Skip to main content

Improvement Backlog

Purpose

This page provides a centralized view of all identified security improvements within the Scheol Security Lab.

The objective is to:

  • track security weaknesses and improvement opportunities
  • prioritize remediation efforts based on risk
  • ensure no identified issue is left unaddressed
  • maintain visibility on ongoing and planned actions

This backlog reflects the actual state of the lab, not an ideal or target architecture.


Backlog Model

Each entry represents a concrete finding or improvement need.

Fields

FieldDescription
IDUnique identifier (IMP-XXX)
IssueShort description of the problem
SourceWhere the issue was identified
Related Risk(s)R-XXX
PriorityHigh / Medium / Low
StatusOpen / In Progress / Done
OwnerSec / Ops / Dev
NotesContext, decisions, constraints

Improvement Backlog

High Priority

IDIssueSourceRiskStatusOwnerNotes
IMP-001Reverse proxy may expose unintended internal services due to configuration gapsResidual Gaps / ArchitectureR-001OpenOpsRequires strict routing rules and validation
IMP-002No centralized logging across Heaven and Hell environmentsDetection GapsR-001, R-002, R-003In ProgressSecWazuh planned but not yet deployed
IMP-003Administrative access not enforced through bastionControl Status / ArchitectureR-003OpenOpsDirect access still possible
IMP-004MFA not consistently enforced on sensitive servicesControl StatusR-003In ProgressSecPartial deployment, needs standardization

Medium Priority

IDIssueSourceRiskStatusOwnerNotes
IMP-005Co-location of multiple services on public VPS increases lateral movement riskSecurity Design DecisionR-001, R-002OpenOpsSeparation planned in future phases
IMP-006Backup strategy relies on provider snapshots onlyResidual GapsR-002OpenOpsNo external or immutable backups yet
IMP-007Limited validation of detection capabilities (no systematic scenarios executed)Validation & MonitoringR-001, R-002, R-003OpenSecNeeds initial scenario execution

Low Priority

IDIssueSourceRiskStatusOwnerNotes
IMP-008Documentation and implementation may diverge over timeEvidence ReviewR-001, R-002, R-003OpenSecRequires periodic review
IMP-009No formal evidence freshness or review policyAudit & EvidenceR-002OpenSecCan be added after initial evidence collection

Status Definition

StatusDescription
OpenIdentified but not yet started
In ProgressActively being worked on
DoneImplemented and validated

Prioritization Logic

Priority is determined based on:

  • risk exposure (linked R-XXX)
  • attack surface (public vs internal)
  • impact on critical assets
  • dependency on other improvements

High priority items should focus on:

  • exposed services
  • administrative access
  • visibility and detection gaps

Relationship with Other Sections

The backlog is fed by:

  • Residual Gaps
  • Control Status
  • Validation & Monitoring
  • Known Detection Gaps
  • Architecture & Design Decisions

And impacts:

  • Control implementation
  • Architecture evolution
  • Validation priorities
  • Roadmap (Next Phase)

Governance Rule

No identified issue should exist outside this backlog.

If a gap is identified, it must be:

  • added to the backlog
  • prioritized
  • tracked until resolution or explicit acceptance

Current State

At the current stage:

  • backlog is manually maintained
  • prioritization is qualitative
  • coverage focuses on R-001 to R-003
  • some improvements are planned but not yet started

Objective

The goal is to maintain a living and actionable backlog that reflects:

  • real weaknesses
  • real priorities
  • real progress

This page is the primary driver of security improvement within the Scheol Security Lab.