SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
Best Of The World In Security Conference
Best Of The World In Security
12-13 November 2020
Cloud Security
Limitations of Cloud Security Groups and Flow logs
Avishag Daniely
Guardicore
S. Director of Product Marketing
@avishugz
Best Of The World In Security Conference
Boulderer,
Painter,
Yogarer,
Dog lover
Fluent in 3
languages +
Learning
Chinese
Cyber Geek for
11+ years,
Passion for
Products,
Marketing and
Growth
About Me
Best Of The World In Security Conference
Agenda
• The shift away from perimeters
• Top Cloud Security Threats
• Azure Terminology
• NSGs and ASGs
• Cloud Security Groups
• Flow Logs
• Limitations - Scenario Deep Dives
• Single vNet
• Multi vNet
• Multi Cloud
• AWS Security Groups and ACLs
Best Of The World In Security Conference
We now live in a world with no defined
perimeters
Best Of The World In Security Conference
We are in the era of hybrid-cloud
You own it: bare metals, routers,
access switches
1993
Internet is more popular than ever,
Facebook and Google emerge, SSL is
the thing
2005
The cloud is born. You no longer
own all the infrastructure
2006–2010
Containers are introduced to the
world
2013
Data centers are hybrid. Virtual,
Cloud, Bare Metal, serverless, VDI,
laptops, DaaS - people work from
Anywhere and everywhere
2021
Best Of The World In Security Conference
90% OF BUSINESS ARE IN THE
CLOUD
45% OF INFECTION VECTORS ARE
BASED ON CLOUD APPLICATIONS
Based on 451 Based on X-Force
Best Of The World In Security Conference
Access
Management
Network
Misconfigurations
Data Breaches
and Data Leaks
Insecure APIs Data Loss
Top Cloud Security Threats
Best Of The World In Security Conference
Some Concepts
Best Of The World In Security Conference
VNET vs VPC
VNET – AZURE VPC – AWS
More info here
Best Of The World In Security Conference
Cloud Security Groups
Best Of The World In Security Conference
Source: arcitura
Best Of The World In Security Conference
Azure Security Groups
Best Of The World In Security Conference
Azure Security Groups
The
difference
NSG is the Azure Resource that you will use to enforce and
control the network traffic with
ASG is an object reference within a Network Security Group.
ASG & NSG
NSG’s (Network Security Group) & ASG’s (Application Security
Group) are used to administrate and control network traffic
within a virtual network (vNET).
Best Of The World In Security Conference
NSGs
NSG’s control access by permitting or
denying network traffic
Between different workloads on a vNET
From on-site environment into Azure
Directly from the internet
Theoretically: NSGs are a group of ACL rules that either allow or deny network
traffic to a specific destination located on your vNET.
All traffic entering or leaving your Azure network can be processed via the NSG
They can be applied either on a virtual machine or subnet (one NSG can be
applied to multiple subnets or virtual machines)
Best Of The World In Security Conference
ASGs
Used within an NSG to apply a
network security rule to a specific
workload or group of VMs
Typically used for
scalability
Creating the virtual
machine and assigning
it to an ASG will provide
it with all the NSG rules
in place for that specific
ASG
Best Of The World In Security Conference
Limitations in a single vNet
Best Of The World In Security Conference
Simulation
Time –
Application
Migration
to Azure
Our Goal:
Migrate App SWIFT to Azure
Azure setup:
Single vNet – subnet 10.0.2.0/24
vNet region – Brazil
NSG assigned to our vNet
ASGs assigned per Server roles
Best Of The World In Security Conference
• The NSG
• The ASGs
Best Of The World In Security Conference
What this looks like
Brazil Customer vNet –
NSG assigned
swift-all
swift-apps
swift-DBS
swift-LBS
Best Of The World In Security Conference
Following NSG rules were set:
• Load Balancers to Web Servers, over specific ports, allow
• Web Servers to Databases, over specific ports, allow
• Deny all else between SWIFT servers.
Best Of The World In Security Conference
What this looks like
Brazil Customer vNet –
NSG assigned
swift-all
swift-apps
swift-DBS
swift-LBS
Best Of The World In Security Conference
The problem
A critical backup operation fails What can be the cause?
A configuration issue within the application, not
policy related at all.
The ASGs are misconfigured while NSGs are
configured correctly.
The ASGs are configured correctly but the NSGs
are misconfigured.
Best Of The World In Security Conference
Flow Logs
Best Of The World In Security Conference
Flow log
limitations
• Dynamic IPs make it nearly impossible to
track changes
• Needle in a haystack – with no context of
time or which server is the culprit
• No Security Groups affect on traffic, only
blocked indication, but by which rule?
• No application or user context – only Ips
and ports
Best Of The World In Security Conference
Simulation
Time –
Let’s block
threats
Our Goal:
Block Telnet & Insecure FTP
Block a malware propegation
Azure setup (same):
Single vNet – subnet 10.0.2.0/24
vNet region – Brazil
NSG assigned to our vNet
ASGs assigned per Server roles
Best Of The World In Security Conference
Security Group
limitations
• Block Telnet – Block over port 23
• Block FTP – HOW?
• 21 not enough
• What about dynamic high ports?
• Block malware propagation – HOW?
• Ports? Not good enough
• No application aware policies!
• No process level policies!
Best Of The World In Security Conference
Limitation in multiple vNets
Best Of The World In Security Conference
Simulation
Time –
Policies
between
applications,
between
VNets
Our Goal:
Security Policies between CMS to Billing
and SWIFT
Azure setup:
2 vNets
vNet1 region – Brazil
vNet2 region - West Europe
NSG assigned to each vNet
ASG assigned per app
Best Of The World In Security Conference
• The NSG
• The ASGs
Best Of The World In Security Conference
Brazil Customer vNet
App_Swift
Billing_all
West Europe Customer vNet
CMS_ALL_Servers
Best Of The World In Security Conference
What’s our goal?
Allow CMS over port 80 to SWIFT
and Billing
Block all other port 80
Best Of The World In Security Conference
The problem
Would it be possible to create a rule with an
ASG for the CMS App servers to the SWIFT &
Billing applications even though they are in
separate vNets?
Best Of The World In Security Conference
NO
Best Of The World In Security Conference
According to Azure documentation
Each subscription in Azure is assigned to a specific, single, region.
Multiple subscriptions cannot share the same vNet.
NSGs can only be applied within a vNet.
Best Of The World In Security Conference
documentation
“If you specify an application security group as the source and
destination in a security rule, the network interfaces in both application
security groups must exist in the same virtual network. For example, if
AsgLogic contained network interfaces from VNet1, and
AsgDbcontained network interfaces from VNet2, you could not assign
AsgLogic as the source and AsgDb as the destination in a rule. All
network interfaces for both the source and destination application
security groups need to exist in the same virtual network.”
Best Of The World In Security Conference
It is not possible to create policies for
applications spanning vNets or Regions!
Best Of The World In Security Conference
Limitation in multi-cloud
Best Of The World In Security Conference
Simulation
Time –
Application
Migration
from Azure
to AWS
Our Goal:
Migrate App CMS from Azure to AWS
Azure setup:
2 vNets, Brazil & West Europe
AWS setup:
Single VPC
Best Of The World In Security Conference
• The NSG
• The ASGs
Best Of The World In Security Conference
• The rules
Best Of The World In Security Conference
Migrating The policy Rules from Azure to
AWS
Deny rules in Azure Security Groups must be translated into
either:
• Allow rules for all other traffic in AWS security groups
• Network layer deny rules in AWS access control lists (ACLs).
Best Of The World In Security Conference
AWS ACLs & Sec Groups
Sec Groups
Security groups are applied at the EC2 level and are tied to an asset,
not an IP. They only enable whitelisting traffic and are stateful. This is
the first layer of defense; thus traffic must be allowed by Security
Groups to then be analyzed by an ACL.
ACLs
Access control lists are applied at the VPC level, thus are directly tied
to IPs. They support both allow and deny rules, but as they are tied to
specific IPs, they do not support blocking by application context. They
are not stateful and thus are not valid for compliance requirements.
Best Of The World In Security Conference
AWS security
groups vs ACLs
Security groups
• do not support blacklisting functionalities and
only enable whitelisting
ACLs
• support both deny and allow rules but are
tied to an IP address within a VPC, enabling
blocking only static IPs or a whole subnet
Best Of The World In Security Conference
Simulation
Time –
Policies
cross cloud
Our Goal:
Accounting App in AWS must access ONLY
the Billing App in Azure (and no other app in
azure)
Azure setup:
2 vNets, Brazil & West Europe
AWS setup:
Single VPC, London
Best Of The World In Security Conference
The
problem
Cloud providers’ native tools do not offer full
support for other providers’ clouds, which can
limit their usability in multicloud environments
Best Of The World In Security Conference
Security
Groups
Limitations Azure and AWS Security Groups or ACLs
enable controlling cross-cloud traffic based
only on the public IPs of the cloud
providers
Best Of The World In Security Conference
Sum Up -
Limitations
Azure Security Groups & Flow logs
• Limited visibility
• No policy simulation or indication of impact on traffic
• NSGs can only be applied within a Vnet
• Multiple subscriptions cannot share the same VNet
• To allow connections between clouds, one must permit
the whole cloud range to communicate
• Default NSGs are set in a permissive mode from day 1
• ASGs are assigned to assets by IPs. What if the ip is
dynamic? needs to change?
Best Of The World In Security Conference
Sum Up -
Limitations
AWS Security Groups & ACLs
• Limited visibility
• No policy simulation or indication of impact on
traffic
• Security groups only enable Allow, no deny
• AWS ACLs support both deny and allow
rules, but are tied to an IP address within a
VPC in AWS, enabling blocking only static
IPs or a whole subnet
Best Of The World In Security Conference
Thank You!
@avishugz
avishag-daniely

