CloudCore Security Documentation
Public Information
This section is available to everyone from Week 1.
CloudCore Networks is a cloud services provider based in Perth, Australia, serving over 150 SME clients with managed cloud infrastructure, cybersecurity services, and compliance consulting.
Company Overview
- Founded: 2010
- Employees: 85 across three locations
- Annual Revenue: $12.5M
- Key Services: Cloud infrastructure, managed security, compliance consulting
Our Commitment to Security
CloudCore Networks takes information security seriously. We are currently pursuing ISO 27001 certification to formalize our security management system.
Consultant Access Documentation
This section requires consultant access (Available Week 2+)
Information Security Policies
IS-POL-001: Information Security Policy
Version: 3.0
Last Updated: March 2023
Status: Approved by Board
Our Information Security Policy establishes the framework for protecting CloudCore Networks’ information assets and those of our clients.
Key Requirements: - All employees must complete annual security awareness training - Multi-factor authentication required for all administrative access - Data classification and handling procedures must be followed - Incident reporting within 24 hours of discovery
IS-POL-002: Access Control Policy
Version: 2.1
Last Updated: January 2022 (Note: Overdue for review)
Status: Under Review
This policy defines access control requirements for all CloudCore systems and facilities.
Access Control Principles: - Least privilege access - Separation of duties - Regular access reviews (quarterly) - Immediate revocation upon termination
Risk Assessment Summary
Risk ID | Risk Description | Likelihood | Impact | Rating |
---|---|---|---|---|
R001 | Data breach via compromised credentials | High | Critical | High |
R002 | Ransomware attack | Medium | Critical | High |
R003 | Insider threat | Low | High | Medium |
R004 | Third-party vendor compromise | Medium | Medium | Medium |
R005 | Physical security breach | Low | Medium | Low |
Organizational Structure
graph TD
CEO[CEO - Sarah Thompson]
CEO --> CTO[CTO - Dr. Amina Chowdhury]
CEO --> CFO[CFO - Aisha Rahman]
CEO --> CISO[CISO - Sophia Martines]
CTO --> DEV[Lead Developer<br/>Michael Thompson]
CTO --> INFRA[Infrastructure Architect<br/>David Wilson]
CISO --> SEC[Security Compliance<br/>Samuel Torres]
CISO --> IT[IT Manager<br/>Raj Patel]
CFO --> FIN[Finance Team]
CFO --> HR[HR Manager<br/>Karen Lee]
Previous Audit Findings
2023 External Audit Summary: - 3 Critical findings (unpatched systems, weak passwords, no MFA) - 7 Major findings (policy gaps, training deficiencies) - 12 Minor findings (documentation issues) - Certification readiness: 45%
Full Audit Evidence
This section requires auditor access (Available Week 9+)
🚨 CRITICAL FINDINGS
Finding #1: Password Policy Not Enforced
Evidence Location: /audit/evidence/password_audit.xlsx
Despite Policy IS-POL-001 requiring complex passwords changed every 90 days, system configuration shows: - Password complexity: DISABLED - Password age: NO MAXIMUM - Screenshot evidence: View Configuration
Employee Interview - IT Manager Raj Patel: > “We had to disable the password policy because the executives complained too much. The CEO’s password has been ‘CloudCore123’ for two years.”
Finding #2: Multi-Factor Authentication Bypass
Evidence Location: /audit/evidence/mfa_gaps.csv
Analysis of access logs reveals: - 47 administrative accounts without MFA - 23 service accounts with permanent tokens - VPN access allows MFA bypass with “legacy mode”
System Configuration Screenshot:
Finding #3: Unreported Data Breach
Evidence Location: /audit/evidence/incident_IR2024_003.pdf
Internal emails reveal a data breach in March 2024 that was never reported: - 10,000 customer records exposed - Ransomware group “DarkVault” claimed responsibility - Management decided to pay ransom quietly - No customer notification sent
Email Evidence:
From: [email protected]
To: [email protected]
Date: March 15, 2024
Subject: RE: Incident
"Let's keep this quiet. Pay them and move on.
We can't afford the reputation hit right now."
System Configuration Evidence
Firewall Configuration Issues
# Extracted from firewall_config_backup.conf
permit any any 0.0.0.0/0 3389 # RDP open to internet!
permit any any 0.0.0.0/0 445 # SMB open to internet!
permit any any 0.0.0.0/0 139 # NetBIOS open to internet!
Backup System Failures
Last Successful Backup: 47 days ago
Backup Test Log: No tests performed in 2 years
Recovery Time Objective: 4 hours (impossible with current system)
Employee Interview Transcripts
Interview: Samantha Wong (Customer Support Lead)
Date: Week 10
Interviewer: Audit Team
Q: How often do you receive security training? > “Training? We did something when I started 2 years ago. It was just clicking through slides. Nobody pays attention.”
Q: What happens when a customer reports a security concern? > “We’re told to reassure them everything is fine and escalate to management. We’re specifically told NOT to admit any issues.”
Interview: Michael Thompson (Lead Developer)
Date: Week 10
Interviewer: Audit Team
Q: How is code reviewed before deployment? > “Review? We push straight to production. The CEO wants features delivered fast. Security scans slow us down, so we disabled them last year.”
Q: Are you aware of any vulnerabilities in production? > “Oh definitely. We have SQL injection vulnerabilities in at least three applications. We’ll fix them ‘someday’ when we have time.”
Log Analysis Results
Failed Login Attempts (Last 30 Days)
Total attempts: 47,832
Unique IPs: 3,241
Success rate: 0.3%
Accounts targeted: admin, administrator, root, cloudcore
Action taken: NONE - No alerting configured
Privilege Escalation Events
Date: 2024-10-15 03:47:22
User: temp_intern_2023
Action: Added to Domain Admins
Authorized by: [No approval record]
Status: Still active admin
Third-Party Vendor Risks
Critical Vendor: CheapDevShop - Handles: Core application development - Security assessment: Never performed - Location: Unknown (possibly overseas) - Access level: Full production access - Password: “contractor123” (shared among 15 developers)
Incident Response Test Results
Tabletop Exercise Date: Week 11
Scenario: Ransomware attack
Results: - Time to detect: Would take 72+ hours (no monitoring) - Time to respond: Unable to determine (no clear procedures) - Communication plan: Non-existent - Backup recovery: Failed (backups corrupted) - Business impact: Total business failure likely
Compliance Gap Analysis
ISO 27001 Control | Status | Evidence |
---|---|---|
A.9.1.1 Access control policy | ❌ Failed | Policy exists but not enforced |
A.9.4.2 Secure log-on | ❌ Failed | MFA optional, weak passwords |
A.12.1.1 Operational procedures | ⚠️ Partial | Documented but not followed |
A.12.3.1 Backup | ❌ Failed | Backups failing for 47 days |
A.16.1.1 Incident response | ❌ Failed | Breach not reported |
A.18.1.1 Compliance | ❌ Failed | Multiple regulatory violations |
Access Information
How to Request Access
Click on the access indicator in the top-right corner of this page, or click the “Request Access” buttons in restricted sections.
Access Schedule:
- Week 1: Public access only
- Week 2-8: Consultant access available (password required)
- Week 9+: Full audit access available (password required)
Testing Access Levels
For testing purposes, you can use these controls: