Oh Boy!! That was super insightful and interesting to unpack and discover this brand new product co-provided by AWS & Palo Alto! I guess it is mostly the case for us geeks as a new surprise or present is offered to us, no? You have this little excitement not really knowing what you are going to fall on.. You discover piece by piece the capabilities, you have the impression to be a bit a pioneer as this is so new that nobody has a lot of inputs on it. Now you know what has been my state of mind, dont't read this post after a heavy lunch 😏: this is dense & complex (I found even myself sometimes struggling structuring this blog post due to the quantity of information I wanted to include).
So guys, are you ready to discover with me the AWS Cloud NG FW, born from a partnership between AWS & Palo Alto and provided to you as a SaaS? Let's go!
Lessons learned
- When you hear new product, you have to think 'not much documentation available to explain how it works and how to set this up'
- I did not expect naively to test so many things but due to the extended capabilities of this product... (and I did not test them all!)
- This is a SaaS product but there is a clear demarc point between AWS & Palo Alto
- 2 different Web Interfaces (AWS Console + Palo Alto for Cloud NGFW specifics)
- 2 different supports (AWS Support & Palo Alto Community): I must say I don't like the Support 'Community' from Palo Alto - there is no real Support Case created (even if I subscribed Premium Support)
What is AWS Cloud NGFW?
What about AWS Cloud NGFW with other vendors?
What about this type of service with another Public Cloud?
What are the functionalities of AWS Cloud NG FW?
- Palo Alto Cloud NGFW for AWS offers all the advanced functionalities a NG FW can bring (Deep Packet Inspection) meaning simple packet filtering, URL filtering based on URL categories & geolocations, SSL/TLS decryption, Threat prevention & App-id to secure connections & reduce vulnerabilities, while shifting the operational responsibility (deployment, maintenance, availability & scale) to Palo Alto.
- Subnet level inspection is possible (meaning SubnetA can be protected from SubnetB with the same VPC. But this justifies a Distributed deployment model only with NGFW endpoint being within that VPC (multiple Route Tables needed)
AWS Network Firewall vs AWS Cloud NGFW
- Similarities
- Similar complex architectures types with endpoints (Central & Distributed architectures)
- Same visualization of Logs with S3, Cloud Watch and Firehose
- Packet filtering & Domain Name filtering
- Differences
- AWS Network Firewall is configured through AWS Console whereas AWS Cloud NGFW is configured through Palo Alto specific Web Interface
- AWS Cloud NGFW is a FW with real advanced Cyber Threat & Deep Packet Inspection (DPI) capabilities like IPS Vulnerability, Anti Spyware, Antivirus, File Blocking & URL Categories filtering
- It is possible on Logs like Cloud Watch for example to see easily if the packet processed has been allowed or blocked & which rule has processed the packet. (which is a big difference compared to AWS Network Firewall)
- Some architectures though are less complex to build, like Internet Egress as a dedicated Egress VPC is not needed (NATGW & FW endpoints are located in the same Security VPC but in different subnets)
Components
- Cloud NGFW Tenant is an instantiation of Cloud NGFW service associated with your AWS account when 1 of your AWS users subscribes to the service. Cloud NGFW designates you, the subscribing AWS user, as the admin. of Cloud NGFW tenant (TenantAdmin user role), who can invite other users to the tenant. Based on the assigned role, other users can create Cloud NGFW resources & configure rulestacks with the tenant.
- Cloud NGFW is a Firewall resource which is associated with your VPC & can span multiple AZs. This resource provides NGFW capabilities & has built-in resiliency, scalability & life cycle management.