Contenu connexe

Tendances

QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 

Tendances (20)

From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 

Similaire à Cloud Security: Limitations of Cloud Security Groups and Flow Logs

Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh BoddapatiPolicy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
buildacloud
 

Similaire à Cloud Security: Limitations of Cloud Security Groups and Flow Logs (20)

A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Alcatel-Lucent Tech Symposium 2013: SDN: Innovating for Growth with Nuage Net...
Alcatel-Lucent Tech Symposium 2013: SDN: Innovating for Growth with Nuage Net...Alcatel-Lucent Tech Symposium 2013: SDN: Innovating for Growth with Nuage Net...
Alcatel-Lucent Tech Symposium 2013: SDN: Innovating for Growth with Nuage Net...
 
Cisco Cloud Connect Solutions Extend Your Private Network to AWS and Maintain...
Cisco Cloud Connect Solutions Extend Your Private Network to AWS and Maintain...Cisco Cloud Connect Solutions Extend Your Private Network to AWS and Maintain...
Cisco Cloud Connect Solutions Extend Your Private Network to AWS and Maintain...
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Learn How Salesforce used ADCs for App Load Balancing for an International Ro...
Learn How Salesforce used ADCs for App Load Balancing for an International Ro...Learn How Salesforce used ADCs for App Load Balancing for an International Ro...
Learn How Salesforce used ADCs for App Load Balancing for an International Ro...
 
MSC202_Learn How Salesforce Used ADCs for App Load Balancing for an Internati...
MSC202_Learn How Salesforce Used ADCs for App Load Balancing for an Internati...MSC202_Learn How Salesforce Used ADCs for App Load Balancing for an Internati...
MSC202_Learn How Salesforce Used ADCs for App Load Balancing for an Internati...
 
AWS Lunch and Learn - Security
AWS Lunch and Learn - SecurityAWS Lunch and Learn - Security
AWS Lunch and Learn - Security
 
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh BoddapatiPolicy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
 
Secure SDN
Secure SDNSecure SDN
Secure SDN
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption
 
Introducing Azure Arc
Introducing Azure ArcIntroducing Azure Arc
Introducing Azure Arc
 
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
 
Firewalling a Service Mesh with WebAssembly.pdf
Firewalling a Service Mesh with WebAssembly.pdfFirewalling a Service Mesh with WebAssembly.pdf
Firewalling a Service Mesh with WebAssembly.pdf
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWS
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerů
 
Cloud On-Ramp Project Briefing
Cloud On-Ramp Project BriefingCloud On-Ramp Project Briefing
Cloud On-Ramp Project Briefing
 

Plus de Priyanka Aash

Plus de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Cloud Security: Limitations of Cloud Security Groups and Flow Logs

  • 1. Best Of The World In Security Conference Best Of The World In Security 12-13 November 2020 Cloud Security Limitations of Cloud Security Groups and Flow logs Avishag Daniely Guardicore S. Director of Product Marketing @avishugz
  • 2. Best Of The World In Security Conference Boulderer, Painter, Yogarer, Dog lover Fluent in 3 languages + Learning Chinese Cyber Geek for 11+ years, Passion for Products, Marketing and Growth About Me
  • 3. Best Of The World In Security Conference Agenda • The shift away from perimeters • Top Cloud Security Threats • Azure Terminology • NSGs and ASGs • Cloud Security Groups • Flow Logs • Limitations - Scenario Deep Dives • Single vNet • Multi vNet • Multi Cloud • AWS Security Groups and ACLs
  • 4. Best Of The World In Security Conference We now live in a world with no defined perimeters
  • 5. Best Of The World In Security Conference We are in the era of hybrid-cloud You own it: bare metals, routers, access switches 1993 Internet is more popular than ever, Facebook and Google emerge, SSL is the thing 2005 The cloud is born. You no longer own all the infrastructure 2006–2010 Containers are introduced to the world 2013 Data centers are hybrid. Virtual, Cloud, Bare Metal, serverless, VDI, laptops, DaaS - people work from Anywhere and everywhere 2021
  • 6. Best Of The World In Security Conference 90% OF BUSINESS ARE IN THE CLOUD 45% OF INFECTION VECTORS ARE BASED ON CLOUD APPLICATIONS Based on 451 Based on X-Force
  • 7. Best Of The World In Security Conference Access Management Network Misconfigurations Data Breaches and Data Leaks Insecure APIs Data Loss Top Cloud Security Threats
  • 8. Best Of The World In Security Conference Some Concepts
  • 9. Best Of The World In Security Conference VNET vs VPC VNET – AZURE VPC – AWS More info here
  • 10. Best Of The World In Security Conference Cloud Security Groups
  • 11. Best Of The World In Security Conference Source: arcitura
  • 12. Best Of The World In Security Conference Azure Security Groups
  • 13. Best Of The World In Security Conference Azure Security Groups The difference NSG is the Azure Resource that you will use to enforce and control the network traffic with ASG is an object reference within a Network Security Group. ASG & NSG NSG’s (Network Security Group) & ASG’s (Application Security Group) are used to administrate and control network traffic within a virtual network (vNET).
  • 14. Best Of The World In Security Conference NSGs NSG’s control access by permitting or denying network traffic Between different workloads on a vNET From on-site environment into Azure Directly from the internet Theoretically: NSGs are a group of ACL rules that either allow or deny network traffic to a specific destination located on your vNET. All traffic entering or leaving your Azure network can be processed via the NSG They can be applied either on a virtual machine or subnet (one NSG can be applied to multiple subnets or virtual machines)
  • 15. Best Of The World In Security Conference ASGs Used within an NSG to apply a network security rule to a specific workload or group of VMs Typically used for scalability Creating the virtual machine and assigning it to an ASG will provide it with all the NSG rules in place for that specific ASG
  • 16. Best Of The World In Security Conference Limitations in a single vNet
  • 17. Best Of The World In Security Conference Simulation Time – Application Migration to Azure Our Goal: Migrate App SWIFT to Azure Azure setup: Single vNet – subnet 10.0.2.0/24 vNet region – Brazil NSG assigned to our vNet ASGs assigned per Server roles
  • 18. Best Of The World In Security Conference • The NSG • The ASGs
  • 19. Best Of The World In Security Conference What this looks like Brazil Customer vNet – NSG assigned swift-all swift-apps swift-DBS swift-LBS
  • 20. Best Of The World In Security Conference Following NSG rules were set: • Load Balancers to Web Servers, over specific ports, allow • Web Servers to Databases, over specific ports, allow • Deny all else between SWIFT servers.
  • 21. Best Of The World In Security Conference What this looks like Brazil Customer vNet – NSG assigned swift-all swift-apps swift-DBS swift-LBS
  • 22. Best Of The World In Security Conference The problem A critical backup operation fails What can be the cause? A configuration issue within the application, not policy related at all. The ASGs are misconfigured while NSGs are configured correctly. The ASGs are configured correctly but the NSGs are misconfigured.
  • 23. Best Of The World In Security Conference Flow Logs
  • 24. Best Of The World In Security Conference Flow log limitations • Dynamic IPs make it nearly impossible to track changes • Needle in a haystack – with no context of time or which server is the culprit • No Security Groups affect on traffic, only blocked indication, but by which rule? • No application or user context – only Ips and ports
  • 25. Best Of The World In Security Conference Simulation Time – Let’s block threats Our Goal: Block Telnet & Insecure FTP Block a malware propegation Azure setup (same): Single vNet – subnet 10.0.2.0/24 vNet region – Brazil NSG assigned to our vNet ASGs assigned per Server roles
