Skip to main content

System Inventory

Purpose

Provide a structured and operational view of all technical systems deployed in Scheol Security Lab.

This inventory reflects the actual implementation state of the environment and complements the asset model by mapping concrete systems to:

  • infrastructure and platform assets
  • exposure levels and trust zones
  • associated risks and controls

Scope

The inventory covers both:

  • Hell (on-premise infrastructure)
  • Heaven (external / VPS infrastructure)

Each system is described with its role, exposure level and sensitivity.


Hell - On-Premise Infrastructure

Core Infrastructure

SystemTypeRoleExposureSensitivityStatus
Hypervisor (Proxmox)PhysicalVirtualization hostInternalCriticalActive
Firewall / IDS (OPNsense)VMNetwork filtering, VLAN segmentation, intrusion detectionEdgeCriticalActive
  • R-001 - Service co-location and weak isolation risk
  • R-004 - Backup integrity or availability failure
  • R-002 - Network misconfiguration exposing internal services
  • R-008 - Logging and detection blind spots

Administrative Layer

SystemTypeRoleExposureSensitivityStatus
BastionVMControlled administrative access (SSH jump host)RestrictedCriticalPlanned
Admin WorkstationVMDedicated administration environmentInternalHighPlanned
  • R-003 - Compromise of administrative access path
  • R-005 - Credential theft and privilege escalation

Identity & Core Services

SystemTypeRoleExposureSensitivityStatus
Domain Controller (AD/LDAP)VMIdentity management, authentication, DNSInternalCriticalPlanned
DNS FilteringCTSecure name resolution, threat filteringInternalHighPlanned
  • R-006 - Identity system compromise (AD/LDAP)
  • R-005 - Credential theft and privilege escalation

Operations & Support Services

SystemTypeRoleExposureSensitivityStatus
Backup PlatformCTBackup and restore operationsInternalCriticalPlanned
Ansible Control NodeVMConfiguration management and automationInternalHighPlanned
Gitea (internal)VMSource code managementInternalHighPlanned
Gitea RunnerCTCI/CD execution environmentInternalMediumPlanned
  • R-004 - Backup integrity or availability failure
  • R-009 - CI/CD pipeline compromise
  • R-005 - Credential theft and privilege escalation

Application & Delivery Layer

SystemTypeRoleExposureSensitivityStatus
Reverse ProxyCTTLS termination, routing, access controlInternal / EdgeHighPlanned
Static Web ServerCTDocumentation and static content hostingInternalLowPlanned
Dynamic App ServerVMApplication hosting (web apps, APIs, DB)InternalHighPlanned

Security & Monitoring

SystemTypeRoleExposureSensitivityStatus
WazuhVMSIEM, detection, FIMInternalHighPlanned
TheHive + CortexVMIncident response and analysisInternalHighPlanned
VelociraptorCTEndpoint forensics and threat huntingInternalHighPlanned
Monitoring StackCTHealth monitoring and alertingInternalMediumPlanned
HoneypotVMThreat observation and deceptionIsolatedMediumPlanned
  • R-008 - Logging and detection blind spots

Storage Layer

SystemTypeRoleExposureSensitivityStatus
NASPhysicalBackup storage and archivesInternalCriticalPlanned

Heaven - External Infrastructure

VPS-01 - Public Services Platform

SystemTypeRoleExposureSensitivityStatus
Reverse Proxy (Nginx)ServiceEntry point for HTTP/HTTPS trafficInternetHighActive
Documentation Sites (Docusaurus)ServicePublic documentation hostingInternetLowActive
GiteaServiceSource code managementInternetHighActive
  • R-001 - Service co-location and weak isolation risk
  • R-009 - CI/CD pipeline compromise
  • R-005 - Credential theft and privilege escalation

Notes

  • Mixed exposure: public content + sensitive service (Gitea)
  • Current co-location introduces lateral movement risk
  • CI/CD pipelines trigger deployments from this system

VPS-02 - Business Application (Dolibarr)

SystemTypeRoleExposureSensitivityStatus
NginxServiceWeb serverInternetHighActive
Dolibarr (PHP-FPM)ServiceERP / business applicationInternetCriticalActive
MariaDBServiceApplication databaseLocal / PrivateCriticalActive
  • R-007 - Web application compromise (RCE / SQLi)
  • R-010 - Data exfiltration from business applications
  • R-001 - Service co-location and weak isolation risk

Notes

  • Single-host architecture (app + DB)
  • No advanced network isolation at this stage
  • Sensitive data concentration (clients, financial data)

Cross-Environment Relationships

Key interactions between systems include:

  • Log forwarding: Heaven → Hell (planned via Wazuh)
  • Administrative access: Admin workstation → Bastion → Targets
  • CI/CD flows: Gitea → runners → deployment targets
  • Backup flows: Systems → backup platform (Hell)

These relationships are further detailed in:

  • Architecture Views
  • Risk Scenarios
  • Control Mapping

Relationship with Asset Model

Each system documented here maps to:

  • Infrastructure assets (compute, network, storage)
  • Platform assets (identity, monitoring, automation)
  • Information assets (logs, credentials, configurations, data)

This mapping supports:

  • risk scenario construction
  • control definition
  • monitoring and validation strategies

Current Maturity

At the current stage, system inventory is considered partially established.

Established

  • clear identification of core infrastructure components (Hell / Heaven)
  • initial classification of systems by role, exposure and sensitivity
  • documentation of key externally exposed services
  • high-level mapping of critical dependencies

In Progress

  • deployment of planned internal services
  • refinement of exposure levels and trust boundaries
  • stronger linkage with asset catalogue and risk scenarios
  • improved consistency across all system descriptions

Planned / Next Phase

  • full alignment between system inventory and asset model
  • integration with monitoring and control validation
  • automated or version-controlled inventory updates
  • improved traceability between systems, risks and controls

This inventory is expected to evolve alongside the infrastructure and its security maturity.