- To use Cloud NGFW resource, you create a dedicated subnet in your VPC for each AZ, then create NGFW endpoints on the subnets & update the VPC route tables to send traffic through these Cloud NGFW endpoints. NGFW endpoints are responsible for directing traffic to the NGFW for inspection & enforcement (there are 2 ways to configure these endpoints. Either service-managed mode where Cloud NGFW Tenant creates automatically an endpoint in each subnet you specify or customer-managed mode where you have to manually create these endpoints towards AWS Console)
- Rulestacks define the NGFW traffic filtering behaviour (App-id, URL filtering & Threat prevention). A rulestack includes a set of security rules, the associated objects & security profiles. To use a rulestack, you associate it with NGFW resource(s). A Cloud NGFW resource uses the rulestack definition to protect the traffic by a 2-step process (1. First, it enforces the rule by allowing or denying the traffic & 2. Then, it performs Content inspection on the allowed traffic based on what is specified on the Security profiles. Cloud NGFW provides 2 types of rulestacks:
- Local Rulestack: local account admin. can associate a local rulestack with an NGFW in their AWS account. A local rulestack includes local rules.
- Global Rulestack: the AWS FW manager admin. can author a Firewall Manager Service (FMS) policy & associate a Global rulestack with it. AWS FW Manager manages Global rulestacks across all NGFWs in different AWS accounts of a AWS Organization (OU). A global rulestack includes pre-rules (rules added on the top of the rule order & evaluated first) & post-rules (rules added at the bottom of the rule order & evaluated after pre-rules & rules of a localrulestack). This is less granular than the console for Cloud NGFW. [AWS recommends to use AWS FW Manager for the distributed deployment model with multiple VPCs / accounts & the Cloud NGFW console for the centralized models]
Zoom on Rulestack
Objects
- Prefix Lists allow you to group specific sources & destinations IP@ requiring the same policy enforcement
- FQDN Lists allow you to group specific destinations FQDNs requiring the same policy enforcement
- Custom URL category allows you to specify exceptions to a URL category enforcement and to create a custom URL category based on multiple existing categories
- Intelligent feed (also called external dynamic list: EDL) is an ongoing stream of data related to potential or current threats to you. It records & tracks IP@ & URL's associated with threats such as phishing, scams, malware, bots, spyware, ransomware, etc.. There are built-in intelligent feeds.
- Certificate is a reference to a TLS certificate stored in AWS Secret Manager
Rules
- General
- Priority: the lower the number is, the highest priority the rule has
- 'Enabled' means that this rule will be processed
- Source & Destination
- Source can be Any, CIDR, Countries, Feeds or Prefix List
- Destination can be Any, CIDR, Countries, Feeds, Prefix List or FQDN
- Granular control can be App-ID, URL category or Protocol / Port
- Action can be Allow, Deny or Reset
- Logging must be enabled if there is a need to visualize the logs in S3, Firehose or Cloud Watch
Security Profiles
- IPS Vulnerability is enabled by default. It is based on a Vulnerability Signature Database with categories like brute force, dos, phishing, sql-injection, etc...
- Anti-Spyware is enabled by default. It is based on a Spyware Signature Database with categories like backdoor, botnet, cryptominer, spyware, fraud, etc...
- Anti Virus is enabled by default. It is based on a Anti virus Signature Data base with categories like linux, office, etc...
- File Blocking (if you want to block specific file type) is enabled by default & set to Palo Alto best Practice. However, you can customize it & choose the action that needs to be applied (Alert or Block).
- URL Categories & Filtering is a Security Profile disabled by default. When enabled, it provides you the capability to monitor & control how users access Internet based on different categories:
- Risk: high/medium/low
- Threat: Malware, Hacking, Phishing, etc..
- Suspicious: proxy avoidance, insufficient content, etc...
- Legal/Policy: drugs, adult, gaming, dating, auctions, gambling, religion, etc...
Pricing
Deployment models
High Level Steps for Cloud NGFW configuration
- AWS Cloud NGFW subscription, login & AWS account onboarding
- Configure Rule Stack: Objects, Rules & Security profiles
- Configure NGFW & NGFW endpoints
AWS Cloud NGFW Subscription, First Login & AWS account onboarding
What are we going to test?