  • 26. Best Of The World In Security Conference Security Group limitations • Block Telnet – Block over port 23 • Block FTP – HOW? • 21 not enough • What about dynamic high ports? • Block malware propagation – HOW? • Ports? Not good enough • No application aware policies! • No process level policies!
  • 27. Best Of The World In Security Conference Limitation in multiple vNets
  • 28. Best Of The World In Security Conference Simulation Time – Policies between applications, between VNets Our Goal: Security Policies between CMS to Billing and SWIFT Azure setup: 2 vNets vNet1 region – Brazil vNet2 region - West Europe NSG assigned to each vNet ASG assigned per app
  • 29. Best Of The World In Security Conference • The NSG • The ASGs
  • 30. Best Of The World In Security Conference Brazil Customer vNet App_Swift Billing_all West Europe Customer vNet CMS_ALL_Servers
  • 31. Best Of The World In Security Conference What’s our goal? Allow CMS over port 80 to SWIFT and Billing Block all other port 80
  • 32. Best Of The World In Security Conference The problem Would it be possible to create a rule with an ASG for the CMS App servers to the SWIFT & Billing applications even though they are in separate vNets?
  • 33. Best Of The World In Security Conference NO
  • 34. Best Of The World In Security Conference According to Azure documentation Each subscription in Azure is assigned to a specific, single, region. Multiple subscriptions cannot share the same vNet. NSGs can only be applied within a vNet.
  • 35. Best Of The World In Security Conference documentation “If you specify an application security group as the source and destination in a security rule, the network interfaces in both application security groups must exist in the same virtual network. For example, if AsgLogic contained network interfaces from VNet1, and AsgDbcontained network interfaces from VNet2, you could not assign AsgLogic as the source and AsgDb as the destination in a rule. All network interfaces for both the source and destination application security groups need to exist in the same virtual network.”
  • 36. Best Of The World In Security Conference It is not possible to create policies for applications spanning vNets or Regions!
  • 37. Best Of The World In Security Conference Limitation in multi-cloud
  • 38. Best Of The World In Security Conference Simulation Time – Application Migration from Azure to AWS Our Goal: Migrate App CMS from Azure to AWS Azure setup: 2 vNets, Brazil & West Europe AWS setup: Single VPC
  • 39. Best Of The World In Security Conference • The NSG • The ASGs
  • 40. Best Of The World In Security Conference • The rules
  • 41. Best Of The World In Security Conference Migrating The policy Rules from Azure to AWS Deny rules in Azure Security Groups must be translated into either: • Allow rules for all other traffic in AWS security groups • Network layer deny rules in AWS access control lists (ACLs).
  • 42. Best Of The World In Security Conference AWS ACLs & Sec Groups Sec Groups Security groups are applied at the EC2 level and are tied to an asset, not an IP. They only enable whitelisting traffic and are stateful. This is the first layer of defense; thus traffic must be allowed by Security Groups to then be analyzed by an ACL. ACLs Access control lists are applied at the VPC level, thus are directly tied to IPs. They support both allow and deny rules, but as they are tied to specific IPs, they do not support blocking by application context. They are not stateful and thus are not valid for compliance requirements.
  • 43. Best Of The World In Security Conference AWS security groups vs ACLs Security groups • do not support blacklisting functionalities and only enable whitelisting ACLs • support both deny and allow rules but are tied to an IP address within a VPC, enabling blocking only static IPs or a whole subnet
  • 44. Best Of The World In Security Conference Simulation Time – Policies cross cloud Our Goal: Accounting App in AWS must access ONLY the Billing App in Azure (and no other app in azure) Azure setup: 2 vNets, Brazil & West Europe AWS setup: Single VPC, London
  • 45. Best Of The World In Security Conference The problem Cloud providers’ native tools do not offer full support for other providers’ clouds, which can limit their usability in multicloud environments
  • 46. Best Of The World In Security Conference Security Groups Limitations Azure and AWS Security Groups or ACLs enable controlling cross-cloud traffic based only on the public IPs of the cloud providers
  • 47. Best Of The World In Security Conference Sum Up - Limitations Azure Security Groups & Flow logs • Limited visibility • No policy simulation or indication of impact on traffic • NSGs can only be applied within a Vnet • Multiple subscriptions cannot share the same VNet • To allow connections between clouds, one must permit the whole cloud range to communicate • Default NSGs are set in a permissive mode from day 1 • ASGs are assigned to assets by IPs. What if the ip is dynamic? needs to change?
  • 48. Best Of The World In Security Conference Sum Up - Limitations AWS Security Groups & ACLs • Limited visibility • No policy simulation or indication of impact on traffic • Security groups only enable Allow, no deny • AWS ACLs support both deny and allow rules, but are tied to an IP address within a VPC in AWS, enabling blocking only static IPs or a whole subnet
  • 49. Best Of The World In Security Conference Thank You! @avishugz avishag-daniely