the privileges involved.
Key Flows
-
Log Forwarding (Heaven → Hell)
- Security telemetry sent to central monitoring
- One-way flow preferred
-
Administrative Access (Admin → Bastion → Targets)
- Controlled entry point
- Strong authentication required
-
Backup Flows (Systems → Backup Platform)
- Data extraction toward protected storage
- Integrity and confidentiality required
-
CI/CD & Automation (Gitea → Runners → Targets)
- High privilege operations
- Requires strict isolation and secret management
Security Considerations
-
Flows must be:
- authenticated
- encrypted
- restricted to necessary endpoints
-
Some flows must remain strictly unidirectional
4. Control & Monitoring Placement
Description
Security controls are not uniformly distributed across the architecture.
Observations
- Preventive controls are stronger at entry points (reverse proxy, firewall)
- Detection capabilities are being centralized in Hell
- Some areas still lack full visibility (transitional state)
Target State
- Centralized logging and detection
- Correlation of events across environments
- Improved coverage of critical assets and flows
5. Evolution Perspective
The current architecture reflects a transitional state.
Key evolutions include:
- stronger separation of public services
- stricter enforcement of trust boundaries
- full centralization of monitoring and logging
- improved isolation of administrative access
These changes aim to progressively reduce risk exposure while maintaining operational flexibility.
Current Maturity
At the current stage, architecture visualization is considered partially established.
Established
- high-level separation between Heaven and Hell
- identification of core trust zones
- initial mapping of critical flows
- basic understanding of exposure levels
In Progress
- precise mapping of all inter-zone communications
- alignment between documented flows and actual configurations
- integration of monitoring and control placement into architecture views
- consistency between architecture and risk documentation
Planned / Next Phase
- formal diagrams for each architecture view
- automated or version-controlled architecture mapping
- tighter linkage between architecture, risks, and controls
- support for audit and traceability use cases
This section will evolve as the architecture becomes more structured and fully documented.