Securing Your Amazon Web Services Virtual Networks

Similar documents
Securing Your Microsoft Azure Virtual Networks

McAfee Virtual Network Security Platform

Securing the Software-Defined Data Center

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

McAfee Public Cloud Server Security Suite

McAfee Advanced Threat Defense

Defend Against the Unknown

McAfee Endpoint Threat Defense and Response Family

McAfee epolicy Orchestrator

Comprehensive Database Security

Services solutions for Managed Service Providers (MSPs)

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

The threat landscape is constantly

McAfee Network Security Platform

McAfee Network Security Platform

SIEM: Five Requirements that Solve the Bigger Business Issues

Solution Overview Gigamon Visibility Platform for AWS

Building Resilience in a Digital Enterprise

McAfee Database Security Insights

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

SIEMLESS THREAT DETECTION FOR AWS

McAfee Network Security Platform

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

SIEM Solutions from McAfee

Security for the Cloud Era

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Total Threat Protection. Whitepaper

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Clearing the Path to Micro-Segmentation. A Strategy Guide for Implementing Micro- Segmentation in Hybrid Clouds

Security by Default: Enabling Transformation Through Cyber Resilience

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

McAfee Embedded Control

AWS Reference Design Document

Next Generation Privilege Identity Management

Compare Security Analytics Solutions

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Security

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

McAfee Total Protection for Data Loss Prevention

Best Practices in Securing a Multicloud World

Simplify Hybrid Cloud

McAfee Network Security Platform 9.2

Qualys Cloud Platform

PROTECT WORKLOADS IN THE HYBRID CLOUD

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Data Sheet Gigamon Visibility Platform for AWS

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

McAfee Network Security Platform Administration Course

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

Office 365 Buyers Guide: Best Practices for Securing Office 365

Cisco Cloud Application Centric Infrastructure

Load Balancing with McAfee Network Security Platform

Securing the Modern Data Center with Trend Micro Deep Security

SYMANTEC DATA CENTER SECURITY

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Copyright 2011 Trend Micro Inc.

Enhanced Threat Detection, Investigation, and Response

EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud

McAfee Network Security Platform

McAfee Network Security Platform 9.2

McAfee Web Gateway Administration

SIEMLESS THREAT MANAGEMENT

CLOUD WORKLOAD SECURITY

McAfee Network Security Platform 9.1

McAfee Cloud Workload Security Product Guide

Imperva Incapsula Website Security

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

McAfee Endpoint Security

Software-Defined Secure Networks in Action

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Security and PCI Compliance for Retail Point-of-Sale Systems

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

align security instill confidence

Everything visible. Everything secure.

Automating the Top 20 CIS Critical Security Controls

McAfee Skyhigh Security Cloud for Amazon Web Services

Cognito Detect is the most powerful way to find and stop cyberattackers in real time

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Digital Workspace SHOWDOWN

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

Nuage Networks Product Architecture. White Paper

Pulse Secure Application Delivery

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Sustainable Security Operations

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

SECURITY-AS-A-SERVICE BUILT FOR AWS

McAfee Embedded Control

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

McAfee Virtual Network Security Platform 8.4 Revision A

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

Transcription:

Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload, often taking only a few minutes, with additional capacity being readily available to add as needed. Amazon Web Services (AWS) is a popular choice for cloud infrastructure and platform services. The agility AWS offers fits well within the context of modern, global markets and economies. 1 Securing Your Amazon Web Services s

Public clouds offer convenience, cost savings, and the opportunity to shift from a capital expenditure to an operational expense model. They also offer highly scalable and flexible infrastructure, often more than most organizations could accomplish on their own. Despite these gains, you are still responsible for protecting your data and the software you run in the cloud. While AWS provides world-class services that are secure at the infrastructure level, such as the physical elements of storage and databases, they make it clear through their Shared Responsibility Model that their customers are ultimately responsible for protecting everything they are deploying in the AWS infrastructure which translates into everything above the physical infrastructure and hypervisors. AWS provides security of the cloud, and enterprises must protect what they are deploying in the cloud. Almost all organizations use additional security products for their AWS deployments, but many do not realize that the virtual networks accompanying AWS workloads are part of their security responsibility. Deep inspection of traffic bound for workloads, looking for remote calls, application denials of service, or even evidence of callbacks, is out of scope for the infrastructure protection AWS provides. Top Challenges for Protecting Workloads in AWS Organizations typically lack the capability to detect and block known and unknown threats across virtual networks in public cloud environments such as AWS. Here are some of the top challenges: CUSTOMER AWS RESPONSIBLE FOR SECURITY IN THE CLOUD RESPONSIBLE FOR SECURITY OF THE CLOUD CUSTOMER DATA Figure 1. AWS Shared Responsibility Model (https://aws.amazon.com/compliance/shared-responsibility-model) Protection of the organization s public cloud deployment: Performing microsegmentation to apply appropriate security policies to different workloads. Ensuring that security policies stay in place and move along with dynamic workloads. Protecting the operating system and applications from known exploits, malware, and zero-day attacks. Protecting virtual private clouds such as Amazon in a multi-tenant environment. PLATFORM, APPLICATIONS, IDENTITY, AND ACCESS MANAGEMENT OPERATING SYSTEM, NETWORK, AND FIREWALL CONFIGURATION CLIENT-SIDE DATA ENCRYPTION AND DATA INTEGRITY AUTHENTICATION COMPUTE STORAGE DATABASE AWS GLOBAL INFRASTRUCTURE SERVER-SIDE ENCRYPTION (FILE SYSTEM AND/OR DATA) REGIONS AVAILABILITY ZONES NETWORK TRAFFIC PROTECTION (ENCRYPTION/INTEGRITY/ IDENTITY) NETWORKING EDGE LOCATIONS 2 Securing Your Amazon Web Services s

