Initial commit: Cloudflare infrastructure with WAF Intelligence

- Complete Cloudflare Terraform configuration (DNS, WAF, tunnels, access)
- WAF Intelligence MCP server with threat analysis and ML classification
- GitOps automation with PR workflows and drift detection
- Observatory monitoring stack with Prometheus/Grafana
- IDE operator rules for governed development
- Security playbooks and compliance frameworks
- Autonomous remediation and state reconciliation
This commit is contained in:
Vault Sovereign
2025-12-16 18:31:53 +00:00
commit 37a867c485
123 changed files with 25407 additions and 0 deletions

View File

@@ -0,0 +1,158 @@
# Web-Infrastructure Security Patterns (Cloudflare Operations)
## 1. Identity & Access Hardening
Patterns across:
- Login / 2FA pages
- Password reset flow
- API tokens page
- Profile preferences
**Emergent pattern:**
Strong account-level security signals: MFA, controlled API tokens, isolated profiles. Cloudflare strongly encourages short-lived scoped tokens → aligns with VaultMesh's capability-based model.
**Takeaway:**
**Centralize identity. Minimize trust radius. Scope everything.**
---
## 2. Boundary Defense via Cloudflare Edge
Patterns across:
- Domain dashboards
- DNS records for vaultmesh.org/cloud/etc
- Quick scans
- Site additions
- Status pages
**Emergent pattern:**
Domains consistently routed through CF proxying + WAF baseline → automatic L7 filtering, caching, and shielding from raw traffic.
**Takeaway:**
**Make the CF edge the only public ingress. Anything bypassing the edge = misconfiguration.**
---
## 3. Zero-Trust Access (Cloudflare One)
Patterns across:
- Cloudflare One onboarding
- Connectors
- Tunnels (Argo / cloudflared)
- Email security
- Log explorer
- Access login callback pages
**Emergent pattern:**
Shifting toward a private mesh: internal services accessible only via CF Tunnels + Access policies. Logs show early adoption of Zero-Trust application routing.
**Takeaway:**
**No public ports. Everything behind identity-gated tunnels.**
---
## 4. DNS Integrity & Delegation Control
Patterns across:
- Multiple domains: vaultmesh.org/cloud, iotek.nexus, offsec.*
- DNS record edits
- Quick-scan recommendations
**Emergent pattern:**
DNS is used as operational infrastructure, not static configuration. Many moving parts → errors here cascade.
**Takeaway:**
**DNS is a security boundary. Capture it in change-control + proofs.**
---
## 5. Secrets & Machine Access
Patterns across:
- API tokens
- Tunnels (credential JSON)
- Connectors
- OffSec domain onboarding
**Emergent pattern:**
Machine-to-machine Cloudflare auth centralized in a few tokens/tunnels that link local services → Cloudflare Access → public.
**Takeaway:**
**Secrets rotate. Machines authenticate explicitly. No long-lived credentials.**
---
## 6. Monitoring & Incident Surfaces
Patterns across:
- Log explorer
- Notifications docs
- 5xx troubleshooting
- Status page
**Emergent pattern:**
Review CF logs + platform errors. No single place currently unifies them into an attack pattern feed.
**Takeaway:**
**Observability must reduce noise and elevate anomalies.**
---
# Security Checklist (Cloudflare-centric)
## Account & Identity
- [ ] Enforce hardware-key MFA on all Cloudflare accounts
- [ ] Disable password-based login where possible
- [ ] Use short-lived, scoped API tokens only
- [ ] Audit who/what holds tokens every 30 days
- [ ] Disable unused user seats immediately
## DNS & Zone Security
- [ ] Lock DNS registrar with transfer lock + 2FA
- [ ] Use DNSSEC on all zones (vaultmesh, offsec.*, iotek, etc.)
- [ ] Ensure **every A/AAAA/CNAME record is proxied through Cloudflare** unless intentionally bypassing
- [ ] Remove stale records to reduce attack paths
- [ ] Maintain a version-controlled DNS manifest
## Edge + WAF
- [ ] Enable "Full (strict)" TLS mode
- [ ] Upload and rotate origin certificates
- [ ] Enable:
- [ ] Bot Fight Mode
- [ ] OWASP WAF ruleset (latest)
- [ ] Custom firewall rules (only allow specific methods, country allowlists, etc.)
- [ ] Rate-limit critical paths (/api, tunnels, login pages)
## Cloudflare One / Zero-Trust
- [ ] All internal services served ONLY via Cloudflare Tunnels
- [ ] No public IP exposure on origin servers
- [ ] Access policies:
- [ ] Require identity + device posture
- [ ] Add session duration limits
- [ ] Require hardware-key MFA for admin paths
- [ ] Use Gateway for outbound filtering from internal nodes
## Origin Server Hygiene
- [ ] Close all public ports except 443
- [ ] Run cloudflared under minimal privileges
- [ ] Ensure tunnel credentials stored with root-only permissions
- [ ] Isolate services behind private networks (Tailnet/WireGuard or CF Warp-to-Tunnel)
## Email + Domain Security
- [ ] Enforce DMARC quarantine or reject
- [ ] Enable DKIM + SPF correctness checks
- [ ] Use Cloudflare Email Security to filter targeted phishing
## Monitoring & Incident Response
- [ ] Enable Logpush to R2 / SIEM
- [ ] Monitor:
- [ ] DNS changes
- [ ] New API tokens created
- [ ] Tunnel connection drops
- [ ] WAF spikes
- [ ] Create auto-alerts for deviations
## Change-Control + Proofs
- [ ] Every Cloudflare config change → produce a VaultMesh receipt
- [ ] Anchor the state (DNS + Access + WAF configs) weekly
- [ ] Tie Cloudflare logs into ProofChain for tamper-evident audit