Recent Posts
Archives

Posts Tagged ‘FirewallManager’

PostHeaderIcon [AWSReInforce2025] Securing AWS networks: Observability meets defense-in-depth (NIS306)

Lecturer

AWS security specialists architect network protection strategies that combine stateful inspection, stateless filtering, and continuous verification across multi-account environments. Their expertise encompasses VPC design patterns, traffic visibility frameworks, and policy orchestration at planetary scale.

Abstract

The session establishes a comprehensive network security framework that integrates layered controls—Security Groups, NACLs, Network Firewall, DNS Firewall—with observability tools including VPC Flow Logs, Reachability Analyzer, and Network Access Analyzer. Through architectural patterns and operational workflows, it demonstrates how organizations achieve defense-in-depth while maintaining visibility across complex, multi-VPC topologies.

Evolving Threat Landscape and Network Attack Surface

Modern networks face persistent, multi-vector threats. Ransomware campaigns exploit weak egress controls to reach command-and-control servers. DDoS attacks target application availability through volumetric or protocol exhaustion. Supply chain compromises leverage DNS tunneling for data exfiltration.

The network remains the primary attack surface because:

  • All traffic traverses it
  • Misconfigurations compound rapidly across accounts
  • Traditional perimeter defenses fail in cloud-native architectures

Defense-in-Depth Control Layers

AWS implements security through progressive filtering:

Internet → Route 53 Resolver → DNS Firewall
                            ↓
                Gateway Load Balancer → Network Firewall
                            ↓
                Security Groups → NACLs → Application

Each layer operates with distinct scope:
DNS Firewall: Blocks malicious domains before connection establishment
Network Firewall: Performs stateful inspection with intrusion prevention
Security Groups: Enforce instance-level allow rules
NACLs: Provide stateless subnet boundaries

Observability Integration Architecture

Visibility requires purpose-built telemetry:

sources:
  - vpc_flow_logs:
      sampling: 100%
      format: parquet
  - firewall_logs:
      destination: s3://central-logs
  - dns_query_logs:
      enable: true

Centralized collection in a dedicated log archive account enables cross-account analysis. Athena queries identify anomalous patterns:

SELECT source_ip, destination_domain, count(*)
FROM dns_logs
WHERE resolution = 'NXDOMAIN'
GROUP BY 1, 2 HAVING count(*) > 1000

Reachability Analyzer for Connectivity Validation

The tool models network paths programmatically:

aws networkmanager create-reachability-analysis \
  --source-type VPC \
  --source-id vpc-12345678 \
  --destination-type InternetGateway

Results reveal unintended egress routes, overlapping CIDR blocks, or missing firewall traversal. Integration with CI/CD pipelines prevents insecure infrastructure deployment.

Network Access Analyzer for Policy Verification

This service evaluates effective permissions:

{
  "scope": "VPC",
  "findings": [
    {
      "resource": "subnet-12345678",
      "issue": "Internet accessible",
      "path": "NACL allow 0.0.0.0/0"
    }
  ]
}

Findings integrate with Security Hub for automated remediation via Lambda—revoking public access, enforcing VPC endpoints.

Multi-Account Governance Patterns

Reference architecture implements centralized control:

Management Account → Firewall Manager Policies
                   → Security Account (Logging + Analysis)
                   → Workload Accounts (VPCs)

Firewall Manager enforces baseline Network Firewall rulesets across 1000+ accounts. SCPs prevent deviation from approved configurations.

Operational Workflows and Incident Response

Security teams operationalize the framework through:

  1. Daily Monitoring: CloudWatch dashboards track rejected packets
  2. Threat Hunting: Athena federated queries across flow logs
  3. Incident Playbooks: EventBridge triggers isolation via Security Group updates
  4. Compliance Reporting: Automated evidence collection for audits

Conclusion: Integrated Security Fabric

The convergence of layered controls and continuous observability creates a resilient network security posture. Organizations eliminate blind spots through centralized telemetry, proactive reachability validation, and policy enforcement at scale. This integrated approach transforms network security from reactive defense into a strategic enabler of cloud adoption.

Links: