SlideShare una empresa de Scribd logo
1 de 16
VPC Security
n|u - The Open security community
Chennai Meet
Presenter : Vinoth Kumar
Date : 17/02/2018
# About Me
Application security engineer.
Blogger @ http://www.tutorgeeks.net
Email @ vinothpkumar333@gmail.com
Tweet @vinothpkumar
Topics covered
● Introduction to VPC.
● VPC Creation.
○ Subnets, Route tables, IGW, Elastic IP, NAT Gateways
● Security Components in VPC
○ Security Groups
○ Network ACLs
○ Flow Logs
● Mitigating DDOS
● VPC Peering
● VPC Cleanup
Introduction to VPC
Amazon VPC enables you to launch AWS resources into a virtual network that you've defined. This virtual network
closely resembles a traditional network that you'd operate in your own data center, with the benefits of using the
scalable infrastructure of AWS.
A virtual private cloud (VPC) is a virtual network dedicated to your AWS account. It is logically isolated from other
virtual networks in the AWS Cloud. You can launch your AWS resources, such as Amazon EC2 instances, into your
VPC. You can configure your VPC by modifying its IP address range, create subnets, and configure route tables,
network gateways, and security settings.
VPC Creation
VPC Sample Network
Security components in VPC
Amazon VPC provides features that you can use to increase and monitor the security for your VPC:
● Security groups — Act as a firewall for associated Amazon EC2 instances, controlling both
inbound and outbound traffic at the instance level
● Network access control lists (ACLs) — Act as a firewall for associated subnets, controlling both
inbound and outbound traffic at the subnet level
● Flow logs — Capture information about the IP traffic going to and from network interfaces in
your VPC
Source : https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Security.html
VPC Architecture with Network ACLs and SG
● Comparison of SG and Network ACLs
● Use Cases for SG and Network ACLs
Source: https://docs.aws.amazon.com/AmazonVPC/latest/
UserGuide/VPC_Security.html#VPC_Security_Comparison
Security Groups - Associated with Instances
● A security group acts as a virtual firewall for your instance to control inbound and outbound traffic.
● For each security group, you add rules that control the inbound traffic to instances, and a separate set of rules
that control the outbound traffic. “Deny All and Allow Some” approach.
● Security groups are stateful.
● When you launch an instance in a VPC, you can assign up to five security groups to the instance. Security
groups act at the instance level, not the subnet level. Therefore, each instance in a subnet in your VPC could
be assigned to a different set of security groups.
● You can specify allow rules, but not deny rules.
Source: https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html
Network ACLs - Associated with Subnets
● Network access control list (ACL) is a security layer for your VPC that acts as a firewall for controlling traffic
in and out of one or more subnets. NACLs is stateless
● When you add or remove rules from a network ACL, the changes are automatically applied to the subnets
● Your VPC automatically comes with a modifiable default network ACL. By default, it allows all inbound and
outbound IPv4 traffic.
● You can create a custom network ACL and associate it with a subnet. By default, each custom network ACL
denies all inbound and outbound traffic until you add rules.
● Each subnet in your VPC must be associated with a network ACL. If you don't explicitly associate a subnet
with a network ACL, the subnet is automatically associated with the default network ACL.
Source: https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html
Flow Logs
● VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from
network interfaces in your VPC
● Flow log data is stored using Amazon CloudWatch Logs. After you've created a flow log, you can view and
retrieve its data in Amazon CloudWatch Logs.
● Flow logs can help you with a number of tasks; for example, to troubleshoot why specific traffic is not
reaching an instance, which in turn can help you diagnose overly restrictive security group rules. You can also
use flow logs as a security tool to monitor the traffic that is reaching your instance.
Source: https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/flow-logs.html
Mitigating DDOS
● Have provisions to scale as traffic surges. Helps both business run and during DDOS attack.
○ ELB, Autoscaling.
● Minimize the attack surface area - Have decoupled infrastructure.
○ Avoid running multiple services in a single server. Application and DB server in different instance
● Know what is normal and Abnormal
○ Define key metrics to understand the behaviour ( Cloudwatch ). Huge traffic at 2am is something
unusual.
● Create a plan for Attacks
○ Check IP, Geolocation, Nature of the attack, Can SG or Network ACLs help in this case.
VPC Peering
● A VPC peering connection is a networking connection between two VPCs that enables you to route traffic
between them using private IPv4 addresses or IPv6 addresses.
● Instances in either VPC can communicate with each other as if they are within the same network. You can
create a VPC peering connection between your own VPCs, or with a VPC in another AWS account
● No transitive peering
Source : https://docs.aws.amazon.com/AmazonVPC/latest/PeeringGuide/Welcome.html
VPC Cleanup
Deleting created Subnets, SG, NACLs, IGW, Route Tables, NIC and VPC Peering
connections.
Resources
● https://aws.amazon.com/documentation/vpc/
● Udemy courses
○ Author - Zeal Vora
■ AWS Cloud practitioner
■ AWS-Certified-Security-Specialty
Tha

Más contenido relacionado

La actualidad más candente

AWS Innovate 2016: Build Mobile Apps using AWS SDKs and Mobile Hub- Oliver Klein
AWS Innovate 2016: Build Mobile Apps using AWS SDKs and Mobile Hub- Oliver KleinAWS Innovate 2016: Build Mobile Apps using AWS SDKs and Mobile Hub- Oliver Klein
AWS Innovate 2016: Build Mobile Apps using AWS SDKs and Mobile Hub- Oliver Klein
Amazon Web Services Korea
 

La actualidad más candente (20)

Building Secure Mobile APIs
Building Secure Mobile APIsBuilding Secure Mobile APIs
Building Secure Mobile APIs
 
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
 
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
 
Building Scalable Windows and .NET Apps on AWS (TLS302) | AWS re:Invent 2013
Building Scalable Windows and .NET Apps on AWS (TLS302) | AWS re:Invent 2013Building Scalable Windows and .NET Apps on AWS (TLS302) | AWS re:Invent 2013
Building Scalable Windows and .NET Apps on AWS (TLS302) | AWS re:Invent 2013
 
SRV411 Deep Dive on Mobile Application Development with AWS
SRV411 Deep Dive on Mobile Application Development with AWSSRV411 Deep Dive on Mobile Application Development with AWS
SRV411 Deep Dive on Mobile Application Development with AWS
 
Security Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management TrackSecurity Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management Track
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 
AWS Services Overview - September 2016 Webinar Series
AWS Services Overview - September 2016 Webinar SeriesAWS Services Overview - September 2016 Webinar Series
AWS Services Overview - September 2016 Webinar Series
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
 
NEW LAUNCH! Bringing AWS Lambda to the Edge
NEW LAUNCH! Bringing AWS Lambda to the EdgeNEW LAUNCH! Bringing AWS Lambda to the Edge
NEW LAUNCH! Bringing AWS Lambda to the Edge
 
AWS를 활용한 웹, 모바일, 소셜 애플리케이션 구축 방법
AWS를 활용한 웹, 모바일, 소셜 애플리케이션 구축 방법AWS를 활용한 웹, 모바일, 소셜 애플리케이션 구축 방법
AWS를 활용한 웹, 모바일, 소셜 애플리케이션 구축 방법
 
AWS Multiple Account Management
AWS Multiple Account ManagementAWS Multiple Account Management
AWS Multiple Account Management
 
Serverless Summit 21 - Resilient serverless architecture on AWS
Serverless Summit 21 - Resilient serverless architecture on AWSServerless Summit 21 - Resilient serverless architecture on AWS
Serverless Summit 21 - Resilient serverless architecture on AWS
 
AWS APAC Webinar Week - Getting The Most From EC2
AWS APAC Webinar Week - Getting The Most From EC2AWS APAC Webinar Week - Getting The Most From EC2
AWS APAC Webinar Week - Getting The Most From EC2
 
AWS Innovate 2016: Build Mobile Apps using AWS SDKs and Mobile Hub- Oliver Klein
AWS Innovate 2016: Build Mobile Apps using AWS SDKs and Mobile Hub- Oliver KleinAWS Innovate 2016: Build Mobile Apps using AWS SDKs and Mobile Hub- Oliver Klein
AWS Innovate 2016: Build Mobile Apps using AWS SDKs and Mobile Hub- Oliver Klein
 
AWS AWSome Day Roadshow Intro
AWS AWSome Day Roadshow IntroAWS AWSome Day Roadshow Intro
AWS AWSome Day Roadshow Intro
 
AWS Security in Plain English – AWS Security Day
AWS Security in Plain English – AWS Security Day AWS Security in Plain English – AWS Security Day
AWS Security in Plain English – AWS Security Day
 
AWS March 2016 Webinar Series Getting Started with Serverless Architectures
AWS March 2016 Webinar Series   Getting Started with Serverless ArchitecturesAWS March 2016 Webinar Series   Getting Started with Serverless Architectures
AWS March 2016 Webinar Series Getting Started with Serverless Architectures
 
