SlideShare une entreprise Scribd logo
1  sur  52
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
迎戰DDoS攻擊的資安最佳實踐
Retro Kuo
T r a c k 5 | S e s s i o n 3
Sr. Cloud Support Engineer
Amazon Web Services
Agenda
• DDoS threats and trends
• Introduction to AWS Support and AWS Shield
•True stories and lesson learned
• Frequently asked questions
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
DoS (Denial ofService)
Attacker Target
Disrupt access for legitimate users using a variety of techniques that
consume large amounts of network bandwidth or tie up other system
resources from a single source
DDoS (Distributed Denial ofService)
Attacker Target
Masters
Bots
Generate a flood of packets or
requests to overwhelm a target
using multiple sources – which
may be distributed groups of
malware infected computers,
routers, IoT devices, and other
endpoints
Typesof threats
SYN/ACK Flood | UDP Flood | ReflectionTransport
Ping of Death | ICMP Flood |TeardropNetwork
Data Link
Physical
Operated & Protected by AWS
Presentation
Application
Session
HTTP Flood, App exploits, SQL Injection, Bots, Crawlers,
SSL Abuse, Malformed SSL
Typesof threats(cont.)
Bad BotsDDoS Application Attacks
Application
Layer
Network/
Transport
Layer
UDP floods
SYN floods
Slowloris
SSL abuse
UDP reflection
HTTP floods
Content scrapers
Scanners & probes
Crawlers
SQL injection
Application exploits
DDoS size trends
0
200
400
600
800
1000
1200
1400
1600
1800
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018
Largest DDoSAttacks (Gbps)
Memcached
attacks
Mirai attacks
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
WhatisAWSSupport
TECHNICALACCOUNT
MANAGER (TAM)
Designated technical point of contact
to all necessary AWS expertise
SUPPORT
CONCIERGE
Dedicated team of enterprise account specialists
to help with billing and account subjects
SMEs
Cloud Support Engineers, SolutionsArchitects,
and product teams are available for guidance
TRUSTED
ADVISOR (TA)
Online resource to help you reduce cost, increase
performance, and improve security
by optimizing your AWS environment
PERSONAL
HEALTH
DASHBOARD
(PHD)
Delivers alerts and remediation
guidance when AWS is experience
events that may impact your
environment
SUPPORT
API
Programmatic access to AWS Support
Center features to create, manage, and
close your support cases, and
operationally manage yourTA check
requests and status
INFRASTRUCTURE EVENT
MANAGEMENT (IEM)
Focused planning and support
business-critical events
(e.g. launches or migrations)
WELL-ARCHITECTED
REVIEW
Detailed review of your architecture
guidance on how
to best design your systems
ARCHITECTURE
SUPPORT
Consultative reviews of your
application architecture and how to
align it with AWS
OPERATIONS
SUPPORT
Consultative reviews of your cloud operations
and advice for optimizationTRAINING
Credits for online self-paced labs
provided through anAWS training
provider
ABUSE
TEAM
Assists you when AWS resources are impacted
by things such as Spam, Port scanning,
Denial of Service attacks (DDoS), or malware
AWSSupport plans
Developer Business Enterprise
Email/Live Phone/Chat/Screen Share Email
3rd Party Software Support**
AWSTrusted Advisor 7 Checks
ResponseTimes < 12 Hours* < 1 Hour < 15 Mins
Technical Account Manager
Infrastructure Event Management Addt’l Fee
*Business hours are generally defined as 8:00 AM to 6:00 PM in the customer country as set in My Account console,
excluding holidays and weekends.These times may vary in countries with multiple time zones.
**For the list of supported third-party software, please visit: http://amzn.to/2wMrK0n
AWSShield –Standard andAdvanced
Automatic Protection
across customers
Enhanced Protection
baselined to you
24x7 access to
DDoS ResponseTeam
(DRT)
Built-in DDoS Protection
for Everyone
Point and Protect
Wizard
AWS WAF at no
additional cost
For protected resources
AWS Firewall Manager
at no additional cost
Cost Protection for
scaling
CloudWatch Metrics Attack Diagnostics
GlobalThreat
Environment
Dashboard
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
True story#1(1/3)
Situation
• An Enterprise Support customer's website
was under attack
• Not a Shield Advanced customer
• The website was hosted on-premises
corporate data center
DDoS
Local
ISP
True story#1(2/3)
Action and Result
• A Cloud Support Engineer (CSE) participated
in the call to provide solutions and guide the
customer's engineering team to configure
AWS resources
• The DDoS attack was mitigated by securing
the on-premises servers with Amazon
CloudFront
corporate data center
DDoS
Local
ISPAmazon
CloudFront
True story#1(3/3)
Recommendation and Tips
• Avoid exposure of your origin's domain
names and IP addresses
True story#1(3/3)
Recommendation and Tips
• Whitelist CloudFront IP ranges to enhance
security of your origin
Tips: CloudFront IP ranges -
https://amzn.to/2m4g48M
How-to: Update security groups automatically using
AWS Lambda - https://amzn.to/2ma44Cq
True story#1(3/3)
Recommendation and Tips
• Associate AWS WAF rate limiting rules with
CloudFront to mitigate HTTP request flood
How-to: ConfigureAWSWAF rate-based
rules - https://amzn.to/3hCmEvt
True story#1(3/3)
Recommendation and Tips
• Associate AWS WAF rate limiting rules with
CloudFront to mitigate HTTP request flood
How-to: ConfigureAWSWAF rate-based
rules - https://amzn.to/3hCmEvt
True story#1(3/3)
Recommendation and Tips
• Subscribe to the Business Support plan to
create a production system down support case
(SLA < 1 hour)
AmazonCloudFront
110newPoPsinthelasttwoyears
100
PoPs
2009 2017 2019
9 years 2 years
210
PoPs
CloudFront
launch
Latencybenefits withPoP launches
Argentina
55% Latency reduction
79 ms  35 ms
Chile
73% Latency reduction
104 ms  28 ms
PoP launches ensure connectivity with majority views
and redundant AWS backbone
Bahrain:
40% Latency reduction
38 ms  27 ms
Advanced securitycapabilities
Advanced ciphers
Certificate manager
OCSP stapling
Session tickets
Perfect forward secrecy
Protocol enforcement
Half or full bridge
connections
TLSv1.0, 1.1, 1.2
Field-level encryption
Encrypted
connections
Custom origin
protection
Header and ACL
Content protection
Signed URL / Cookies
Content restriction
geo blocking
Amazon S3 origin
access identity
Access
control
• AWS Identity and Access Management (IAM)
APIacceleration withCloudFront
• TLS termination at edge
• Network optimizations: persistent connections,
connection pooling, keep-alive
• AWS private backbone
• Edge DDoS protection
“The performance gains are amazing, positively impacting our app’s usage across the
globe, especially in Regions further from US EAST 1.”
Sample data from a customer test
Dynamic content:WebSocket support
“CloudFront WebSocket support means that we can simplify our
infrastructure and further improve customer satisfaction.
CloudFront edge locations will now contribute to better user
performance inWebSocket apps”
“CloudFront now supportingWebSockets enables us to
consolidate both our dynamic and static content delivery under a
single distribution, improving global reach, enhancing app
security, and simplifying our delivery architecture all at the same
time. ”
• Use cases: Bi-directional and real-time
communication between client and server
• Commonly used for chat applications, online
collaboration platforms, and financial trading
platforms
Evolution Gaming
True story #2 (1/3)
Situation
• An Enterprise Support customer's Elastic
Load Balancer was reported as the source of
attacks (sending SYN-ACK to port 22) by a
third-party security institute
True story #2 (2/3)
Action and Result
• The monitoring tool and metrics show that the
load balancer didn't initiate attack traffic;
instead the load balancer was responding to
valid traffic with spoofed source IP addresses
• The investigation performed by the AWS
Support and engineering team indicates that
this was a reflection attack
Source:Victim:22
Destination: ALB:80
Source: ALB:80
Destination:Victim:22
True story #2 (3/3)
Recommendation and Tips
• Enable VPC flow logs with additional
metadata to inspect your network traffic
AmazonVPC
traffic mirroring
AmazonVPC traffic mirroring duplicates
the traffic going into an EC2 instance and
shares it with security and monitoring
tools
⁄ Duplicate traffic to inspect for threats, network
troubleshooting, and performance
⁄ Extract only the traffic of interest
⁄ Extend your capabilities with third-party
solutions in the AWS Marketplace and partner
solutions
True story #2 (3/3)
Recommendation and Tips
• Configure security groups and network ACLs
to allow access to service ports only (included
in the Trusted Advisor best practice checks)
VPC
Availability Zone
US-EAST-1A
Availability Zone
US-EAST-1B
AmazonVirtualPrivateCloud
Public subnet Public subnet
Private subnet Private subnet
VPC
Availability Zone
US-EAST-1A
Availability Zone
US-EAST-1B
Subnets
Public subnet Public subnet
Private subnet Private subnet
VPC
Availability Zone
US-EAST-1A
Availability Zone
US-EAST-1B
EC2instances
Instance Instance
Instance Instance
VPC
Availability Zone
US-EAST-1A
Availability Zone
US-EAST-1B
Instance Instance
Instance Instance
Public subnet Public subnet
Private subnet Private subnet
Gateways,endpoints & peering
Public subnet Public subnet
Private subnet Private subnet
VPC
Availability Zone
US-EAST-1A
Availability Zone
US-EAST-1B
Web server Web server
Application
server
Application
server
Example webapplication
Web server
security group
Application server
security group
ELB
True story #2 (3/3)
Recommendation and Tips
• Contact AWS immediately if you discover any
vulnerabilities or have security concerns about
AWS services
Email: aws-security@amazon.com
Web: https://go.aws/30RQC8I
True story#3(1/4)
Situation
• A Basic Support customer's UDP-based game
servers hosted on EC2 instances were under
attack
• Unsatisfied with Shield Advanced as users
were impacted after the subscription of Shield
Advanced
• Attack volume wasn't massive but targeted
the service ports
True story#3(2/4)
Action and Result
• A CSE served as a bridge between the
customer and DDoS Response Team (DRT) to
facilitate communication
• The attack was mitigated by whitelisting
certain countries to access game servers
(custom mitigation rules configured by the
DRT)
True story#3(3/4)
Recommendation and Tips
• Baseline your traffic and be familiar with your
packet format
• Drop/Shape network traffic using security
groups, network ACLs, and iptables
// The length module matches packet size
$ iptables -m length --length 256:65535
// The u32 module matches arbitrary byte patterns
$ iptables -m u32 --u32 "16=0xE0000001"
How-to:Write iptables rules to drop packets that do
not match your application format -
http://bit.ly/2mG3XPn
True story#3(3/4)
Recommendation and Tips
• Scale your servers by choosing the right
instance type and size, enabling Enhanced
Networking, and using AWS Auto Scaling with
AWS Global Accelerator and AWS Elastic
Load Balancing
AWS Shield
Advanced
Network Load
Balancer
AWS Global
Accelerator
Whitepaper: AWS Best Practices for DDoS
Resiliency - http://bit.ly/2ldui6W
We use AWS Global Accelerator to
ingest telemetry data onto AWS,
taking advantage of the static IP
addresses it provides, along with
traffic-shifting capabilities and
many points of presence around the
globe.
Ken Gavranovic
SVP, Product Management
New Relic
AWSGlobalAccelerator
Improve global application
availability and performance using
the AWS global network
New in 2019:
/ Launched in 10 new Regions in 2019
/ Client IP preservation for ALB and Amazon
EC2 instances
Internetweather
Let’ssayyouhaveaninternet-facingapplication…
⁄
⁄
⁄
⁄
AWS Global Accelerator Direct to AWS Region via public internet
Availability measured by clients on
the internet using third-party
measurement systems
Starts in the USA… …expands to Europe… …and then adds Asia
Consistent availability with AWS
Global Accelerator
Low availability due to
public internet traffic
Less responsive application due to
public internet traffic
Consistent latency
due to AWS Global Accelerator
High latency due to
public internet traffic
Consistent latency
due to AWS Global Accelerator
Availability First byte latency First byte latency
Networking
innovation,enabled
byAWSNitro
System
Nitro Card
Networking, monitoring,
and security
EC2 - c5.18xlarge EC2 - c5n.18xlarge
Throughput (Gbps)
91
23
Latency
(Microseconds)
68
51
Packets per second
(Millions)
1.93
6.52
True story#3(4/4)
Recommendation and Tips
• Be prepared – work with the DRT to build
your custom mitigation rules, authorize the
DRT to access your logs, review operational
practices periodically
True story#3(4/4)
Recommendation and Tips
• Automate the process – deploy the AWS
Shield Engagement Lambda function to
shorten the time to engage AWS Support and
the DRT, monitor AWS Shield Advanced
metrics to be informed of DDoS attacks via
Slack or PagerDuty How-to: Set up AWS Shield Engagement Lambda -
http://bit.ly/2ldui6W
Whichonedoyouneed–AWSSupportandAWSShield
Advanced
AWS Support
• Provides people, technology, and programs to
assist you with DDoS attacks
• For instance, SMEs to help you build a DDoS-
resilient architecture;Trusted Advisor to make
sure your environment is secure and well utilized
and performed
• Recommended for customers running
production workloads on AWS
AWS ShieldAdvanced
• Provides access to the DRT, additional
cost/resource protection, and metrics to help
you deal with more complex and sophisticated
DDoS attacks
• For instance, DRT to build mitigation rules
tailored for your application; using AWSWAF
with no additional cost; credits for charges
incurred due to attacks
• Recommended for customers running business
critical workloads on AWS
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Frequently askedquestion#1
Q: How quickly will attacks be mitigated?
99% of infrastructure layer attacks detected by AWS Shield are mitigated in less than
• 1 second for attacks on CloudFront/Route 53
• 5 minutes for attacks on ELB
1% of infrastructure layer attacks are typically mitigated in under 20 minutes
Application layer attacks are mitigated by writing rules on AWSWAF, which are inspected
and mitigated inline with incoming traffic
Frequently askedquestion#2
Q: AWS Shield Advanced didn't mitigate the attack against my application
Building the mitigation rules tailored for your application takes time and effort. We
recommend you reach out to us as early as possible to get prepared for DDoS attacks.
Baseline and be familiar
with your network traffic
Submit a support case to
build custom mitigation
Arrange a test
with the DRT
Frequently askedquestion#3
Q: How much traffic did AWS Shield drop?
Availability and performance are the key factors to the health of your application.We
recommend you use the above factors to measure the effectiveness. If you would like to
gauge the size of attacks, check the CloudWatch metrics:
• DDoSAttackBitsPerSecond
• DDoSAttackPacketsPerSecond
• DDoSAttackRequestsPerSecond
LearnnetworkingwithAWSTrainingandCertification
Free digital courses cover topics related to networking and content
delivery, including Introduction to Amazon CloudFront and AWSTransit
Gateway Networking and Scaling
Resources created by the experts at AWS to help you build and validate cloud networking skills
Validate expertise with the AWS Certified Advanced Networking – Specialty
exam
Visit the advanced networking learning path at aws.amazon.com/training/path-advanced-networking

