Security Lab — overview

Purpose, boundaries, and current operating model for the private security lab.

This lab is a private, host-local environment for learning security operations, vulnerability assessment, purple-team workflows, GitOps operations, and Cisco data center networking. It runs on libvirt/KVM on dl385, with management access on br30 and isolated test traffic on a separate lab network.

The current phase is operationally usable. The security tooling baseline is complete, the Nexus EVPN/VXLAN lab is working, and the daily validation model is GitOps-oriented.

  • Kali Linux for offensive tooling and validation.
  • Kali Purple for blue-team and purple-team packages.
  • EVE-NG for network emulation.
  • Security Onion, Wazuh, and Greenbone for detection, endpoint monitoring, and vulnerability management.
  • Linux and OWASP Juice Shop targets for scanning and controlled testing.
  • A dedicated security-lab runtime VM for Nautobot, Oxidized, Batfish, TheHive, Shuffle, backup jobs, and SOC integration tooling.
  • A six-node Nexus 9300v EVPN/VXLAN fabric with two spines, two leaves, and two tenant border nodes.
  • Nautobot, Oxidized, Batfish, detection-content, runbooks, and backup automation managed through local GitLab repositories.

Windows Active Directory was intentionally skipped in the initial build. It can be added later from official Microsoft evaluation media if the lab needs domain identity, Kerberos, Group Policy, or Windows endpoint telemetry.

Current Operating State

AreaStatus
SOC baselineComplete for lab use
Nexus EVPN/VXLANComplete for the current two-spine, two-leaf, dual-border lab
Services VRF leak controlsImplemented and validated
Daily validationFull Nexus validation and SOC health reporting are available
GitOps source of truthLocal GitLab security-lab group owns the desired state
StorageGRID / NetAppGrid-host VMs exist, but software installation is paused until official evaluation media and license are staged

The operational entrypoint is the private repo’s resume command:

cd /home/ze/codex-security-lab-agent
./scripts/resume-lab-session.sh

Boundaries

The lab is for owned, authorized systems only. Do not scan public networks, third-party systems, customer environments, or production services from these VMs unless there is explicit written authorization and a defined test scope.

Credentials, API tokens, private keys, and generated appliance passwords stay outside Git under /home/ze/secrets/. Published docs should describe where secrets live, not reveal secret values.

Source Of Truth

The operational repository is:

/home/ze/codex-security-lab-agent

The public/protected documentation source is:

/home/ze/repos/zeshaq-pages-dev

The GitHub repository for lab operating notes is private:

https://github.com/zeshaq/codex-security-lab-agent

Key Pages

Last reviewed: 2026-05-15