Post

Deploying SecOps Defense with IoC Database Capability

Deploying SecOps Defense with IoC Database Capability. Gather, triage, attack and distribute indicators of compromise to protect users.

Deploying SecOps Defense with IoC Database Capability

How to Build and Deploy a Full Stack Scam Reporting App with Rails

This guide will walk you through setting up, running, and deploying a full-stack scam reporting application built with Ruby on Rails. The app allows users to report Indicators of Compromise (IOCs), track progress, attach evidence, and collaborate on cases.

Features

  • Report and track IOCs with multiple API integrations
  • More efficient than spreadsheets
  • Allows unauthorized users to submit IOCs
  • Supports evidence attachment and tracking
  • Enables multiple users to work on the same IOC

1. Importing CSV Data into PostgreSQL

To import CSV data into Postgres, ensure that:

  • Empty cells are set as null
  • Placeholder timestamps for created_at and updated_at exist if none are provided
  • Column order matches the table structure

Steps:

  1. Access PostgreSQL on Heroku:
    1
    
    heroku pg:psql -a scam-hitlist
    
  2. Run the following command:
    1
    
    \copy iocs(id,url,created_at,updated_at,removed_date,status,report_method_one,report_method_two,form,host,follow_up_date,follow_up_count,comments) FROM './lib/data.csv' WITH DELIMITER ',' NULL AS 'null' CSV HEADER;
    
  3. Success message: copy 7000 (or similar number)

2. Setup

  1. Install dependencies:
    1
    
    bundle install
    
  2. Set up the database:
    1
    
    rails db:drop db:create db:migrate db:seed
    

3. Running the App

  1. Start the server and run JavaScript:
    1
    
    dev
    
  2. If front-end features are missing, compile assets:
    1
    
    rails assets:precompile
    

4. Database Configuration

After seeding the database, manually update the next ID:

1
2
3
highest_id = Ioc.maximum(:id)
next_available_id = highest_id + 1
ActiveRecord::Base.connection.execute("SELECT setval('iocs_id_seq', #{next_available_id}, false)")

To reset the database sequence:

1
heroku restart; heroku pg:reset DATABASE --confirm APP-NAME; heroku run rake db:migrate

5. Deploying to Heroku

Add Required Buildpacks

  1. Chrome:
    1
    
    heroku buildpacks:add heroku/google-chrome --index=1
    
  2. Node.js:
    1
    
    heroku buildpacks:add heroku/nodejs --index=2
    
  3. Puppeteer (optional):
    1
    
    heroku buildpacks:add jontewks/puppeteer --index=3
    
  4. Set the environment variable:
    1
    
    heroku config:set PUPPETEER_SKIP_DOWNLOAD=true [--remote yourappname]
    

Configure Grover in config/initializers/grover.rb:

1
2
3
4
5
Grover.configure do |config|
  config.options = {
    executable_path: "google-chrome"
  }
end

6. Security Features

  • File validation: Limits file size to 5MB, only allows PDFs, .eml, JPEG, PNG, and TXT
  • Sanitization: Removes XSS attacks from form inputs
  • Strong parameters
  • CSRF meta tags
  • Strong hash algorithm for cookie signatures (SHA-256)
  • No open-uri, Marshal, html_safe, or raw methods
  • Omniauth restricted to two Google Enterprise accounts
  • Route limiting
  • Automated security checks:
    • bundler-audit for dependencies
    • brakeman for code review
    • OSWAP dependency check

7. Testing

  • Use RSpec for controller tests
  • Create model instances before testing
  • Use let to define variables in tests

8. Docker Setup

  1. Reset the highest IOC ID (see Database Setup section)
  2. Run locally:
    1
    
    docker-compose build && docker-compose up
    
  3. Build and push to Docker Hub:
    1
    2
    
    docker build -t yourusername/scam-hitlist:latest .
    docker push yourusername/scam-hitlist:latest
    
  4. Access the Rails console inside the container:
    1
    2
    
    docker container ps
    docker exec -it <container ID> bin/rails c
    

9. Deploying to AWS

Steps:

  1. Deploy to Amazon ECR:
    • Ensure Docker is running
    • Tag and push to AWS repository:
      1
      2
      
      docker tag <name> <aws_repo_name>
      docker push <aws_repo_name>
      
  2. Create Kubernetes Cluster:
    1
    
    eksctl create cluster --region your-region --name root --managed
    
  3. Create RDS Database:
    • Use Free Tier with port 5432
    • Assign security groups to allow container access
  4. Set Database Credentials in Kubernetes:
    1
    2
    
    echo -n "<username>" | base64
    echo -n "<password>" | base64
    
    • Store values in a YAML file and create a secret:
      1
      
      kubectl create -f secrets.yaml
      
  5. Deploy the App in Kubernetes:
    1
    2
    
    kubectl create -f deployment.yaml
    kubectl get pods
    

Access Console in Kubernetes:

1
kubectl exec -it <pod ID> -- /bin/bash

For Alpine:

1
kubectl exec -it <pod ID> -- /bin/sh

Migrate and Seed the Database:

1
2
bundle exec rake db:migrate
bundle exec rake db:seed

Conclusion

By following this guide, you can successfully set up, run, and deploy your scam reporting Rails app on Heroku, Docker, and AWS. This ensures efficient reporting, tracking, and management of IOCs with a scalable and secure infrastructure.

All rights reserved by the author.