Skip to content

cowajoba-cloud/secure-by-design-distributed-cloud-architectures

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

53 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” Secure-by-Design Distributed Cloud Architectures

A structured cybersecurity research project focused on designing, validating, and benchmarking detection capabilities in distributed cloud-native environments.


🧠 Research Journey

πŸ—οΈ Weeks 1–2: Architecture Design

  • Designed distributed cloud architecture
  • Defined trust boundaries

⚠️ Weeks 3–4: Threat Modelling

  • STRIDE analysis
  • Attack surface identification

πŸ›‘οΈ Weeks 5–6: Control Validation

  • Simulated SSH brute-force attacks
  • Validated Wazuh SIEM detection
  • Confirmed log ingestion and alerting

πŸ” Weeks 7–8: Detection Validation & Empirical Benchmarking

  • Verified end-to-end detection pipeline
  • Conducted attack simulations using Hydra
  • Validated SIEM detection behavior

πŸ“„ View Work:
docs/week7-8-detection-validation/


πŸ“š Weeks 9–10: Targeted Literature Review & Research Gap Identification

  • Reviewed research aligned with leading academics
  • Identified gaps in detection performance evaluation
  • Defined research problem direction

πŸ“„ View Work:
docs/week9-10-literature-review/


🎯 Research Direction

This project is evolving toward:

A reproducible framework for empirical detection benchmarking in distributed cloud systems


πŸ› οΈ Technologies

  • Wazuh SIEM
  • Kali Linux
  • Ubuntu Desktop
  • Hydra (attack simulation)
  • VirtualBox

πŸ“‚ Repository Structure

πŸ“ Lab01-SecureDistributedCloud
β”‚
β”œβ”€β”€ πŸ“„ README.md
β”‚
β”œβ”€β”€ πŸ“ docs
β”‚ β”‚
β”‚ β”œβ”€β”€ πŸ“ 00-research-assets
β”‚ β”‚ β”œβ”€β”€ πŸ“ diagrams
β”‚ β”‚ β”‚ β”œβ”€β”€ secure-cloud-architecture.drawio
β”‚ β”‚ β”‚ β”œβ”€β”€ week1-architecture-v1.1.png
β”‚ β”‚ β”‚ └── threat-model-attack-surface-week3.png
β”‚ β”‚ β”‚
β”‚ β”‚ └── πŸ“ screenshots
β”‚ β”‚     β”œβ”€β”€ πŸ“ week5-control-validation
β”‚ β”‚     β”œβ”€β”€ πŸ“ week6-extended-analysis
β”‚ β”‚     └── πŸ“ week7-8-detection-validation   βœ…
β”‚ β”‚
β”‚ β”œβ”€β”€ πŸ“ week1-2-architecture
β”‚ β”œβ”€β”€ πŸ“ week3-4-threat-modelling
β”‚ β”œβ”€β”€ πŸ“ week5-6-control-validation
β”‚ β”‚
β”‚ β”œβ”€β”€ πŸ“ week7-8-detection-validation   βœ…
β”‚ β”‚ └── week7-8-detection-validation.md
β”‚ β”‚
β”‚ └── πŸ“ week9-10-literature-review   βœ…
β”‚     └── week9-10-targeted-literature-review.md


# πŸ“„ Licence

Academic and research use.

---

# πŸ‘€  Author

Charles Owajoba  
Cybersecurity | Cloud Security | Detection Engineering  

---

# 🌍 Vision

Bridging the gap between:

> Secure system design  
and  
> measurable detection effectiveness

About

SECURE BY DESIGN DISTRIBUTED CLOUD ARCHITECTURES : This lab explores how secure-by-design architectural decisions can reduce systemic security risk in distributed cloud environments. The goal is to bridge the gap between: - academic secure systems theory, and - practical cloud security implementation. The work draws on cloud IAM, zero-trust

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors