Deploying SecOps Defense with IoC Database Capability
Deploying SecOps Defense with IoC Database Capability. Gather, triage, attack and distribute indicators of compromise to protect users.
How to Build and Deploy a Full Stack Scam Reporting App with Rails
This guide will walk you through setting up, running, and deploying a full-stack scam reporting application built with Ruby on Rails. The app allows users to report Indicators of Compromise (IOCs), track progress, attach evidence, and collaborate on cases.
Features
- Report and track IOCs with multiple API integrations
- More efficient than spreadsheets
- Allows unauthorized users to submit IOCs
- Supports evidence attachment and tracking
- Enables multiple users to work on the same IOC
1. Importing CSV Data into PostgreSQL
To import CSV data into Postgres, ensure that:
- Empty cells are set as
null
- Placeholder timestamps for
created_at
andupdated_at
exist if none are provided - Column order matches the table structure
Steps:
- Access PostgreSQL on Heroku:
1
heroku pg:psql -a scam-hitlist
- Run the following command:
1
\copy iocs(id,url,created_at,updated_at,removed_date,status,report_method_one,report_method_two,form,host,follow_up_date,follow_up_count,comments) FROM './lib/data.csv' WITH DELIMITER ',' NULL AS 'null' CSV HEADER;
- Success message:
copy 7000
(or similar number)
2. Setup
- Install dependencies:
1
bundle install
- Set up the database:
1
rails db:drop db:create db:migrate db:seed
3. Running the App
- Start the server and run JavaScript:
1
dev
- If front-end features are missing, compile assets:
1
rails assets:precompile
4. Database Configuration
After seeding the database, manually update the next ID:
1
2
3
highest_id = Ioc.maximum(:id)
next_available_id = highest_id + 1
ActiveRecord::Base.connection.execute("SELECT setval('iocs_id_seq', #{next_available_id}, false)")
To reset the database sequence:
1
heroku restart; heroku pg:reset DATABASE --confirm APP-NAME; heroku run rake db:migrate
5. Deploying to Heroku
Add Required Buildpacks
- Chrome:
1
heroku buildpacks:add heroku/google-chrome --index=1
- Node.js:
1
heroku buildpacks:add heroku/nodejs --index=2
- Puppeteer (optional):
1
heroku buildpacks:add jontewks/puppeteer --index=3
- Set the environment variable:
1
heroku config:set PUPPETEER_SKIP_DOWNLOAD=true [--remote yourappname]
Configure Grover in config/initializers/grover.rb
:
1
2
3
4
5
Grover.configure do |config|
config.options = {
executable_path: "google-chrome"
}
end
6. Security Features
- File validation: Limits file size to 5MB, only allows PDFs, .eml, JPEG, PNG, and TXT
- Sanitization: Removes XSS attacks from form inputs
- Strong parameters
- CSRF meta tags
- Strong hash algorithm for cookie signatures (SHA-256)
- No
open-uri
,Marshal
,html_safe
, orraw
methods - Omniauth restricted to two Google Enterprise accounts
- Route limiting
- Automated security checks:
bundler-audit
for dependenciesbrakeman
for code reviewOSWAP dependency check
7. Testing
- Use RSpec for controller tests
- Create model instances before testing
- Use
let
to define variables in tests
8. Docker Setup
- Reset the highest IOC ID (see Database Setup section)
- Run locally:
1
docker-compose build && docker-compose up
- Build and push to Docker Hub:
1 2
docker build -t yourusername/scam-hitlist:latest . docker push yourusername/scam-hitlist:latest
- Access the Rails console inside the container:
1 2
docker container ps docker exec -it <container ID> bin/rails c
9. Deploying to AWS
Steps:
- Deploy to Amazon ECR:
- Ensure Docker is running
- Tag and push to AWS repository:
1 2
docker tag <name> <aws_repo_name> docker push <aws_repo_name>
- Create Kubernetes Cluster:
1
eksctl create cluster --region your-region --name root --managed
- Create RDS Database:
- Use Free Tier with port
5432
- Assign security groups to allow container access
- Use Free Tier with port
- Set Database Credentials in Kubernetes:
1 2
echo -n "<username>" | base64 echo -n "<password>" | base64
- Store values in a YAML file and create a secret:
1
kubectl create -f secrets.yaml
- Store values in a YAML file and create a secret:
- Deploy the App in Kubernetes:
1 2
kubectl create -f deployment.yaml kubectl get pods
Access Console in Kubernetes:
1
kubectl exec -it <pod ID> -- /bin/bash
For Alpine:
1
kubectl exec -it <pod ID> -- /bin/sh
Migrate and Seed the Database:
1
2
bundle exec rake db:migrate
bundle exec rake db:seed
Conclusion
By following this guide, you can successfully set up, run, and deploy your scam reporting Rails app on Heroku, Docker, and AWS. This ensures efficient reporting, tracking, and management of IOCs with a scalable and secure infrastructure.