five steps to creating a secure hybrid cloud architecture

36
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. David Guretz, System Engineer, Palo Alto Networks April 19, 2016 Five Steps to a Secure Hybrid Architecture in AWS

Upload: amazon-web-services

Post on 12-Apr-2017

678 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Five Steps to Creating a Secure Hybrid Cloud Architecture

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

David Guretz, System Engineer, Palo Alto Networks

April 19, 2016

Five Steps to a Secure Hybrid

Architecture in AWS

Page 2: Five Steps to Creating a Secure Hybrid Cloud Architecture

2015 Data Loss Incidents

Source: http://www.idtheftcenter.org/images/breach/DataBreachReports_2015.pdf

781 Data breaches reported in 2015

169MRecords compromised

Page 3: Five Steps to Creating a Secure Hybrid Cloud Architecture

The Common Thread in Data Loss Incidents

SPEAR

PHISHING

EMAIL

EXPLOIT KIT

or

INFECT

USER

MOVE ACROSS

THE NETWORK

INFECT THE

DATA CENTER

ADVERSARY

COMMANDS

STEAL

DATA

Same lifecycle is followed across both physical or virtualized network

Page 4: Five Steps to Creating a Secure Hybrid Cloud Architecture

Additional Cloud Security Challenges

Limited visibility Outdated, inconsistent threat

prevention technology

Cumbersome

processes

Page 5: Five Steps to Creating a Secure Hybrid Cloud Architecture

Security: A Shared Responsibility

AWS Foundation Services

Compute Storage Database Networking

AWS Global

Infrastructure Regions

Availability ZonesEdge Locations

Encryption Key

Management

Client & Server

Encryption

Network Traffic

Protection

Platform, Applications, Identity & Access Management

Operating System, Network & Firewall Configuration

Customer content

Customers are responsible for their security IN the Cloud

AWS looks after the security OF the platform

Page 6: Five Steps to Creating a Secure Hybrid Cloud Architecture

Security Groups, WAF or Next-gen Firewall?

• Native AWS security includes Security Groups and Web Application Firewall

• Security Groups and ACLs

• Port-based filtering only

• No visibility traffic at the application level

• Unable to prevent threats

• Cannot control file movement

• Web Application Firewalls

• Customized for each application/environment

• Focused narrowly on public facing web applications on HTTP/HTTPs

• No visibility, control, or protection for non-HTTP/HTTPs applications

Page 7: Five Steps to Creating a Secure Hybrid Cloud Architecture

CVE-2014-4061vulnerability

rootuser

Application Server

SQL Server

172.16.1.10source IP

172.16.2.10destination IP

TCP/1433destination port

MSSQL-DBprotocol

Context – Moving Beyond Layer 4

11344 KB

DoS Vuln

CVE-2014-4061vulnerability

Remote Exec

Page 8: Five Steps to Creating a Secure Hybrid Cloud Architecture

web-browsingapplication

.exefile type

rootuser

shipment.exefile name

unknownURL category

North Koreadestination country

172.16.1.10source IP

64.81.2.23destination IP

TCP/443destination port

SSLprotocol

HTTPprotocol

Context – Outbound from AWS

344 KB

Application Server

Page 9: Five Steps to Creating a Secure Hybrid Cloud Architecture

Protecting Your AWS

Deployment

Page 10: Five Steps to Creating a Secure Hybrid Cloud Architecture

Palo Alto Networks VM-Series for AWS

Gathers potential threats from network

and endpoints

Analyses and correlates threat

intelligence

Disseminates threat intelligence to

network and endpoints

Threat Intelligence Cloud

Identify and Inspect all traffic

Blocks known threats

Sends unknown to cloud

Extensible to mobile & virtual networks

Next-Generation Firewall

Inspects all processes and files

Prevents both known & unknown exploits

Integrates with cloud to prevent known &

unknown malware

Advanced Endpoint Protection

Page 11: Five Steps to Creating a Secure Hybrid Cloud Architecture

VM-Series for AWS

• Visibility into, and control over applications, not ports

• Segment applications to prevent malware propagation

• Prevent known and unknown threats

• Centrally manage system configuration, streamline policy updates

AZ1b

Page 12: Five Steps to Creating a Secure Hybrid Cloud Architecture

Application Visibility

Page 13: Five Steps to Creating a Secure Hybrid Cloud Architecture

Application Visibility

Page 14: Five Steps to Creating a Secure Hybrid Cloud Architecture

Segmentation for Data Center Applications

• Applications and data isolated by policy (whitelisting)