Contenu connexe

Tendances

Designing and building a micro-services architecture. Stairway to heaven or a...
Designing and building a micro-services architecture. Stairway to heaven or a...Designing and building a micro-services architecture. Stairway to heaven or a...
Designing and building a micro-services architecture. Stairway to heaven or a...Sander Hoogendoorn
 
FinOps - AWS Cost and Operational Efficiency - Pop-up Loft Tel Aviv
FinOps - AWS Cost and Operational Efficiency - Pop-up Loft Tel AvivFinOps - AWS Cost and Operational Efficiency - Pop-up Loft Tel Aviv
FinOps - AWS Cost and Operational Efficiency - Pop-up Loft Tel AvivAmazon Web Services
 
Awsでのsql高可用構成 Always On
Awsでのsql高可用構成 Always OnAwsでのsql高可用構成 Always On
Awsでのsql高可用構成 Always OnShinodaYukihiro
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeAmazon Web Services
 
使用 AWS 負載平衡服務讓您的應用程式規模化
使用 AWS 負載平衡服務讓您的應用程式規模化使用 AWS 負載平衡服務讓您的應用程式規模化
使用 AWS 負載平衡服務讓您的應用程式規模化Amazon Web Services
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar Amazon Web Services
 
AWS Certified Solutions Architect Professional Course S1-S5
AWS Certified Solutions Architect Professional Course S1-S5AWS Certified Solutions Architect Professional Course S1-S5
AWS Certified Solutions Architect Professional Course S1-S5Neal Davis
 
AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019Amazon Web Services
 
High Performance Computing on AWS
High Performance Computing on AWSHigh Performance Computing on AWS
High Performance Computing on AWSAmazon Web Services
 
Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Amazon Web Services
 
AWS Application Discovery Service
AWS Application Discovery ServiceAWS Application Discovery Service
AWS Application Discovery ServiceAmazon Web Services
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack FundamentalsCenk Ersoy
 
Introduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web Services Introduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web Services Amazon Web Services
 

Tendances (20)

Designing and building a micro-services architecture. Stairway to heaven or a...
Designing and building a micro-services architecture. Stairway to heaven or a...Designing and building a micro-services architecture. Stairway to heaven or a...
Designing and building a micro-services architecture. Stairway to heaven or a...
 
FinOps - AWS Cost and Operational Efficiency - Pop-up Loft Tel Aviv
FinOps - AWS Cost and Operational Efficiency - Pop-up Loft Tel AvivFinOps - AWS Cost and Operational Efficiency - Pop-up Loft Tel Aviv
FinOps - AWS Cost and Operational Efficiency - Pop-up Loft Tel Aviv
 
Awsでのsql高可用構成 Always On
Awsでのsql高可用構成 Always OnAwsでのsql高可用構成 Always On
Awsでのsql高可用構成 Always On
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
使用 AWS 負載平衡服務讓您的應用程式規模化
使用 AWS 負載平衡服務讓您的應用程式規模化使用 AWS 負載平衡服務讓您的應用程式規模化
使用 AWS 負載平衡服務讓您的應用程式規模化
 
Setting Up a Landing Zone
Setting Up a Landing ZoneSetting Up a Landing Zone
Setting Up a Landing Zone
 
Amazon EC2 Masterclass
Amazon EC2 MasterclassAmazon EC2 Masterclass
Amazon EC2 Masterclass
 
AWS 101
AWS 101AWS 101
AWS 101
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Cloud Migration
Cloud MigrationCloud Migration
Cloud Migration
 
AWS Certified Solutions Architect Professional Course S1-S5
AWS Certified Solutions Architect Professional Course S1-S5AWS Certified Solutions Architect Professional Course S1-S5
AWS Certified Solutions Architect Professional Course S1-S5
 
Aws introduction
Aws introductionAws introduction
Aws introduction
 
AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019
 
High Performance Computing on AWS
High Performance Computing on AWSHigh Performance Computing on AWS
High Performance Computing on AWS
 
Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)
 
AWS Application Discovery Service
AWS Application Discovery ServiceAWS Application Discovery Service
AWS Application Discovery Service
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack Fundamentals
 
Deep Dive into AWS Fargate
Deep Dive into AWS FargateDeep Dive into AWS Fargate
Deep Dive into AWS Fargate
 
Introduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web Services Introduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web Services
 

Similaire à Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx

AWS August Webinar Series - DDoS Resiliency
AWS August Webinar Series - DDoS ResiliencyAWS August Webinar Series - DDoS Resiliency
AWS August Webinar Series - DDoS ResiliencyAmazon Web Services
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)Amazon Web Services
 
