aws re:invent 2016: how harvard university improves scalable cloud network security, visibility, and...

44
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Leo Zhadanovsky Principal Solutions Architect Amazon Web Services November 29, 2016 How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation SAC326 Thomas Vachon Manager of Cloud Architecture Harvard University

Upload: amazon-web-services

Post on 16-Apr-2017

406 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Leo ZhadanovskyPrincipal Solutions Architect

Amazon Web Services

November 29, 2016

How Harvard University Improves Scalable Cloud Network

Security, Visibility, and Automation

SAC326

Thomas VachonManager of Cloud Architecture

Harvard University

Page 2: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

What to expect from the session

Learn how Harvard designed and deployed the platform,

utilizing serverless architecture to orchestrate the solution

from within to protect their most sensitive data and afford

students, faculty, and staff the flexibility of cloud computing.

Page 3: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Connecting your on-premises

networks to Amazon VPCs

Page 4: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

How to connect to your VPC

• Bastion host

• Site-to-site VPN

• AWS Direct Connect

virtual private

cloud

corporate data

center

Page 5: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

How to connect to your VPC

• Bastion host

• Needs Elastic IP address

• Adds extra hop

• Single point of failure

• Simple

virtual private cloudcorporate data center

Bastion HostServer

Page 6: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

How to connect to your VPC

• Site-to-site VPN

• AWS: Virtual private gateway

• On-premises: Customer gateway

• IKE, IPSec v2, BGP (optional but preferred)

• Can run into bandwidth limit with on-premises VPN devices

virtual private cloud

customer

gateway

VPN

gateway

VPN

connection

corporate data center

Page 7: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

How to connect to your VPC

• AWS Direct Connect

• Dedicated, fiber connection between AWS and on-premises

• Available in 1 Gbps, 10 Gbps

• Many PoPs around the world

• Public and private VIFs available

• Transit over AWS backbone for US regions

• Routing priority

Virtual private cloud

customer

gateway

VPN

gateway

Corporate data center

AWS Direct

Connect

Page 8: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Network security options

Page 9: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Controlling network access in a VPC

• Security groups

• Network ACLs

• Routing tables

• Internet gateway

• NAT gateway

• S3 private endpoint

Internet

gateway

Route table

Security

group

VPC subnet

Page 10: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Network visibility

• AWS CloudTrail

• VPC Flow Logs

• Amazon S3 bucket logs

• Elastic Load Balancing logs

• AWS Config Flow logsAWS

CloudTrail

AWS

Config

Page 11: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

IDS/IPS

• Agent-based solutions

• Available in AWS Marketplace

• Examples: Trend Micro Deep Security, Alert Logic Threat

Manager

• Costs usually scale by number of hosts

• Inline solutions

• Available in AWS Marketplace

• Examples: Cisco, Brocade, Fortinet, Palo Alto

• Single point of failure

Page 12: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

IDS/IPS

• Egress through Direct Connect

• Use on-premises IDS/IPS devices

• There should be redundant Direct Connects

• Ideally, also diverse paths

• On-premises network becomes single point of failure for AWS

Internet connectivity

• Makes DNS more interesting

Page 13: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Harvard Cloud Shield

Page 14: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

What is Cloud Shield?

• Network security platform

• Traffic aggregation and

inspection points

• Redundant and

geographically diverse

points of presence

Page 15: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Goals and alternatives

Page 16: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Solution overview: Design goals

• Provide highly available network access to the cloud

• Provide visibility of traffic into, out of, and between

applications

• Provide next-gen firewall protections such as IPS and

antivirus

• Provide simpler configuration through inline filtering

Page 17: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Security agents

• Easier configuration

• No additional overhead costs

• More expensive for customers

• Reactive response

Solution overview: Other options

Inline virtual firewalls

• Proactive response

• Cheaper for customers

• Very high overhead costs

• Complex VPC routing

Page 18: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Technical design overview

Page 19: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Network connectivity

Page 20: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Connectivity (2015)

Page 21: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Connectivity 2016 proposed

Page 22: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Connectivity 2016 actual

Page 23: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Network connectivity: Overview

• Four connections to AWS over Direct Connect

• Two private links between Harvard’s campus and

Virginia network point of presence

• No common spans or buildings between any links

Page 24: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Network design

Page 25: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)
Page 26: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)
Page 27: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)
Page 28: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)
Page 29: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)
Page 30: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Routing in detail

Page 31: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Routing in detail: Direct Connect

config router bfd

config neighbor

edit 10.254.1.4

set interface ”vlan10"

edit "10.254.1.4"

set advertisement-interval 1

set activate6 disable

set bfd enable

set prefix-list-in "vpc-cidr-network"

set remote-as 7224

set route-map-out "prepend-ASN"

set send-community6 disable

end

Page 32: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Routing in detail: Upstream router

template peer-policy cs-aws-peering

default-originate

advertisement-interval 0

send-community exit-peer-policy

template peer-session cs-aws-peering

timers 10 30

fall-over bfd

exit-peer-session

neighbor 10.254.1.2 remote-as 64816

neighbor 10.254.1.2 inherit peer-session cs-aws-peering

neighbor 10.254.1.2 description EBGP to atsdev1

address-family ipv4

aggregate-address 198.54.100.0 255.255.255.0 summary-only

Page 33: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Routing in detail: Key route filtering

config router prefix-list

edit “pub-nets”

set prefix 198.54.100.0 255.255.255.0

set le 32

end

edit "vpc-cidr-network”

set prefix 10.0.0.0 255.255.240.0

unset ge

unset le

end

Page 34: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Network orchestration

Page 35: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Network orchestration: Overview

• Developed a server-less architecture for a manager of

managers

• Built on Python and overlays 5 different network

management products or networking devices

• Utilize a schema-less managed NoSQL database to

pass state between different components

Page 36: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)
Page 37: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Lessons learned

Page 38: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Lessons learned: Business

• Ensure network security is

in place first

• Align with your technology

providers and vendors

• Have key business

sponsors

• Constant communication is

essential

Page 39: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Lessons learned: Network design

• Stateful failover isn't

practical

• Failing over sites

periodically is a must

• Network interoperability is a

myth

Page 40: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Lessons learned: Routing

• iBGP and eBGP function

differently

• Graceful restart is not

always ideal

• Use BFD on every network

hop

• Terminate public peering at

each network PoP

Page 41: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Lessons learned: Connectivity

• Path selection is critical and

hard

• The price of a service does

not imply quality of a

service

• Use multiple Direct Connect

endpoints

Page 42: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Lessons learned: Orchestration

• Not all APIs are created

equal (or exist)

• Network vendors are not

software engineers

• Ensure all values are

externally configurable

Page 43: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Thank you!

Page 44: AWS re:Invent 2016: How Harvard University Improves Scalable Cloud Network Security, Visibility, and Automation (SAC326)

Remember to complete

your evaluations!