• Users granted access based on need

• Traffic is protected from malware

Credit Card

Zone

Customer Support

Zone

Customer

service

Finance

Subnet1 Subnet2

Subnet3

Page 15: Five Steps to Creating a Secure Hybrid Cloud Architecture

Segmentation in AWS

• VMs and data (VPCs) protected by

whitelist policy

• VPC-to-VPC traffic is protected from

malware

• Subnet to subnet traffic is also

controlled and protected

• Users granted access based on

need/credentials

AZ2c

DB VPC

DB1

DB2

AZ1b

Web VPC

Web

1

Web2

Subnet1

Subnet2

Subnet1

Subnet2

Page 16: Five Steps to Creating a Secure Hybrid Cloud Architecture

Attack Lifecycle Prevention

AZ1bWeb

1

DB1

Subnet1

Subnet2

Leverage Exploit

Next-Generation

Firewall

Threat Prevention

(Block Known Threats)

Execute Malware

WildFire

(Block Unknown Threats)

Threat Prevention

(Anti-Malware)

Threat Prevention

(Prevent C&C)

Control Channel

Threat Prevention

(Block Lateral Movement)

Threat Prevention

(Prevent C&C)

Steal Data

File Blocking & Data

Filtering

Page 17: Five Steps to Creating a Secure Hybrid Cloud Architecture

• Centrally manage configuration and policy across enterprise and cloud

• Aggregate traffic logs for visibility, forensics and reporting

• Streamline policy updates with APIs and dynamic monitoring of Amazon VPC

Streamline Management and Policy Updates

APIsApplication

Network

Security

AZ1bWeb

1

DB1

Subnet1

Subnet2

Page 18: Five Steps to Creating a Secure Hybrid Cloud Architecture

AWS Hybrid Cloud Security

with the VM-Series

Page 19: Five Steps to Creating a Secure Hybrid Cloud Architecture

Combines best of both worlds

• Private data center for static, older workloads

• Public cloud for newer apps, agility, scalability

Hybrid Cloud Topology

IPSec VPNDC-FW1

DC-FW2

AZ1

cA

Z1

bWeb1-01

Web1-02

Web2-01

Web2-02

Page 20: Five Steps to Creating a Secure Hybrid Cloud Architecture

• Subnet and route tables should be

established in AWS first

• Each subnet gets a unique route

table

• External subnet routes to the IGW

• Internal subnet and route table

should exclude IGW

• Eliminates internal subnet to

Internet routing – even if firewall

is misconfigured

Step 1: Getting the Subnets Right

Page 21: Five Steps to Creating a Secure Hybrid Cloud Architecture

Step 2: Deploy the VM-Series for AWS

• Two licensing options enabled via AWS Marketplace

• Consumption-based licensing in AWS marketplace: Fixed

bundles purchased for annual or hourly time periods

• Bring Your Own License (BYOL): Pick and choose licenses,

subscriptions and support to best suite our needs

• Instances: Small c3 to c4.4xlarge. Confirm latest list in

AWS Marketplace

• Elastic Network Interfaces (ENI): Up to 8 ENIs with

the first ENI always dedicated to management

• Interface Modes: L3 only due to the AWS infrastructure requirements. TAP, L2, and

virtual wire interface modes are not supported

• CPU, Memory and Storage: All Instance types support 2, 4, or 8 vCPUs, and they all

require at least 4 GB of dedicated memory and 40 GB of EBS-optimized volume

storage

Page 22: Five Steps to Creating a Secure Hybrid Cloud Architecture

• VM-Series for AWS acts as a VPN

termination point

• Fully supports IPSec VPN standards

Step 3: Establishing the IPSec VPN Connection

Page 23: Five Steps to Creating a Secure Hybrid Cloud Architecture

Challenge

With two or more subnets, firewall

can intentionally or accidentally

be bypassed

Step 4: Ensuring Traffic Flows Through the Firewall

AZ1b

DB1

Web1

Page 24: Five Steps to Creating a Secure Hybrid Cloud Architecture

Challenge

With two or more subnets, firewall

can intentionally or accidentally

be bypassed

Step 4: Ensuring Traffic Flows Through the Firewall

Solution

Force all traffic to the firewall by

adding a self referencing security

group

AZ1b

DB1

Web1

AZ1b

DB1

Web1

Page 25: Five Steps to Creating a Secure Hybrid Cloud Architecture

AWS Configuration to Force Traffic Through Firewall

Self referencing security groups

Page 26: Five Steps to Creating a Secure Hybrid Cloud Architecture

Validating the Configuration

Web to DB connection via the

VR and firewall succeeds

ubuntu@web1:~$ netstat -rn

Kernel IP routing table

Destination Gateway Genmask Flags MSS Window irtt Iface

0.0.0.0 10.4.3.101 0.0.0.0 UG 0 0 0 eth0

10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0

ubuntu@web1:~$ ping -c 3 db1

PING db1 (10.4.5.201) 56(84) bytes of data.

