SEC05-BP03 Implement inspection-based protection
Set up traffic inspection points between your network layers to make sure data in transit matches the expected categories and patterns. Analyze traffic flows, metadata, and patterns to help identify, detect, and respond to events more effectively.
Desired outcome: Traffic that traverses between your network layers are inspected and authorized. Allow and deny decisions are based on explicit rules, threat intelligence, and deviations from baseline behaviors. Protections become stricter as traffic moves closer to sensitive data.
Common anti-patterns:
-
Relying solely on firewall rules based on ports and protocols. Not taking advantage of intelligent systems.
-
Authoring firewall rules based on specific current threat patterns that are subject to change.
-
Only inspecting traffic where traffic transits from private to public subnets, or from public subnets to the Internet.
-
Not having a baseline view of your network traffic to compare for behavior anomalies.
Benefits of establishing this best practice: Inspection systems allow you to author intelligent rules, such as allowing or denying traffic only when certain conditions within the traffic data exist. Benefit from managed rule sets from AWS and partners, based on the latest threat intelligence, as the threat landscape changes over time. This reduces the overhead of maintaining rules and researching indicators of compromise, reducing the potential for false positives.
Level of risk exposed if this best practice is not established: Medium
Implementation guidance
Have fine-grained control over both your stateful and stateless
network traffic using AWS Network Firewall, or other
Firewalls
Both the AWS Network Firewall and vendor solutions that use a GWLB
support different inline inspection deployment models. For
example, you can perform inspection on a per-VPC basis, centralize
in an inspection VPC, or deploy in a hybrid model where east-west
traffic flows through an inspection VPC and Internet ingress is
inspected per-VPC. Another consideration is whether the solution
supports unwrapping Transport Layer Security (TLS), enabling deep
packet inspection for traffic flows initiated in either direction.
For more information and in-depth details on these configurations,
see the
AWS Network Firewall Best Practice guide
If you are using solutions that perform out-of-band inspections,
such as pcap analysis of packet data from network interfaces
operating in promiscuous mode, you can
configure VPC
traffic mirroring. Mirrored traffic counts towards the
available bandwidth of your interfaces and is subject to the same
data transfer charges as non-mirrored traffic. You can see if
virtual versions of these appliances are available on the
AWS Marketplace
For components that transact over HTTP-based protocols, protect
your application from common threats with a web application
firewall (WAF). AWS WAF
You can centrally manage AWS WAF, AWS Shield Advanced, AWS Network Firewall, and Amazon VPC security groups across your AWS
Organization
with AWS Firewall Manager
Implementation steps
-
Determine if you can scope inspection rules broadly, such as through an inspection VPC, or if you require a more granular per-VPC approach.
-
For inline inspection solutions:
-
If using AWS Network Firewall, create rules, firewall policies, and the firewall itself. Once these have been configured, you can route traffic to the firewall endpoint
to enable inspection. -
If using a third-party appliance with a Gateway Load Balancer (GWLB), deploy and configure your appliance in one or more availability zones. Then, create your GWLB, the endpoint service, endpoint, and configure routing for your traffic.
-
-
For out-of-band inspection solutions:
-
Turn on VPC Traffic Mirroring on interfaces where inbound and outbound traffic should be mirrored. You can use Amazon EventBridge rules to invoke an AWS Lambda function to turn on traffic mirroring on interfaces when new resources are created. Point the traffic mirroring sessions to the Network Load Balancer in front of your appliance that processes traffic.
-
-
For inbound web traffic solutions:
-
To configure AWS WAF, start by configuring a web access control list (web ACL). The web ACL is a collection of rules with a serially processed default action (ALLOW or DENY) that defines how your WAF handles traffic. You can create your own rules and groups or use AWS managed rule groups in your web ACL.
-
Once your web ACL is configured, associate the web ACL with an AWS resource (like an Application Load Balancer, API Gateway REST API, or CloudFront distribution) to begin protecting web traffic.
-
Resources
Related documents:
Related examples:
Related tools: