Making infrastructure secure is difficult. Let's rephrase that; building a secure infrastructure needs time, experience, and can be expensive. There are however some best practices that can help get there quicker and cheaper. Using Bastion servers is one of them.
What is a Bastion Server?
A Bastion server (sometimes called a gateway server—not to be confused with an AWS Internet Gateway) is a server that sits between the public internet and your servers behind a firewall. It protects and controls access to your servers. All SSH access will go through this server via a tunnel, allowing you to control admission to all your servers, by controlling access to only the Bastion server. You can read more about Bastion servers here.
In this example, we're going to use AWS VPC (Virtual Private Cloud), however it's worth noting that Cloud 66 support for Bastion servers works with all of our cloud providers.
Using AWS VPC as an Example
If your application lives on Amazon EC2 and you haven’t yet used VPC, I’d suggest you spend your next geeky weekend playing with the basic concepts of its security model.
Until five years ago, most medium-sized tech companies had a network admin in their team to deal with cryptic routing tables and VLANS.
Nowadays, we enjoy fancy web dashboards and wizards, that build you a network with public/private subnets on the Amazon cloud, with just a couple of clicks!
Far from the SDN (Software Defined Networking) approach of old school, in-house infrastructures, AWS VPC works great, is the best out there, and is cheap.
Once convinced that moving your application into a DMZ is the right thing to do, you won’t need to worry about your DevOps. Cloud 66 will deploy your application into your DMZ and maintain it for you.
First thing to do is to define a deployment gateway in your Cloud 66 account and add some information about your Bastion server.
Once you've got your Bastion servers defined in your Cloud 66 account, you need to just open the Bastion for Cloud 66 during deployment by calling a single Toolbelt command.
Let's go through the process step-by-step and see it in action:
I have a VPC with two Subnet and a NAT instance (as the Bastion server) in my AWS account:
vpc-id : vpc-d23154b6 private subnet id : subnet-ced13f96 public subnet id : subnet-cfd13f97 Bastion Server private ip : 10.0.0.37 Bastion Server public ip : 126.96.36.199 Bastion server username : ec2-user
1. Define deployment gateway
I can use cx to add the new gateway to my account:
$ cx gateways add --name aws_bastion --address 188.8.131.52 --username c2-user --private-ip 10.0.0.37 Gateway added successfully!
Now, if I list my deployment gateways, I can see
$ cx gateways list NAME USERNAME ADDRESS PRIVATE IP OPEN UNTIL STATE aws_bastion c2-user 184.108.40.206 10.0.0.37 N/A close
2. Open deployment gateway
To be able to use the gateway, I first need to open it for a set amount of time:
$ cx gateways open --name aws_bastion --key ~/keys/bastion_key --ttl 1h Gateway opened successfully!
You will see the change in status:
$ cx gateways list NAME USERNAME ADDRESS PRIVATE IP OPEN UNTIL STATE aws_bastion c2-user 220.127.116.11 10.0.0.37 Mar 2 18:36 open
3. Deploy stack
Now, I can use the above information to deploy my stack through the Bastion server. First, I should add the configuration information into the stack manifest:
--- docker: configuration: version: 1.10.2 weave_version: 1.4.5 vpc_id: vpc-d23154b6 servers: - server: unique_name: Cheetah size: t2.small region: us-east-1 vendor: aws key_name: Default subnet_id: subnet-ced13f96 gateway: name: aws_bastion
As you can see, I specified the VPC and subnet I want my server deploys in and added
aws_bastion as my gateway name.
Note: Bastion servers are supported for both Cloud 66 for Rails and Cloud 66 for Docker stacks. Read more about Cloud 66 manifest file.
4. Closing the deployment gateway
We had opened the gateway for an hour, therefore the gateway will close automatically after the specified period. You also have the option of manually closing the gateway like this:
$ cx gateways close --name aws_bastion
Note: Once you close a gateway, Cloud 66 cannot access your servers unless you open it again.
And, that's it. My servers are deployed behind the Bastion server!
Bonus Point: SSH Servers Behind a Bastion Server
As the last tip, if you need to connect to your server via terminal, you can still use the
cx ssh command by providing the key of your Bastion server :
$ cx ssh --gateway-key ~/keys/bastion_key -s my-stack-name my-server-name
gateway-key is represented by your private SSH key for the Bastion server.