64 bytes from db1 (10.4.5.201): icmp_seq=1 ttl=63 time=0.891 ms

64 bytes from db1 (10.4.5.201): icmp_seq=2 ttl=63 time=0.916 ms

64 bytes from db1 (10.4.5.201): icmp_seq=3 ttl=63 time=1.04 ms

--- db1 ping statistics ---

3 packets transmitted, 3 received, 0% packet loss, time 2002ms

rtt min/avg/max/mdev = 0.891/0.951/1.047/0.072 ms

Page 27: Five Steps to Creating a Secure Hybrid Cloud Architecture

Validating the Configuration

Attempted bypass by altering

default route is dropped

ubuntu@web1:~$ sudo route add default gw 10.4.3.1

ubuntu@web1:~$ sudo route del default gw 10.4.3.101

ubuntu@web1:~$ netstat -rn

Kernel IP routing table

Destination Gateway Genmask Flags MSS Window irtt Iface

0.0.0.0 10.4.3.1 0.0.0.0 UG 0 0 0 eth0

10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0

ubuntu@web1:~$ ping -c 3 db1

PING db1 (10.4.5.201) 56(84) bytes of data.

--- db1 ping statistics ---

3 packets transmitted, 0 received, 100% packet loss, time 1999ms

Web to DB connection via the

VR and firewall succeeds

ubuntu@web1:~$ netstat -rn

Kernel IP routing table

Destination Gateway Genmask Flags MSS Window irtt Iface

0.0.0.0 10.4.3.101 0.0.0.0 UG 0 0 0 eth0

10.4.3.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0

ubuntu@web1:~$ ping -c 3 db1

PING db1 (10.4.5.201) 56(84) bytes of data.

64 bytes from db1 (10.4.5.201): icmp_seq=1 ttl=63 time=0.891 ms

64 bytes from db1 (10.4.5.201): icmp_seq=2 ttl=63 time=0.916 ms

64 bytes from db1 (10.4.5.201): icmp_seq=3 ttl=63 time=1.04 ms

--- db1 ping statistics ---

3 packets transmitted, 3 received, 0% packet loss, time 2002ms

rtt min/avg/max/mdev = 0.891/0.951/1.047/0.072 ms

Page 28: Five Steps to Creating a Secure Hybrid Cloud Architecture

Step 4: Scaling with ECMP

• ECMP weighted round robin in private data center

• Distributes the load across multiple VM-Series instances

AZ1

cA

Z1

bWeb1-01

Web1-02

Web2-01

Web2-02

DC-FW1

DC-FW2

Web0-01

Web0-01

Page 29: Five Steps to Creating a Secure Hybrid Cloud Architecture

Scaling with On-Premises Load Balancer

• Traffic load is shared across both private and

public cloud

• Static routes on firewall across multiple VPN

tunnels adds redundancy

• Single load balancer configuration minimizes

management effort

29 | © 2015, Palo Alto

AZ1

c

DC-FW1

AZ1

bWeb1-01

Web1-02

Web2-01

Web2-02

DC-FW2

Web0-01

Page 30: Five Steps to Creating a Secure Hybrid Cloud Architecture

Scaling with Elastic Load Balancing

• Elastic Load Balancing supported natively

for security scaling

• Citrix NetScaler – documented in tech

pubs

• NGINX also proven to work

30 | © 2015, Palo Alto

AZ1

cA

Z1

b

Web2-01

Web2-02

Web1-01

Web1-02

Web1-03

Web2-03

DC-FW1

DC-FW2

Web0-01

Web0-01

Page 31: Five Steps to Creating a Secure Hybrid Cloud Architecture

Step 5: Security Automation

AWS CloudFormation Templates (CFT)

• Scripted to deploy AWS resources

• Ranges from basic install of the VM-Series to a fully configured

environment

• Check out the Hybrid Deployment Guidelines Whitepaper for a

two tiered CFT example

z

AZ1b

Web1

DB1

Page 32: Five Steps to Creating a Secure Hybrid Cloud Architecture

Automating Firewall Deployments

PAN-OS configuration

Security policies

BYOL licenses

Software updates

Dynamic content

Attach to Panorama

Device Group

vm-series-bootstrap-aws-s3-

bucket=<bucketname>

Amazon

S3 bucket

Page 33: Five Steps to Creating a Secure Hybrid Cloud Architecture

Automate Security Policy Updates

Page 34: Five Steps to Creating a Secure Hybrid Cloud Architecture

Automate Security Policy Updates

Page 35: Five Steps to Creating a Secure Hybrid Cloud Architecture

Hybrid: extend your data center into AWS

Segmentation: Separate applications and data for security

and compliance

Additional Deployments Scenarios

Gateway: Protection from Internet borne threats

GlobalProtect: Policy

consistency for the

cloud, the network, and

your devices

Page 36: Five Steps to Creating a Secure Hybrid Cloud Architecture

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Thank you