Skip to main content

Public Infrastructure Platform

Description

The Public Infrastructure Platform represents externally hosted infrastructure resources used by the Scheol Lab environment. It provides network connectivity, hosting services, and access to public-facing applications, enabling experimentation and external service simulation.


Asset Identification

AttributeValue
Asset IDPLT-EXT-01
CI TypePlatform
Asset NamePublic Infrastructure Platform
Asset CategoryExternal Infrastructure
OwnerOperations Role (Ops)
StatusActive
LocationPublic VPS
Primary FunctionHosting of external services, supporting public-facing platforms

Asset Dependencies

Dependency TypeAssetStatus
InfrastructurePublic VPSActive
PlatformProxmox Virtualization PlatformPlanned
PlatformNetwork Security PlatformPlanned

Relationships

RelationshipTarget CI
SupportsPublic-facing applications
Depends onInternal platform services (Proxmox, Network Security)
SupportsTesting and development of internet-facing services

Asset Classification

CriteriaLevel
Confidentiality🟨 Medium
Integrity🟥 High
Availability🟥 High

Criticality score: 🟥 High

Rationale:

  • Integrity is critical to ensure that externally hosted services function correctly and reliably.
  • Availability is essential for public-facing experimentation and service continuity.
  • Confidentiality is medium: public infrastructure typically does not store sensitive internal data, but some configuration and access credentials must be protected.

Responsibilities

RoleResponsibility
Operations Role (Ops)Management and monitoring of public infrastructure, service provisioning
Security Role (Sec)Hardening, access control, monitoring integration

Security Controls (High-Level)

  • Access control for service interfaces
  • Secure configuration of hosted infrastructure
  • Integration with monitoring and logging solutions
  • Regular patching and updates for externally hosted services

Security Considerations

Main risks associated with this asset include:

  • Misconfiguration leading to public exposure of sensitive services
  • Service outages or downtime impacting dependent platforms
  • Unauthorized access or compromise of hosted services

Mitigation measures may include:

  • Strict access control and credential management
  • Network and service monitoring
  • Regular updates and vulnerability management
  • Clear dependency mapping with internal platforms

Methodological References:

  • ISO 27001 - Control 8.3 Information access restriction ; Control 8.16 Monitoring activities ; Control 8.20 Network security.
  • NIST CSF - PR.PT Protective Technology ; PR.AC Access Control ; DE.CM Continuous Monitoring.
  • EBIOS RM - Public-facing infrastructure platforms as critical exposure assets.