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...Amazon Web Services
 
Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Amazon Web Services
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF ResponseAmazon Web Services
 
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Amazon Web Services
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Amazon Web Services
 
Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWSAmazon Web Services
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Amazon Web Services
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPTAmazon Web Services
 
Hybrid Infrastructure Integration
Hybrid Infrastructure IntegrationHybrid Infrastructure Integration
Hybrid Infrastructure IntegrationAmazon Web Services
 
Running Hybrid Cloud Patterns on AWS
Running Hybrid Cloud Patterns on AWSRunning Hybrid Cloud Patterns on AWS
Running Hybrid Cloud Patterns on AWSShiva Narayanaswamy
 
AWS re:Invent 2016: Develop Your Migration Toolkit (ENT312)
AWS re:Invent 2016: Develop Your Migration Toolkit (ENT312)AWS re:Invent 2016: Develop Your Migration Toolkit (ENT312)
AWS re:Invent 2016: Develop Your Migration Toolkit (ENT312)Amazon Web Services
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxAWS Chicago
 
How to Bring Microsoft Apps to AWS - AWS Online Tech Talks
How to Bring Microsoft Apps to AWS - AWS Online Tech TalksHow to Bring Microsoft Apps to AWS - AWS Online Tech Talks
How to Bring Microsoft Apps to AWS - AWS Online Tech TalksAmazon Web Services
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS SecurityAmazon Web Services
 

Similaire à Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx (20)

AWS August Webinar Series - DDoS Resiliency
AWS August Webinar Series - DDoS ResiliencyAWS August Webinar Series - DDoS Resiliency
AWS August Webinar Series - DDoS Resiliency
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
 
Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts
 
DDoS Resiliency
DDoS ResiliencyDDoS Resiliency
DDoS Resiliency
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
 
Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)Automating nist 800 171 compliance in AWS Govcloud (US)
Automating nist 800 171 compliance in AWS Govcloud (US)
 
Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWS
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
Hybrid Infrastructure Integration
Hybrid Infrastructure IntegrationHybrid Infrastructure Integration
Hybrid Infrastructure Integration
 
Running Hybrid Cloud Patterns on AWS
Running Hybrid Cloud Patterns on AWSRunning Hybrid Cloud Patterns on AWS
Running Hybrid Cloud Patterns on AWS
 
AWS re:Invent 2016: Develop Your Migration Toolkit (ENT312)
AWS re:Invent 2016: Develop Your Migration Toolkit (ENT312)AWS re:Invent 2016: Develop Your Migration Toolkit (ENT312)
AWS re:Invent 2016: Develop Your Migration Toolkit (ENT312)
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
 
Deep Dive: Hybrid Architectures
Deep Dive: Hybrid ArchitecturesDeep Dive: Hybrid Architectures
Deep Dive: Hybrid Architectures
 
How to Bring Microsoft Apps to AWS - AWS Online Tech Talks
How to Bring Microsoft Apps to AWS - AWS Online Tech TalksHow to Bring Microsoft Apps to AWS - AWS Online Tech Talks
How to Bring Microsoft Apps to AWS - AWS Online Tech Talks
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 

