Tristan Stiller

Security-Focused Infrastructure & Automation

This site documents a self-hosted security lab designed to demonstrate network segmentation, detection engineering, and automated response.

Network Architecture

This diagram shows trust boundaries, VLAN segmentation, and enforced access paths within the lab environment.

Detection, Decision, and Response Pipeline

This diagram illustrates how telemetry flows from sensors through analysis, automation, and enforcement.

CVE Detection and Vulnerability Correlation

This diagram outlines how vulnerability scan results are correlated with system telemetry to identify exposed services, prioritize risk, and generate actionable security events.

The focus is on separating continuous vulnerability assessment from real-time detection, while still enabling automated alerting and response when high-risk conditions are identified.

Key Concepts Demonstrated

Source code and documentation available upon request.