.. include:: global.rst
======================================================================
Regional Insurance Group: Secure Remote Access & SIEM Implementation
======================================================================
Overview
========
This project represents the final phase of a multi-part network redesign for a fictional organization, *Regional Insurance Group*. Building on prior work in network architecture redesign and infrastructure planning, this phase focuses on implementing secure remote access and centralized security monitoring.
The primary objectives of this project include:
- Deploying a secure and scalable VPN solution for remote employees
- Implementing a Security Information and Event Management (SIEM) system
- Enhancing threat detection, monitoring, and incident response capabilities
- Supporting compliance and long-term security scalability
.. note::
This project builds on previous portfolio entries:
- :doc:`lab_five`
VPN Implementation
==================
To support a distributed workforce, an **SSL/TLS-based VPN solution** was selected as the primary remote access method.
**Key Features:**
- Browser-based access (no client installation required)
- Strong encryption using TLS protocols
- High compatibility with firewalls (HTTPS-based communication)
- Granular access control to limit exposure of internal resources
- Scalable design to accommodate organizational growth
**Security Enhancements:**
- Multi-Factor Authentication (MFA)
- Zero Trust Network Access (ZTNA) principles
- Endpoint compliance validation (patching, antivirus)
This approach ensures secure, flexible access for remote users while minimizing administrative overhead and security risks.
VPN Writeup
=============
.. raw:: html
SIEM Implementation
===================
To improve visibility and incident response, **Splunk Enterprise Security** was selected as the SIEM platform.
**Rationale for Selection:**
- Strong log aggregation and real-time analysis capabilities
- Advanced correlation engine for threat detection
- Compatibility with diverse log sources (VPN, firewall, servers)
- Integration with MITRE ATT&CK framework
- Scalable and well-documented platform
**Security Objectives Supported:**
- Centralized log management
- Threat detection and response
- Monitoring of remote access activity
- Incident investigation and forensic analysis
- Reduced response time through automated alerts
Data Sources Integrated
=======================
The SIEM aggregates logs from multiple sources to provide comprehensive visibility:
- Firewall logs
- VPN logs
- Server logs
- Endpoint security tools
- Network devices (routers and switches)
- Active Directory logs
- Web server logs
This centralized approach enables correlation across systems and improves detection accuracy.
Detection Rules and Alerting
============================
Custom detection rules were developed to identify suspicious activity across multiple domains:
**Authentication Monitoring:**
- Multiple failed login attempts (brute force detection)
- Logins outside normal working hours
- Privileged account misuse
**Network Activity Monitoring:**
- Unusual outbound traffic patterns
- Communication with malicious IP addresses
- Port scanning behavior
**VPN-Specific Monitoring:**
- Repeated failed VPN login attempts
- Simultaneous logins from different geographic locations
- Connections from suspicious or blacklisted IPs
**Data Exfiltration Detection:**
- Large or abnormal data transfers
- Unusual file access patterns
Alert Severity Levels
=====================
Alerts are categorized to prioritize response efforts:
- **Critical:** Confirmed intrusions, malware, unauthorized privileged access
- **High:** Brute force attempts, suspicious VPN activity
- **Medium:** Policy violations, unusual traffic patterns
- **Low:** Informational or audit-related events
Alert delivery methods include email notifications, system alerts, and SMS for critical incidents.
Results and Impact
==================
The implementation significantly improves the organization's security posture by:
- Increasing visibility across the entire network
- Enabling faster detection and response to threats
- Securing remote workforce access
- Supporting compliance and audit readiness
- Providing a scalable foundation for future security enhancements
.. raw:: html
Conclusion
==========
This project demonstrates the integration of secure remote access with advanced monitoring capabilities. By combining an SSL/TLS VPN with a robust SIEM platform, Regional Insurance Group achieves a layered security approach aligned with modern cybersecurity best practices.
The solution is designed to scale with organizational growth while maintaining strong protection against evolving threats.