Getting started with AWS Lambda and the Serverless Cloud
Getting started with AWS Lambda and the Serverless CloudGetting started with AWS Lambda and the Serverless Cloud
Getting started with AWS Lambda and the Serverless Cloud
 
February 2016 Webinar Series - Introducing VPC Support for AWS Lambda
February 2016 Webinar Series - Introducing VPC Support for AWS LambdaFebruary 2016 Webinar Series - Introducing VPC Support for AWS Lambda
February 2016 Webinar Series - Introducing VPC Support for AWS Lambda
 

Similar a Securing your vpc in aws

Similar a Securing your vpc in aws (20)

AWS VPC Flow logs
AWS VPC Flow logsAWS VPC Flow logs
AWS VPC Flow logs
 
AWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan NaydenovAWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan Naydenov
 
Amazon VPC Best Practices 2016
Amazon VPC Best Practices 2016Amazon VPC Best Practices 2016
Amazon VPC Best Practices 2016
 
Aws VPC
Aws VPCAws VPC
Aws VPC
 
Amazon Virtual Private Cloud (VPC)
Amazon Virtual Private Cloud (VPC)Amazon Virtual Private Cloud (VPC)
Amazon Virtual Private Cloud (VPC)
 
Amazon virtual private cloud (VPC)
Amazon virtual private cloud (VPC)Amazon virtual private cloud (VPC)
Amazon virtual private cloud (VPC)
 
Reach: Solving AWS Networking Problems Faster
Reach: Solving AWS Networking Problems FasterReach: Solving AWS Networking Problems Faster
Reach: Solving AWS Networking Problems Faster
 
cc.pptx
cc.pptxcc.pptx
cc.pptx
 
Amazon Virtual Private Cloud - VPC 2
Amazon Virtual Private Cloud - VPC 2Amazon Virtual Private Cloud - VPC 2
Amazon Virtual Private Cloud - VPC 2
 
AWS VPC Fundamental
AWS VPC FundamentalAWS VPC Fundamental
AWS VPC Fundamental
 
AWS network services
AWS network servicesAWS network services
AWS network services
 
AWS VPC & Networking basic concepts
AWS VPC & Networking basic conceptsAWS VPC & Networking basic concepts
AWS VPC & Networking basic concepts
 
Amazon Virtual Private Cloud - VPC 1
Amazon Virtual Private Cloud - VPC 1Amazon Virtual Private Cloud - VPC 1
Amazon Virtual Private Cloud - VPC 1
 
5 Not-to-Ignore Best Practices for AWS NACLs (Network Access Control Lists)
5 Not-to-Ignore Best Practices for AWS NACLs (Network Access Control Lists) 5 Not-to-Ignore Best Practices for AWS NACLs (Network Access Control Lists)
5 Not-to-Ignore Best Practices for AWS NACLs (Network Access Control Lists)
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
AWS Virtual Private Cloud
AWS Virtual Private CloudAWS Virtual Private Cloud
AWS Virtual Private Cloud
 
AWS Virtual Private Cloud
AWS Virtual Private CloudAWS Virtual Private Cloud
AWS Virtual Private Cloud
 
Hybrid Infrastructure Integration
Hybrid Infrastructure IntegrationHybrid Infrastructure Integration
Hybrid Infrastructure Integration
 
Hybrid Infrastructure Integration
Hybrid Infrastructure IntegrationHybrid Infrastructure Integration
Hybrid Infrastructure Integration
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 ThreatsHackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats
 

Más de vinoth kumar

Más de vinoth kumar (7)

G suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, ChennaiG suite misconfigurations- Null meet, Chennai
G suite misconfigurations- Null meet, Chennai
 
Github security bug bounty hunting
Github security   bug bounty huntingGithub security   bug bounty hunting
Github security bug bounty hunting
 
Oauth 2.0 security
Oauth 2.0 securityOauth 2.0 security
Oauth 2.0 security
 
Yet another talk on bug bounty
Yet another talk on bug bountyYet another talk on bug bounty
Yet another talk on bug bounty
 
API Security - Null meet
API Security - Null meetAPI Security - Null meet
API Security - Null meet
 
AWS security - NULL meet chennai
AWS security - NULL meet chennaiAWS security - NULL meet chennai
AWS security - NULL meet chennai
 
Introduction to Bigdata and HADOOP
Introduction to Bigdata and HADOOP Introduction to Bigdata and HADOOP
Introduction to Bigdata and HADOOP
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Securing your vpc in aws

  • 1. VPC Security n|u - The Open security community Chennai Meet Presenter : Vinoth Kumar Date : 17/02/2018
  • 2. # About Me Application security engineer. Blogger @ http://www.tutorgeeks.net Email @ vinothpkumar333@gmail.com Tweet @vinothpkumar
  • 3. Topics covered ● Introduction to VPC. ● VPC Creation. ○ Subnets, Route tables, IGW, Elastic IP, NAT Gateways ● Security Components in VPC ○ Security Groups ○ Network ACLs ○ Flow Logs ● Mitigating DDOS ● VPC Peering ● VPC Cleanup
  • 4. Introduction to VPC Amazon VPC enables you to launch AWS resources into a virtual network that you've defined. This virtual network closely resembles a traditional network that you'd operate in your own data center, with the benefits of using the scalable infrastructure of AWS. A virtual private cloud (VPC) is a virtual network dedicated to your AWS account. It is logically isolated from other virtual networks in the AWS Cloud. You can launch your AWS resources, such as Amazon EC2 instances, into your VPC. You can configure your VPC by modifying its IP address range, create subnets, and configure route tables, network gateways, and security settings.
  • 7. Security components in VPC Amazon VPC provides features that you can use to increase and monitor the security for your VPC: ● Security groups — Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level ● Network access control lists (ACLs) — Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level ● Flow logs — Capture information about the IP traffic going to and from network interfaces in your VPC Source : https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Security.html
  • 8. VPC Architecture with Network ACLs and SG ● Comparison of SG and Network ACLs ● Use Cases for SG and Network ACLs Source: https://docs.aws.amazon.com/AmazonVPC/latest/ UserGuide/VPC_Security.html#VPC_Security_Comparison
  • 9. Security Groups - Associated with Instances ● A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. ● For each security group, you add rules that control the inbound traffic to instances, and a separate set of rules that control the outbound traffic. “Deny All and Allow Some” approach. ● Security groups are stateful. ● When you launch an instance in a VPC, you can assign up to five security groups to the instance. Security groups act at the instance level, not the subnet level. Therefore, each instance in a subnet in your VPC could be assigned to a different set of security groups. ● You can specify allow rules, but not deny rules. Source: https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html
  • 10. Network ACLs - Associated with Subnets ● Network access control list (ACL) is a security layer for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets. NACLs is stateless ● When you add or remove rules from a network ACL, the changes are automatically applied to the subnets ● Your VPC automatically comes with a modifiable default network ACL. By default, it allows all inbound and outbound IPv4 traffic. ● You can create a custom network ACL and associate it with a subnet. By default, each custom network ACL denies all inbound and outbound traffic until you add rules. ● Each subnet in your VPC must be associated with a network ACL. If you don't explicitly associate a subnet with a network ACL, the subnet is automatically associated with the default network ACL. Source: https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html
  • 11. Flow Logs ● VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC ● Flow log data is stored using Amazon CloudWatch Logs. After you've created a flow log, you can view and retrieve its data in Amazon CloudWatch Logs. ● Flow logs can help you with a number of tasks; for example, to troubleshoot why specific traffic is not reaching an instance, which in turn can help you diagnose overly restrictive security group rules. You can also use flow logs as a security tool to monitor the traffic that is reaching your instance. Source: https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/flow-logs.html
  • 12. Mitigating DDOS ● Have provisions to scale as traffic surges. Helps both business run and during DDOS attack. ○ ELB, Autoscaling. ● Minimize the attack surface area - Have decoupled infrastructure. ○ Avoid running multiple services in a single server. Application and DB server in different instance ● Know what is normal and Abnormal ○ Define key metrics to understand the behaviour ( Cloudwatch ). Huge traffic at 2am is something unusual. ● Create a plan for Attacks ○ Check IP, Geolocation, Nature of the attack, Can SG or Network ACLs help in this case.
  • 13. VPC Peering ● A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IPv4 addresses or IPv6 addresses. ● Instances in either VPC can communicate with each other as if they are within the same network. You can create a VPC peering connection between your own VPCs, or with a VPC in another AWS account ● No transitive peering Source : https://docs.aws.amazon.com/AmazonVPC/latest/PeeringGuide/Welcome.html
  • 14. VPC Cleanup Deleting created Subnets, SG, NACLs, IGW, Route Tables, NIC and VPC Peering connections.
  • 15. Resources ● https://aws.amazon.com/documentation/vpc/ ● Udemy courses ○ Author - Zeal Vora ■ AWS Cloud practitioner ■ AWS-Certified-Security-Specialty
  • 16. Tha