AWS Cloud Firewall Review Architecture Decision Group October 6, 2015 – HUIT-Holyoke-CR 561.

Slides:



Advertisements
Similar presentations
Multihoming and Multi-path Routing
Advertisements

Multihoming and Multi-path Routing
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 9: Static Routes & Routing Table Groups.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Module 5: Configuring Access for Remote Clients and Networks.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Policy Based Routing using ACL & Route Map By Group 7 Nischal ( ) Pranali ( )
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Barracuda Networks Steve Scheidegger Commercial Account Manager
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
Course 201 – Administration, Content Inspection and SSL VPN
Additional SugarCRM details for complete, functional, and portable deployment.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
TCOM 515 Lecture 6.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Introduction to Network Address Translation
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Mr. Mark Welton.  Firewalls are devices that prevent traffic from entering or leaving a network  Firewalls are often used between networks, or when.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
UnitedLayer Managed Private Cloud Saad Saleem Director of Customer Engineering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
April 09, 2008 The Demilitarized Zone as an Information Protection Network, By Parvathy Subramanian 1 The Demilitarized Zone as an Information Protection.
Firewall Security.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Module 7: Advanced Application and Web Filtering.
IPv6 Site-Local Discussion Bob Hinden & Margaret Wasserman IETF 56 San Francisco March 2003.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Chapter 4: Implementing Firewall Technologies
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
CCNP Routing and Switching Exam Pass4sure.
Network Security Solution
Barracuda Firewall The Next-Generation Firewall for Everyone
CONNECTING TO THE INTERNET
SECURING NETWORK TRAFFIC WITH IPSEC
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
2TCloud - Veeam Cloud Connect
The Harvard Network: An Overview of Connectivity and Security
Virtual Network Management Center 2
Module Summary BGP is a path-vector routing protocol that allows routing policy decisions at the AS level to be enforced. BGP is a policy-based routing.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Amazon AWS Certified Solutions Architect Professional solutions-architect-professional-practice-test.html.
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Office 365 – How NOT to do it UKNOF43.
Presentation transcript:

AWS Cloud Firewall Review Architecture Decision Group October 6, 2015 – HUIT-Holyoke-CR 561

AWS Cloud Firewall Review What is current state? What are the problems with current state? What is Cloud Firewall and how does it solve the problems of current state? Discussion/Questions 2

What is current state? 3

AWS Networking Current State

What are the problems with current state? 5

What if?

Current State Problems/Limitations All access controls operate at only the IP and Port Layers No ability to have network taps –Limits visibility to active issues –Limits response to incidents Limited High Availability due to AWS Network design –No Multicast or Broadcast network traffic works in AWS No ability to enforce compliance requiring a proxy (for Level 3 & 4 Data) –Currently it is based on the honor system and self-managed by the teams 7

What is Cloud Firewall? 8

Cloud Firewall Design Goals Highly Available Design Extending Beyond the Harvard Campus Ability to Inspect both Ingress and Egress traffic via normal means such as SPAN aggregators like Anue/Gigamon’s Web Proxy Filtering without server-level configuration Firewall Capabilities for Ingress and Egress from Layer 4 through Layer 7 to security needs present and future Ability to provide faster change management and/or updates to external firewall rules through the use of API programmatic updates

Architecture Vetting Process AWS Subject Matter Experts and Account Teams have reviewed the proposal and approved the approach as valid and non-unique A Red Team review was done with several members of Network Engineering, Network Operations, and Network Systems Operations A review was completed with Scott Bradner A review was completed with Enterprise Architecture Leadership 10

11

Cloud Firewall is A multiple geographic deployment of Direct Connect, Fortigate Next Generation Firewalls, and DNS Global Site Load Balancing A highly available ingress and egress NAT solution for Cloud deployments focusing on solving the problems with AWS but designed to work with multiple Cloud vendors in the future A inline implicit web proxy (with SSL Inspection as required) for use inside AWS A Layer 4 and Layer 7 firewall (layer implementation dependent on Data Level or opt-in) for both ingress and egress into the VPC –Not a intra-VPC ACL enforcement mechanism A compliance, control, and visibility endpoint –Direct Connect enforces usage and physical nature provides Network Tap visibility (with supporting hardware from InfoSec)

Cloud Firewall Design Issues 1.AWS requires a single ingress/egress point of access 2.Firewalls will provide NAT translation from Public IP to Private IP in AWS 3.Global Site Selection via DNS will provide the outside access active IP 4.Layer 7 Unified Threat Management including Intrusion Protection, Web Filtering, Data Leak Protection, and Client Reputation requires SSL inspection for full visibility on Egress –Inbound traffic will have certificate inspection –Egress traffic will have certificate inspection with the option for Man in the Middle SSL Deep Packet Inspection

AWS Routing Design Ashburn Deployment will advertise default route into AWS Harvard Deployment will advertise default route into AWS artificially appearing one network hop further All traffic will go to the BGP best path selected point which is by default Ashburn –Harvard traffic will transit a set of private network links between Ashburn and Harvard AWS prefers the BGP learned route over any static routes entered by the user 14

Summary Cloud Firewall provides outbound traffic filtering Cloud Firewall provides network visibility for InfoSec via: –Traffic Logs in Fortigate and FortiAnalyzer –Ability to do Network Taps for offline analysis and response Failover and Disaster Recovery 16

Questions & Discussion 17