Daniel López Azaña

Theme

Social Media

AWS Security and Infrastructure Consulting for Web Platform

Complete security audit and AWS infrastructure optimization for a web application platform, detecting and resolving critical security vulnerabilities, implementing monitoring systems, and modernizing the technology stack.

In December 2016, a web platform company contacted me for what seemed like a routine performance analysis. The symptoms were puzzling: severe slowdowns despite running on oversized infrastructure with minimal user traffic. Within days, the investigation revealed something far more serious: the application had been compromised, with malicious code consuming most of the server’s resources.

AWS security and infrastructure architecture diagram

What followed was a six-month engagement that combined crisis response, infrastructure modernization, and comprehensive monitoring implementation, transforming a compromised system into a secure, well-architected AWS environment.

The Discovery: Performance Analysis Uncovers Security Breach

The initial assessment began with deploying New Relic to understand application performance. The results were immediately concerning. The monitoring dashboard showed that over 70% of the application’s workload consisted of external HTTP calls to hundreds of unknown domains scattered across the internet.

Critical Security Finding

The majority of server resources were being consumed by malicious code making hundreds of requests to spam domains. The legitimate application was starved of CPU, memory, and bandwidth while attackers used the infrastructure for their own purposes.

This explained everything: the performance problems weren’t due to application inefficiency or infrastructure limitations. The platform was compromised, and the malicious payload was consuming resources intended for legitimate users.

Crisis Response: Security Remediation

The immediate priority was removing the malicious code and preventing future intrusions. I conducted a complete forensic analysis to identify compromised files, injection points, and attack vectors. The cleanup process involved:

Forensic analysisidentifying all compromised files and malicious code injection points across the codebase
Complete code sanitizationremoving all malicious payloads while preserving legitimate functionality
Security hardeningimplementing file integrity monitoring and access controls to prevent future attacks

With the immediate threat neutralized, the platform’s performance immediately improved. Resources previously consumed by malicious traffic became available for legitimate application workload.

Infrastructure Modernization

With security restored, the focus shifted to building a robust AWS infrastructure that could support the application’s growth and modernization plans.

Load Balancer and High Availability

I configured an Elastic Load Balancer (ELB) to distribute traffic across multiple application servers, implementing proper health checks to ensure traffic only reached healthy instances. The ELB configuration included:

Health check optimization

Configured health checks with appropriate thresholds and intervals to detect failures quickly without generating false positives.

SSL certificate integration

Integrated Let’s Encrypt SSL certificates with automated renewal, handling encryption at the load balancer level.

The infrastructure included development and staging environments, allowing the team to test changes safely before deploying to production. I created Amazon Machine Images (AMIs) from properly configured servers, enabling rapid deployment of consistent environments.

Monitoring and Performance Analysis

Comprehensive monitoring became critical for maintaining the newly secured infrastructure. I implemented a two-phase monitoring strategy:

Phase 1: New Relic for Application Performance

During the initial months, New Relic provided deep visibility into application behavior, transaction performance, and database queries. This monitoring platform was instrumental in identifying the security breach and continued providing valuable insights during the remediation phase.

New Relic dashboard showing application performance metrics

Phase 2: Percona Monitoring and Management (PMM)

When the New Relic trial period ended, I proposed Percona Monitoring and Management as an open-source alternative. PMM provided even more detailed MySQL monitoring than New Relic, including:

Query Analytics
Detailed analysis of slow queries with execution plans and optimization recommendations
Performance Schema
Deep MySQL instrumentation showing exactly where database time was spent
Historical Data
Long-term performance trends and capacity planning insights

The PMM deployment proved that open-source tools can often outperform commercial solutions in specialized domains. For MySQL monitoring specifically, PMM provided superior capabilities at zero licensing cost.

