Skip to main content

Assets Inventory Index

Purpose

This page provides a canonical and structured inventory of all assets within the Scheol Security Lab.

It is used to:

  • maintain a consistent view of the environment
  • support risk modeling and scenario construction
  • ensure traceability across risks, controls, validation and evidence
  • reflect the actual and planned state of the lab

Each asset is documented individually and serves as a reference point across the documentation.


Structure Overview

Assets are organized using the following dimensions:

  • Asset Type (Business / Infrastructure / Platform / Information)
  • Trust Zone (Hell / Heaven / Hybrid)
  • Status (Active / Planned / Transitional)
  • Exposure Level (Internal / Restricted / Public / Isolated)
  • Sensitivity (Low / Medium / High / Critical)

Business Assets

Asset IDNameStatusDescriptionLink
A-001Administrative AccessPlannedSecure and controlled administrative access to systems and infrastructureView
A-002Identity & Access ManagementPlannedAuthentication, identity management and access control mechanismsView
A-003Network Security & SegmentationActiveNetwork filtering, segmentation and exposure control across environmentsView
A-004Infrastructure HostingActiveUnderlying compute, virtualization and hosting environments (Hell & Heaven)View
A-005Application SecurityActiveSecurity of exposed applications, services and data processing layersView
A-006Monitoring & DetectionPlannedSecurity visibility, logging and detection of abnormal activityView
A-007Backup & RecoveryPlannedData protection, backup and restoration capabilitiesView
A-008Incident Response CapabilityPlannedDetection, analysis and response to security incidentsView
A-009Documentation & GovernanceActiveDocumentation structure, traceability and security reasoning supportView

Infrastructure Assets

Asset IDNameZoneTypeStatusExposureSensitivityRoleLink
A-020HypervisorHellPhysicalActiveInternalCriticalVirtualization hostView
A-021Firewall / IDSHellVMActiveRestrictedCriticalNetwork segmentation & filteringView
A-022BastionHellVMPlannedRestrictedCriticalSecure administrative access
A-023Admin WorkstationHellVMPlannedInternalHighAdministrative operations
A-024Domain Controller (AD/LDAP)HellVMPlannedInternalCriticalIdentity management
A-025DNS FilteringHellCTPlannedInternalHighDNS security and filtering
A-026Backup SystemHellCTPlannedInternalCriticalBackup management
A-027NASHellPhysicalPlannedInternalCriticalStorage and cold backups
A-028Internal Network SegmentationHellNetworkActiveInternalHighVLAN segmentationView
A-029Reverse ProxyHellCTPlannedExposedHighTLS termination & traffic routing
A-030Static Web ServerHellCTPlannedExposedLowStatic content hosting
A-031Dynamic Web ServerHellVMPlannedExposedHighApplication hosting & backend logic
A-032Ansible Control NodeHellVMPlannedInternalHighAutomation & configuration management
A-033Gitea ServerHellVMPlannedRestrictedHighSource code management & CI/CD
A-034Gitea RunnerHellCTPlannedInternalMediumCI/CD job execution
A-035WazuhHellVMPlannedInternalHighSIEM & threat detection
A-036TheHive + CortexHellVMPlannedInternalHighIncident response & analysis
A-037VelociraptorHellCTPlannedInternalHighDFIR & endpoint visibility
A-038Monitoring StackHellCTPlannedInternalMediumSystem monitoring & alerting
A-039HoneypotHellVMPlannedExposed (isolated)MediumThreat deception & analysis
A-050VPS-01 Public HostingHeavenVPSActive (Transitional)PublicHighMixed hosting (Gitea + web + proxy)View
A-051VPS-02 Business ApplicationHeavenVPSActive (Transitional)PublicCriticalERP hosting (Dolibarr + DB)View

Platform Assets

Asset IDNameZoneStatusExposureSensitivityRoleLink
A-060Gitea (Internal)HellPlannedInternalHighSCM & CI/CD
A-061Gitea (VPS-01)HeavenTransitionalPublicHighSCM exposedView
A-062Reverse Proxy (VPS-01)HeavenTransitionalPublicHighTraffic routing & TLSView
A-063Documentation SiteHeavenActivePublicLowPublic documentationView
A-064DolibarrHeavenTransitionalPublicCriticalBusiness applicationView
A-065Database (MariaDB - VPS-02)HeavenTransitionalRestrictedCriticalData storageView
A-066Wazuh (SIEM)HybridPlannedInternalHighDetection & loggingView
A-067TheHive / CortexHellPlannedInternalHighIncident response
A-068VelociraptorHellPlannedInternalHighDFIR / Threat hunting
A-069Monitoring StackHellPlannedInternalMediumObservability
A-070HoneypotHellPlannedIsolatedMediumThreat analysis
A-071Ansible Control NodeHellPlannedInternalHighAutomation
A-072Gitea RunnerHellPlannedInternalMediumCI/CD execution
A-073Internal Reverse ProxyHellPlannedRestrictedHighInternal routing
A-074Static Web ServerHellPlannedInternalLowStatic hosting
A-075Dynamic Web ServerHellPlannedInternalHighApplication hosting

Information Assets

Asset IDNameSensitivityExposureDescriptionLink
A-090Credentials & SecretsCriticalInternalSSH keys, passwords, tokensView
A-091Configuration DataHighInternalSystem and service configurationsView
A-092Backup DataCriticalInternalBackup archives and snapshots
A-093Log DataMedium / HighInternalSecurity and system logsView
A-094Business Data (Dolibarr)CriticalRestrictedCustomer and financial dataView

Key Observations

  • Heaven assets are intentionally exposed and transitional
  • Hell assets represent the target secure architecture
  • Several critical capabilities (IAM, SIEM, Bastion) are not yet deployed
  • Current posture includes known and accepted risk exposure

Governance Rules


Current Status

Established

  • Core infrastructure (Hypervisor, Firewall, VPS)
  • Public exposure model (Heaven)
  • Documentation platform

In Progress

  • Internal architecture deployment (Hell)
  • Identity, monitoring and backup capabilities
  • Asset-to-risk traceability

Planned

  • Full SOC stack (Wazuh, TheHive, Velociraptor)
  • Secure administrative model (Bastion, IAM)
  • Improved isolation and segmentation

Strategic Note

The current architecture reflects a controlled transitional state:

  • exposure is intentional and documented
  • risks are identified and tracked
  • target architecture is defined but not fully implemented

This approach supports both:

  • realistic risk modeling
  • progressive security maturity