- Centralized deployment model for East / West traffic
- Ping between Spoke A & Spoke B using Prefix List (Object) & App-id (finer granularity) when it is allowed
- Ping between Spoke A & Spoke B using Prefix List (Object) & App-id (finer granularity) when it is blocked
- Test Log4J attack between Spoke A & Spoke B & see if this is blocked with Security Profiles
- Centralized deployment model for Internet Egress traffic
- HTTP request to websites using FQDN List
- Test Intelligent feed to see if a malicious IP is blocked
- Test URL Category / Custom URL Category to allow or deny web site access from our VPC
Centralized deployment model for East/West
Flow
Architecture Build
AWS Cloud NGFW configuration
- Rule Priority is 10 (for the purpose of the second Test)
- Only Prefix List 'Spoke A' has been specified as the source & 'Any' as Destination (for the purpose of the second test also)
- App-ID 'ping' is specified
- Action 'Allow' is specified to allow ICMP between Spoke A & Spoke B
- Logging is enabled to send Logs to Cloud Watch default Log Group
- Name
- Select AWS Account id
- Select the VPC where the Firewall endpoints will be located (in our case, Security VPC)
- Select the Rulestack previously created
- Select automatic creation of the NGFW endpoints
- Select the subnet where NGFW endpoint(s) will be located (in our case, Security subnet). The endpoint type is a GWLB endpoint.
- Select 'Traffic' & 'Threat' as Log Type
- Select Cloud Watch & indicate the default Log Group destination for both Traffic & Threat
Centralized deployment model for Internet Egress
Flow
Architecture Build
AWS Cloud NGFW Configuration
I spent so much time on this one without any success! Clearly today, FQDN List Object does not look to work & behave properly for 2 main reasons:
- block 'dating websites' only with Security Profile
- Create 2 Custom URL Categories (AllowGoogle & DenyAmazon)
Useful Links
Conclusion
- Only available in AWS
- Only available with Palo Alto vendor
- Price is ... what it is... (I did not dare calculating seeing how it is complex & looks prohibitive)
- No proper tools for analysing the Firewall traffic (other than Cloud Watch or S3) however better granularity of the infos received in the Logs than with AWS Network Firewall
- Architecture complex & pretty similar to AWS Network Firewall, especially the routing; however simpler in some deployment models (like Internet Egress) than with AWS Network Firewall
- Creation of Security VPC to locate NGFW endpoints leading to re architecture / re configuration in Brownfield
- Need of creating static routes to endpoints (not dynamic)
- Wildcards not supported on FQDN List Objects
- Rules with FQDN List Objects do not behave properly
- Palo Alto Web Interface is (to me) better that what you have with PAN VM-Series; not doubt. This is intuitive & quite easy to configure.
All roads lead to Rome -- Aviatrix & NGFW insertion
- East / West (Cloud to Cloud), not only VPC to VPC as AWS Cloud NGFW
- North / South (Cloud to On Prem)
- Ingress Internet
- Egress Internet
Please check out this link for different design pattern.
- Easiness
- No re-architecture of your Cloud infrastructure
- Aviatrix Controller configures the interfaces and routing of your Firewall for you
- Scaling Out
- Multi-AZ deployment for a better resiliency
- Performance (depending on the Public Cloud): up to 75 Gbps with up to 20 active / active NG FWs.
- Convergence: Firenet leverages ECMP (Equal Cost Multi Path) & Active Mesh 2.0 (Aviatrix home made) allowing you for most of the failure scenarios to have no time to re-converge; meaning the failure will be totally transparent for the flows as all links are active and are forwarding traffic.
- Automated Route Management: Aviatrix Controller automatically reprograms the routes of Aviatrix Gateways & NGFW when needed. You don't have to bother with routing.
- Deep visibility & operational capability
- no IPSEC between Aviatrix Gateways & NGFW
- no SNAT
- Repeatable architecture across any Cloud (not only AWS). You can insert seamlessly your NG FW exactly the same way regardless of the Public Cloud (AWS, Azure, GCP, AliCloud, OCI)
- You can insert the NGFW of your choice (PAN, Checkpoint, Fortinet). You can even Bring Your Own Appliance (BYOA) - not only Palo Alto NGFW
No comments:
Post a Comment