Detection of threats that successfully infiltrate public cloud environments: Visibility of malicious activity in the public cloud. Detecting not just north-south, but also east-west attacks. In addition, many organizations have insufficient staffing, and those available may not have the expertise in virtualized, public clouds to properly secure the environment. What s Different About Cloud Scalability The public cloud provides organizations with benefits such as nearly unlimited scalability with on-demand resources readily available as needed, so any changes in activity level can be handled very easily. IT point of view: What IT desires is security that can scale along with their workloads, since cloud workloads scale dynamically and security must be able to scale with increasing demands, while at the same time be lightweight enough to not impact performance of the applications running in the cloud. Protection and Detection Traditional security solutions were not designed for the public cloud, and something that works well for onpremises deployments is often not appropriate. IT point of view: IT is seeking to understand how to properly protect their public cloud workloads and ensure that they can continue to protect the business, including these off-premises deployments. Manageability and Automation administrators are struggling to deliver security at the same speed of current cloud automation workflows. Cloud automation enables infrastructure to scale rapidly, but security automation is still lagging behind. IT point of view: IT is looking for a way for administrators to view all cloud workloads and apply the proper network security controls, ideally using a single console from where they can manage not only public cloud security but also protect their on-premises deployments. To keep up with cloud deployment practices such as automation, security needs to embrace automation since manually managing highly elastic cloud deployments is not feasible. The Solution understands the complexity of public cloud and has designed a security architecture specifically for AWS. This includes not only new processes and techniques to protect the entire stack and capabilities to inspect north-south as well as east-west traffic, but also the ability to manage across hybrid environments with one management tool and with one security policy. Platform ( vnsp) addresses the customer responsibility for applying Network Traffic Protection in AWS with an advanced level of security. It provides a full-featured, software-only intrusion prevention system (IPS) for AWS cloud deployments. It is a complete IPS and intrusion detection system (IDS) that protects applications and operating systems from known and unknown threats. 3 Securing Your Amazon Web Services s

vnsp supports today s leading public cloud service AWS delivering complete visibility to data traversing through a network gateway, as well as bidirectional east-west traffic to protect against intrusion to critical assets. With this threat intelligence in hand, administrators can reduce visibility gaps, increase security, and extend compliance into public cloud architectures. Key Benefits Platform provides a set of key benefits when protecting deployments in the AWS public cloud infrastructure: Scalability: vnsp scales based upon the changing dynamics of virtualized workloads in clouds such as AWS. In the event of a network burst causing increased traffic, vnsp automatically scales to meet workload demands by deploying additional sensors as needed to meet the required throughput performance. With support for network virtualization, administrators can quickly deliver network protection to new, existing and moving workloads. Protection and Detection: vnsp scales across the virtual data center to protect against advanced threats and lateral movement with true east-west network protection in addition to north-south traffic inspection. Virtual Network Platform s signature-less engines intelligently identify the intent of network traffic and can block attacks for which no signatures exist, such as advanced targeted attacks or new threats that have not been seen before. Manageability and automation: vnsp provides security administrators with a single pane of glass that enables visibility and control for workloads across all cloud environments. Platform also supports AWS Identity and Access Management (IAM), enabling administrators to easily and securely manage access to AWS services and resources based upon permissions assigned to specific users and groups. Furthermore, instead of needing to process an abundance of alerts, Platform displays actionable data via preconfigured, guided workflows. This approach reduces expertise needed to monitor and investigate. It is worth diving a bit deeper into Virtual Network Platform s capabilities to protect AWS cloud deployments and the manageability advantages provided to security administrators. More details about these benefits are discussed below. Key Advantages Virtual deployment built to protect public cloud workloads Advanced threat prevention Signature-less, advanced malware analysis In-line browser and JavaScript emulation Advanced botnet and malware callback detection Behavior-based analysis and DDoS protection Integration with Advanced Threat Defense Automatic scaling of sensors to meet performance demands Supports AWS IAM for access management and control 4 Securing Your Amazon Web Services s