Percona PMM monitoring MySQL performance and query analytics

Database Optimization

Armed with detailed monitoring data, I conducted systematic MySQL optimization. The Percona tools revealed slow queries that were impacting user experience, allowing me to:

  • Analyze query execution plans and identify missing indexes
  • Optimize complex queries with inefficient JOIN operations
  • Tune MySQL configuration parameters for the workload characteristics
  • Implement query result caching where appropriate

These optimizations reduced database response times by 60-80% for the slowest queries, dramatically improving the user experience for database-intensive operations.

Technology Stack Modernization

The client was planning a significant technology upgrade to modern frameworks and PHP versions. I supported this migration by:

Symfony 3.2 Migration

Configured servers to support the latest Symfony framework version, providing better security, performance, and developer experience.

PHP 7 Upgrade

Deployed PHP 7 infrastructure, delivering substantial performance improvements and modern language features for development teams.

Enhanced Security Measures

Beyond the immediate security remediation, I implemented additional security controls to protect the infrastructure:

  • Multi-Factor Authentication (MFA) for administrative access to AWS and servers
  • Automated SSL certificate management with Let’s Encrypt for all domains
  • Certificate integration with the ELB for encrypted traffic from users to load balancer
  • File integrity monitoring to detect unauthorized modifications
  • Regular security updates for operating system and application dependencies

Results and Impact

The engagement transformed a compromised, poorly performing platform into a secure, well-monitored infrastructure:

0
Security incidents after remediation and hardening
70%
Reduction in database query response times through optimization
100%
Automated certificate renewal, eliminating manual SSL management

Security transformation: The platform went from an actively compromised system to a hardened environment with MFA, automated certificate management, and comprehensive monitoring.

Performance recovery: By removing malicious workload and optimizing database queries, the legitimate application’s performance improved dramatically, providing a much better user experience.

Modern infrastructure: The technology stack migration to Symfony 3.2 and PHP 7 positioned the platform for future development with improved security, performance, and maintainability.

Operational efficiency: Comprehensive monitoring with Percona PMM provided ongoing visibility into database performance, enabling proactive optimization and capacity planning.

Key Lessons: When Performance Problems Hide Security Issues

This project reinforced critical lessons about security-conscious infrastructure management:

Performance anomalies are red flags. When a platform running on oversized infrastructure experiences severe performance problems with minimal load, investigate security first. Unexplained resource consumption often indicates compromise.

Monitoring is essential for security. The security breach was discovered through performance monitoring, not security tools. Comprehensive visibility reveals anomalies that indicate attacks.

Open-source can outperform commercial solutions. Percona Monitoring and Management provided superior MySQL monitoring compared to commercial APM tools, demonstrating that specialized open-source tools often excel in their domain.

Defense in depth works. Multiple security layers—MFA, automated certificate management, file integrity monitoring, and regular updates—create resilient infrastructure that can withstand attacks.


Need AWS security and infrastructure expertise?

If your web platform is facing similar challenges:

  • Security vulnerabilities requiring comprehensive audits and remediation.
  • Performance degradation despite adequate infrastructure resources.
  • MySQL database issues affecting application responsiveness and stability.
  • Lack of monitoring preventing proactive issue detection and resolution.
  • Technology stack modernization needed for security and performance.

As an AWS cloud architect with 20+ years of Linux security experience, I can help you transform compromised or underperforming infrastructure into secure, well-monitored environments that protect your business.

Specialized in AWS security audits, MySQL optimization, monitoring implementation (New Relic, Percona PMM), and infrastructure modernization for production web platforms.

Get in touch →

Daniel López Azaña

About the author

Daniel López Azaña

Tech entrepreneur and cloud architect with over 20 years of experience transforming infrastructures and automating processes.

Specialist in AI/LLM integration, Rust and Python development, and AWS & GCP architecture. Restless mind, idea generator, and passionate about technological innovation and AI.

Comments

Be the first to comment

Submit comment

Have a Similar Project in Mind?

Let's discuss how I can help you achieve your goals

Start a Conversation