Network Security

Type of attacks on infrastructure

  • Distributed Denial of Service (DDoS) - When your service is unavailable because it's receiving too many requests.

    • SYN Flood (Layer 4): Send too many TCP connection requests.

    • UDP Reflection (Layer 4): Get other servers to send many big UDP requests.

    • DNS Flood: overwhelm the DNS server so the legitimate users cannot find the site.

    • Slow Loris attack: A lot of HTTP connections are opened and maintained.

Application level attacks

  • More complex, more specific (HTTP level)

  • Cache bursting strategies: Overload the backend database by invalidating cache.

Protection on AWS

  • AWS Shield Standard:

    • Free service for every AWS customer.

    • Protects agains attacks such as SYN / UDP Flood, Reflection and other Layer 3, 4 attacks.

  • AWS Shield Advanced:

    • Optional DDoS mitigation service ($3,000 per month per organization).

    • Provide notification.

    • Protect against more sophisticated attack on EC2, ELB, CloudFront, Global Accelerator, Route53.

    • 24/7 access to AWS DDoS response team (DRP)

    • Protect against higher fees during usage spikes due to DDoS.

  • AWS WAF:

    • Filter specific requests based on rules (layer 7).

    • Define Web ACL

      • Rules can include: IP, HTTP Header, HTTP Body, or URI strings.

      • Protects from: SQL Injection, Cross-site Scripting (XSS)

      • Size constraints, Geo match.

      • Rate-based rules.

    • Deployable on

      • ALB (localized rules).

      • API Gateway (rules running at the regional or edge level).

      • CloudFront (rules globally on edge locations)

  • AWS Firewall Manager

    • Manages rules in all accounts of an AWS Organization.

    • Common set of security rules.

    • WAF rules (ALB, API Gateway, CloudFront)

    • AWS Shiled Advanced (ELB, Elastic IP, CloudFront)

    • Security Groups for EC2 and ENI resources in VPC.

  • CloudFront and Route53:

    • Availability protection using global edge network.

    • Combined with AWS Shield, provides DDoS attack mitigation at the edge.

  • Be ready to scale: leverage AWS Auto Scaling.

  • Separate static resouces (S3 / CloudFront) from dynamic ones (EC2 / ALB).

Inspection Tools

  • AWS Inspector

    • Vulnerability analysis for unintended network accessibility of your running EC2 instances. (not an AMI scan)

    • AWS Inspector Agent must be installed on OS in EC2 instances for analysis.

    • Define template (rules package, duration, attributes, SNS topics).

    • No custom rules support yet (only AWS managed rules).

    • After the assessment, you get a report with a list of vulnerabilities.

Last updated