Cloud Security Best Practices



Similar documents
Overlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO

Microsoft Azure Configuration

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide

How To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On

CenturyLink Cloud Configuration

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

vcloud Director User's Guide

Google Compute Engine Configuration

VPN. VPN For BIPAC 741/743GE

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

ISG50 Application Note Version 1.0 June, 2011

Recommended IP Telephony Architecture

Virtual Data Centre. User Guide

Overview and Deployment Guide. Sophos UTM on AWS

Cisco Intercloud Fabric Security Features: Technical Overview

VNS3 Secure Network Appliance Service Defnition for G-Cloud 7

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

TechNote. Configuring SonicOS for Amazon VPC

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Configuring IPsec VPN with a FortiGate and a Cisco ASA

HP Helion Configuration

How To Industrial Networking

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

Scenario: Remote-Access VPN Configuration

The networking declaration of independence

- Introduction to PIX/ASA Firewalls -

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

7.1. Remote Access Connection

Ranch Networks for Hosted Data Centers

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

How to configure VPN function on TP-LINK Routers

Vyatta Network OS for Network Virtualization

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

WAN Failover Scenarios Using Digi Wireless WAN Routers

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

How to configure VPN function on TP-LINK Routers

CTS2134 Introduction to Networking. Module Network Security

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Overview. Author: Seth Scardefield Updated 11/11/2013

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Firewall Security. Presented by: Daminda Perera

Network Virtualization Network Admission Control Deployment Guide

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

VMware vcloud Networking and Security Overview

Configuring IPsec VPN between a FortiGate and Microsoft Azure

Securing Cisco Network Devices (SND)

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

Chapter 4 Virtual Private Networking

VPN Configuration Guide. Dell SonicWALL

VMUG - vcloud Air Deep Dive VMware Inc. All rights reserved.

VMware vcloud Air Security TECHNICAL WHITE PAPER

VPN Configuration Guide WatchGuard Fireware XTM

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Using Opensource VPN Clients with Firetunnel

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Chapter 5 Virtual Private Networking Using IPsec

Small, Medium and Large Businesses

VPN Quick Configuration Guide. Astaro Security Gateway V8

Understanding the Cisco VPN Client

Application Security Best Practices. Matt Tavis Principal Solutions Architect

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

IINS Implementing Cisco Network Security 3.0 (IINS)

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

How To Establish IPSec VPN between Cyberoam and Microsoft Azure

Cisco Certified Security Professional (CCSP)

Implementing Cisco IOS Network Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Chapter 11 Cloud Application Development

Security Considerations for DirectAccess Deployments. Whitepaper

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Security. TestOut Modules

Monitoring Remote Access VPN Services

CloudPlatform (powered by Apache CloudStack) Version 4.2 Administrator's Guide

Configuration Procedure

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Reference to common tasks

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

V310 Support Note Version 1.0 November, 2011

Cornerstones of Security

Network Security Topologies. Chapter 11

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

November Defining the Value of MPLS VPNs

Steelcape Product Overview and Functional Description

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

IP Office Technical Tip

State of Texas. TEX-AN Next Generation. NNI Plan

Transcription:

Cloud Security Best Practices

Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign governments. Top 20 Most Promising Enterprise Security Company 2015 TECHNOLOGY PARTNER Partner Network 2000+ customers in 20+ countries across all industry verticals and sectors Cloud Marketplace Provider 2

VNS3 customers run their businesses in the cloud 2000+ customers in 20+ countries 200+ Self Service Customers 15+ SI Resellers 30+ ISV OEM Including Industry Leaders Global mutual fund company US ERP provider Global BPMS provider Cloud-based threat detection US carrier & logistics Global big data analytics provider References Available Upon Request 3

Best Practices 4

Cloud security best practices Defense in Depth Shared Responsibility NIDS and WAF Virtual Firewall Overlay Network IPsec Site-to-Site Explicitly match all IPsec parameters Policy based IPsec VPN Algorithms, hashing, DH, PFS, PSK, and lifetimes Run multiple VNS3 controller instances to provide IPsec HA Overlay Network Encrypted TLS tunneled Overlay Network Lock Down overlay communication to only UDP 1194 in/out Check out Clientpacks Use Clientpack Name Tag Disable unused clientpacks Run multiple VNS3 controller instances to provide Overlay HA via VNS3 Peering Secure Administration Separate UI and API passwords Use Static IPs (DNS name resolution where available) Use multifactor/multiparty authentication for Remote Support Image Size Use VNS3 Snapshots NAT traffic through the VNS3 controller to the public Internet 5

Understand the security shared responsibility model Cloud Customer Layer 7 Layer 6 Layer 5 Layer 4 App 1 App 1 Application Policies You Control Cloud Service Provider Layer 3 Layer 3 Layer 2 Layer1 Cloud Layer 3 Network (minimal tenant features) Limit of user access, control and visibility Hypervisor You Don t Control Layer 0 Hardware You Can t Get To 6

Build layers of control and access Cloud networks combine with user & provider firewalls and isolation features to create a security lattice with layers of security Key security elements must be controlled by the customer, but separate from the provider. Provider Owned/Provider Controlled Provider Owned/User Controlled VNS3 - User Owned/User Controlled User Owned/User Controlled Cloud Edge Protection Cloud Isolation Cloud VLAN Cloud Network Firewall Cloud Network Service VNS3 Virtual Firewall VNS3 Encrypted Overlay Network VNS3 NIDS, WAF, etc. Instance OS Port Filtering Encrypted Disk 7

Use VPC Taking advantage of the additional isolation and network controls of VPC VLAN is a critical piece of the overall security strategy for deploying cloud applications. 8

Lock down the cloud environment Cloud server communicate to each other and to the remote encrypted domains available via IPsec tunnels through the VNS3 controllers. Locking down the intra cloud communications to only UDP 1194 in/out ensures only the encrypted and tunneled Overlay Network traffic is allowed. 9

Use an appropriate Instance Size The instance size required for a use-case is dependent on the total throughput an application deployment needs and how many VNS3 controller instances will be securing that application deployment. Standard enterprise application network throughput requirements are often accommodated by an instance with 2 virtual CPUs and 4 GB of memory. 10

Use Static IPs Using static and assignable public IPs whenever possible allows for fast DR with little to no reconfiguration. 11

Use the Encrypted TLS tunneled Overlay Network VNS3 Overlay Network - 172.31.1.0/24 Cloud Server A Overlay IP: 172.31.1.1 Cloud Server B Overlay IP: 172.31.1.2 Cloud Server C Overlay IP: 172.31.1.3 Primary DB Overlay IP: 172.31.1.4 Backup DB Overlay IP: 172.31.1.5 Peered Peered VNS3 Controller 1 VNS3 Controller 3 Public IP: 52.1.108.23 Public IP: 54.15.88.193 VNS3 Controller 2 Public IP: 52.22.100.95 Cloud server use a unique X.509 credential that is associated with an Overlay IP address plus a tunneling agent (e.g. OpenVPN) to create a secure TLS VPN tunnel to a VNS3 controller instance. The VNS3 controller instance acts as a switch, router, firewall, and protocol redistributor. All data in motion is encrypted end-to-end. 12

Create Logical Subnets with the VNS3 Firewall Smaller subnets within the defined Overlay Network CIDR along with VNS3 firewall rules enforce traffic policies to provide segmentation and isolation. This orthogonal control ensures that the devices are communicating with each other via an encrypted switch and the intra Overlay Network communication is limited to what is necessary. Web 172.31.1.0/29 App 172.31.1.8/29 DB 172.31.1.16/29 MQ 172.31.1.24/29 VNS3 Controllers 172.31.1.56/29 Unassigned 172.31.1.32/29, 172.31.1.40/29, 172.31.1.48/29 Overlay Subnet - 172.31.1.0/26 13

Monitor traffic with VNS3 NIDS/WAF Containers All the traffic coming into, going out of and moving within the VNS3 Overlay Network pass through the VNS3 controllers. Run traffic management and security services like NIDS and WAF on the VNS3 controllers. WAF NIDS container plugin VNS3 Hypervisor Hardware 14

Use clientpack name tag Tagging each clientpack via the key value tagging system available on VNS3 allows easier tracking and administration of the Overlay connected client servers. 15

Check out clientpacks Clientpacks are available to be fetched programmatically via the VNS3 API. Checking out a clientpack makes that credentials unavailable via the API. Mark clientpacks that are currently connected and in use via the check out feature. 16

Disable unused clientpacks Unused clientpacks can be marked as disabled to deny any incoming connections from using that credential. 17

Build a VNS3 Peered mesh network Controllers connect to each other in a process called Peering. Peered Controllers create a redundant, highly available and secure overlay network and share traffic load from the overlay network connected servers. Connected client servers can specify a list of VNS3 controllers to connect to in order to join the Overlay Network. In the event one controller is in accessible, the connected client server attempts to connect to the next VNS3 controller in the list. Use Peering if federating any cloud resources across availability zone, data center, region, or cloud provider. 18

Policy based IPsec We recommend using Policy-based IPsec instead of Route-based IPsec. Route-based IPsec removes the sec from IPsec. 19

Match all tunnel parameters IPsec devices often have parameter groups and list from which IPsec tunnel definition information is sourced. Often the in-force IPsec parameter information is different from the intended definition. Specifying the exact parameters required for IPsec negotiation ensures the correct encryption details are used. 20

Recommended IPsec Parameters Based on experience connecting thousands of partner and customer devices we recommend the following IPsec tunnel settings: AES256 algorithms SHA1 (or SHA2 256) authentication hashing DH5 Perfect Forward Secrecy DPD Phase1 Lifetime of 3600s/1h Phase2 Lifetime of 28800s/8h 21

IPsec Failover - BGP IPsec HA can be achieved using VNS3 Peered mesh and IPsec BGP tunnels VNS3 Overlay Network - 172.31.1.0/24 that decide the quickest path. Cloud Server A Overlay IP: 172.31.1.1 Cloud Server B Overlay IP: 172.31.1.2 Cloud Server C Overlay IP: 172.31.1.3 Primary DB Overlay IP: 172.31.1.4 This is completely dependent on the connecting party's hardware and expertise. Peered VNS3 Controller 1 VNS3 Controller 2 Public IP: 52.1.108.23 Public IP: 52.22.100.95 Active ebgp IPsec Tunnel Active ebgp IPsec Tunnel Data Center 1 Seattle, WA 22

IPsec Failover - Normal IPsec VNS3 Overlay - 172.31.1.0/24 Office LAN - 192.168.100.0/24 VNS3 Primary Active IPsec Tunnel Client Server Overlay IP: 172.31.1.1 Host Overlay IP: 192.168.100.1 VNS3:ha Backup VNS3:ms 23

Separate UI and API Credentials Many regulated industries have to follow best practices like changing default username and passwords. Having different access credentials for people and programs and a logical extension. 24

Use multi-factor / multi-party authentication We send an encrypted passphrase to generate a private key used by Cohesive Support staff to access the VNS3 Controller. Access to the restricted SSH daemon is completely controlled by the user. Once the support ticket has been closed the user can disable remote support access and invalidate the access key. 25

VNS3 snapshots for dr VNS3 Snapshots include all the running configuration details. Use VNS3 snapshots to move configuration state from one VNS3 controller instance to another. 26