Unparalleled Threat Detection and Protection Platform is based on a next-generation inspection architecture designed to deliver deep inspection of virtual network traffic. It uses a combination of advanced inspection technologies including full protocol analysis, threat reputation, behavior analysis, and advanced malware analysis to detect and prevent both known and zeroday attacks on the network. No single malware detection technology can prevent all attacks, which is why vnsp layers multiple signature and signature-less detection engines to help prevent unwanted malware from wreaking havoc in your clouds. Most network threat solutions rely on signature-based inspection. However, today s advanced targeted attacks are usually new and unknown. Since no signatures exist for these attacks, they are often missed. vnsp delivers numerous inspection technologies, like in-line emulation of Browser, JavaScript, and Adobe files, botnet and malware callback detection, behavior-based distributed denial-of-service (DDoS) detection, and protection from advanced attacks like cross-site scripting and SQL injection. also supports the use of Snort signatures to detect and protect against malware. vnsp can also identify and block the stealthiest of files via integration with Advanced Threat Defense, where files are submitted for in-depth behavior analysis. Platform provides many other benefits, such as web application firewalling (WAF) to protect against application DDos, SQL injections and more. For a complete set of features, please refer to the datasheet. North-south and east-west traffic protection Platform provides north-south as well as east-west traffic inspection between AWS cloud servers. With these methods, it can inspect for threats that attempt to move laterally. Unlike current solutions in the market, delivers a full-protection mode IPS on AWS. An overview of the north-south traffic inspection is provided in Figure 2. On-Premises AWS VPN Network Platform Controller Cloud Workload Network Manager Network Manager Admin Peering NS Series Elastic Load Balancing Internet Availability Zone #1 Virtual 61!7-- Network 8$3'2#%)9-':+3;) 0-,<+3 Group Cloud-Ready Architecture An innovative approach to AWS inspection provides true eastwest traffic protection in the public cloud Single centralized management console for on-premises physical and virtual IPS sensors in AWS One license allows throughput sharing across any combination of public and private clouds Use Case: North-South Traffic Inspection Internet Gateway Availability Zone #2 Group Figure 2. An overview of the Platform for AWS. 5 Securing Your Amazon Web Services s

Use Case: East-West Traffic Inspection AWS Intelligent Management Network Platform Flow Logs API Logs Vul Scan Logs Zone #1 Zone #2 Intelligent alert correlation and prioritization Robust malware investigation dashboards Controller Cloud Workload Network Manager Peering 8$3'2#%)9-':+3;) 0-,<+3 Group 0-,<+3 Group Preconfigured investigation workflows Scalable web-based management Figure 3. Platform protects east-west traffic in AWS. In addition, vnsp provides east-west traffic inspection, which helps prevent malware from spreading laterally (Figure 3). Without this protection, threats could spread swiftly without being detected. When traffic flows to a virtual machine, the virtual probe that is installed in the virtual machine intercepts traffic and forwards it to the virtual IPS sensor for inspection. The sensor then scans the traffic for any malicious activity. If there is no threat, the traffic is returned back to the virtual machine. If a threat is found, depending on the policy configuration, the sensor will either drop the traffic or return the traffic after generating an alert in the Network Manager. Management Streamline workflows and analytics Discover and block the most sophisticated threats with ease. vnsp includes advanced analytics and integrations with additional security solutions to create a truly comprehensive and connected network threat detection and mitigation platform. Modern threats can generate large volumes of alerts, quickly outpacing a security operator s ability to prioritize and track them. If the dots are not connected in time, real threats can slip by undetected. Network Platform includes out-of-the-box advanced analytics and actionable workflows correlate multiple IPS alerts into a single, actionable event, helping administrators rapidly cut through the noise and get to relevant, actionable information. 6 Securing Your Amazon Web Services s

With intelligent workflows centered on malware detection and breach discovery, alert noise is reduced, user error is minimized, and operators are allowed to focus on the key data needed to protect their environment. Centralized Management with Real-Time Control of Real-Time Data A single Network Manager appliance delivers centralized, web-based management and unrivaled ease of use. The state-of-the-art console and enhanced graphical user interface put you in control of real-time data. You can easily manage, configure, and monitor not only your virtual IPS appliance but also all Network Platform appliances, virtual or physical, as well as Network Threat Behavior Analysis appliances across your traditional, private, and public cloud resources from a single console. In summary, Platform is a complete network threat and intrusion prevention system (IPS) solution built for the unique demands of AWS environments. It helps discover and block sophisticated threats in cloud architectures with accuracy and simplicity, enabling organizations to restore compliance and embrace the cloud with confidence. Advanced technologies include signature-less detection, in-line emulation, signature-based vulnerability patching, and support for Amazon Web Services (AWS) and network virtualization. With streamlined workflows, multiple integration options, and simplified licensing, organizations can easily manage and scale their security in the most complex cloud architectures. 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com technologies features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Learn more at mcafee.com. No network can be absolutely secure. and the logo are trademarks or registered trademarks of, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Copyright 2018, LLC. 3773_0318 MARCH 2018 7 Securing Your Amazon Web Services s