Abandon the Perimeter
Abandon the Perimeter
Join the DZone community and get the full member experience.Join For Free
Read why times series is the fastest growing database category.
Written by CloudPassage blog.
We’ve grown dependent on a perimeter. Vendors build tools that have no security at all without a robust perimeter. This term colors the way we as an industry think about security. The assumption of a perimeter makes decisions for us, we tend to assume that an internal system is better protected than one in the DMZ and give it a lower priority for security. This mindset is difficult to shed, and dangerous to keep, when you move operations to the public cloud.
In the public cloud there is no perimeter. The update server that the vendor wants “behind” a proxy is as much on the public internet as any proxy you would put in place. In the public cloud, you don’t control the network, and you don’t control the hardware. You do control the software.
How do we secure this environment without the same level of control that exists in the old model? We need to change the thought process. Instead of looking at the network from the outside in, and from the network layer up, focus on the host and the software.
- Deploy hardened server builds
- Work with your Ops team to automate the creation and configuration with tools like Puppet and Chef.
- Pre-define custom hardened build scripts for your general server types.
- Allow your Ops team the leeway to add and remove instances as needed.
- Work with Ops to design the best security possible while allowing the necessary work to get done.
- Configure your security controls
- Create Firewall rules to define, in software, the allowed communication between server instances.
- Restrict communication to management interfaces based on incoming IP.
- Build alerts to notify you if sensitive files are modified.
- Configure alerts for changes to your servers, new users and other events.
- Learn what is normal. Doing this will allow you to quickly see what isn’t
- Know your environment. Most cloud implementations are elastic. You need tools to tell you what IPs are yours today.
- Monitor the logs, central logging and alerting helps.
- Monitor the servers.
- Pay attention to the alerts.
- Detect and respond to anomalies
- Tune alerts to remove known unimportant items.
- Build intrusion detection rules to capture and alert on known bad events.
- Continuously tune email alerts to ensure that no alert making it to your inbox is routine.
The keys to successful public cloud security are: control of the software, a flexible security posture, focus on secure defaults, and anomaly detection. At this stage of the game, if you’re relying on a perimeter for your security, you haven’t build a hardened environment, you’ve built a brittle one.
Published at DZone with permission of Tatiana Crawford , DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.