Custom Security Auditing Tool for Dell EMC ECS S3 Buckets Using Elasticsearch + Kibana

Custom Security Auditing Tool for Dell EMC ECS S3 Buckets Using Elasticsearch + Kibana

Introduction Dell EMC ECS (Elastic Cloud Storage) provides enterprise-grade S3-compatible object storage. However, native auditing and visibility into S3 bucket activity are often limited. To solve this, we developed a custom security auditing tool that collects, parses, and visualizes S3 bucket activity logs from ECS using Elasticsearch and Kibana. The Challenge The Solution ⚙️Data Ingestion Read more…

Building a Centralized Patch Management Workflow for Multi-OS Infrastructure

Building a Centralized Patch Management Workflow for Multi-OS Infrastructure

Introduction Managing patches across multiple operating systems in air-gapped environments is a complex and often overlooked challenge. In this project, we designed and implemented a cost-effective, fully automated patch management solutionfor a large infrastructure running RHEL, Ubuntu, Debian, and AIX, without internet access. The Challenge The Solution 🔧Architecture Design 🛠️Custom Ansible Roles Read more…

Designing and Implementing CI:CD:CS Infrastructure Using GitLab On-Prem and Nessus Pro

Designing and Implementing CI/CD/CS Infrastructure Using GitLab On-Prem and Nessus Pro

Introduction Software delivery speed and security are no longer separate concerns – they must coexist. In this project, we designed and implemented a complete CI/CD/CS pipeline using GitLab self-hosted and Nessus Pro, delivering automated code deployment and continuous security auditing. This hybrid approach helped development, operations, and security teams collaborate more efficiently – all under one unified Read more…

Designing a Custom Automatic Backup Solution for Multi-Vendor Network Devices

Designing a Custom Automatic Backup Solution for Multi-Vendor Network Devices

Introduction Configuration drift, human error, and hardware failure can result in network outages that are hard to recover from – especially in environments with equipment from multiple vendors. To mitigate these risks, we designed and implemented a custom automated backup system for routers, switches, and firewalls from various manufacturers, ensuring reliable, versioned, and auditable Read more…

Developing a Security Solution for DNS Subdomain Takeover – Multi-Provider Integration

Developing a Security Solution for DNS Subdomain Takeover – Multi-Provider Integration

Introduction DNS subdomain takeover remains one of the most overlooked but dangerous attack vectors, especially in organizations using cloud services or CI/CD workflows that dynamically manage DNS records. In this project, we developed a custom, provider-agnostic solution to detect and prevent subdomain takeover across all major DNS and cloud hosting providers. The Challenge The Read more…

Real-Time Security Analytics – Grafana Dashboard Integration with Wazuh

Real-Time Security Analytics – Grafana Dashboard Integration with Wazuh

Introduction In today’s cybersecurity landscape, visibility is everything. As part of a SOC enhancement initiative, we designed and implemented a custom Grafana dashboard integrated with Wazuh, providing real-time insight into threats, authentication anomalies, and network behavior – all mapped to industry standards like MITRE ATT&CK. This solution has drastically improved the threat detection and Read more…

First CRIF Solution Deployment on Kubernetes Using Helm

First CRIF Solution Deployment on Kubernetes Using Helm

Introduction CRIF, a global leader in credit and business information systems, traditionally deployed its core solution in monolithic environments. We were responsible for designing and implementing their first Kubernetes-based deployment, using Helm for automation, scalability, and portability. This was a pioneering implementation – the first time CRIF’s platform was launched on Kubernetes anywhere Read more…

Migrating from AWS to GCP – Building a Resilient and Scalable Cloud Infrastructure

Migrating from AWS to GCP – Building a Resilient and Scalable Cloud Infrastructure

Introduction Migrating infrastructure between cloud providers is not only about changing platforms – it’s about redesigning for performance, availability, and observability. This case study details how we transitioned a legacy system from AWS to GCP, modernizing the full stack while respecting budget constraints. The Challenge The client’s existing setup on AWS Read more…

Implementing Ascertia TSA – Digital Signature Integrity with eIDAS Compliance

Implementing Ascertia TSA – Digital Signature Integrity with eIDAS Compliance

Introduction Organizations that issue or verify digital documents often need trusted timestamps for regulatory compliance and long-term integrity. This case study covers our deployment of Ascertia ADSS TSA for an enterprise that handles high-volume digital signatures. The Challenge The client lacked a Timestamping Authority (TSA), exposing them to legal risk in verifying when documents were Read more…