Plus de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx

  • 1. © 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved. 迎戰DDoS攻擊的資安最佳實踐 Retro Kuo T r a c k 5 | S e s s i o n 3 Sr. Cloud Support Engineer Amazon Web Services
  • 2. Agenda • DDoS threats and trends • Introduction to AWS Support and AWS Shield •True stories and lesson learned • Frequently asked questions
  • 3. © 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 4. DoS (Denial ofService) Attacker Target Disrupt access for legitimate users using a variety of techniques that consume large amounts of network bandwidth or tie up other system resources from a single source
  • 5. DDoS (Distributed Denial ofService) Attacker Target Masters Bots Generate a flood of packets or requests to overwhelm a target using multiple sources – which may be distributed groups of malware infected computers, routers, IoT devices, and other endpoints
  • 6. Typesof threats SYN/ACK Flood | UDP Flood | ReflectionTransport Ping of Death | ICMP Flood |TeardropNetwork Data Link Physical Operated & Protected by AWS Presentation Application Session HTTP Flood, App exploits, SQL Injection, Bots, Crawlers, SSL Abuse, Malformed SSL
  • 7. Typesof threats(cont.) Bad BotsDDoS Application Attacks Application Layer Network/ Transport Layer UDP floods SYN floods Slowloris SSL abuse UDP reflection HTTP floods Content scrapers Scanners & probes Crawlers SQL injection Application exploits
  • 8. DDoS size trends 0 200 400 600 800 1000 1200 1400 1600 1800 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 Largest DDoSAttacks (Gbps) Memcached attacks Mirai attacks
  • 9. © 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 10. WhatisAWSSupport TECHNICALACCOUNT MANAGER (TAM) Designated technical point of contact to all necessary AWS expertise SUPPORT CONCIERGE Dedicated team of enterprise account specialists to help with billing and account subjects SMEs Cloud Support Engineers, SolutionsArchitects, and product teams are available for guidance TRUSTED ADVISOR (TA) Online resource to help you reduce cost, increase performance, and improve security by optimizing your AWS environment PERSONAL HEALTH DASHBOARD (PHD) Delivers alerts and remediation guidance when AWS is experience events that may impact your environment SUPPORT API Programmatic access to AWS Support Center features to create, manage, and close your support cases, and operationally manage yourTA check requests and status INFRASTRUCTURE EVENT MANAGEMENT (IEM) Focused planning and support business-critical events (e.g. launches or migrations) WELL-ARCHITECTED REVIEW Detailed review of your architecture guidance on how to best design your systems ARCHITECTURE SUPPORT Consultative reviews of your application architecture and how to align it with AWS OPERATIONS SUPPORT Consultative reviews of your cloud operations and advice for optimizationTRAINING Credits for online self-paced labs provided through anAWS training provider ABUSE TEAM Assists you when AWS resources are impacted by things such as Spam, Port scanning, Denial of Service attacks (DDoS), or malware
  • 11. AWSSupport plans Developer Business Enterprise Email/Live Phone/Chat/Screen Share Email 3rd Party Software Support** AWSTrusted Advisor 7 Checks ResponseTimes < 12 Hours* < 1 Hour < 15 Mins Technical Account Manager Infrastructure Event Management Addt’l Fee *Business hours are generally defined as 8:00 AM to 6:00 PM in the customer country as set in My Account console, excluding holidays and weekends.These times may vary in countries with multiple time zones. **For the list of supported third-party software, please visit: http://amzn.to/2wMrK0n
  • 12. AWSShield –Standard andAdvanced Automatic Protection across customers Enhanced Protection baselined to you 24x7 access to DDoS ResponseTeam (DRT) Built-in DDoS Protection for Everyone Point and Protect Wizard AWS WAF at no additional cost For protected resources AWS Firewall Manager at no additional cost Cost Protection for scaling CloudWatch Metrics Attack Diagnostics GlobalThreat Environment Dashboard
  • 13. © 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 14. True story#1(1/3) Situation • An Enterprise Support customer's website was under attack • Not a Shield Advanced customer • The website was hosted on-premises corporate data center DDoS Local ISP
  • 15. True story#1(2/3) Action and Result • A Cloud Support Engineer (CSE) participated in the call to provide solutions and guide the customer's engineering team to configure AWS resources • The DDoS attack was mitigated by securing the on-premises servers with Amazon CloudFront corporate data center DDoS Local ISPAmazon CloudFront
  • 16. True story#1(3/3) Recommendation and Tips • Avoid exposure of your origin's domain names and IP addresses
  • 17. True story#1(3/3) Recommendation and Tips • Whitelist CloudFront IP ranges to enhance security of your origin Tips: CloudFront IP ranges - https://amzn.to/2m4g48M How-to: Update security groups automatically using AWS Lambda - https://amzn.to/2ma44Cq
  • 18. True story#1(3/3) Recommendation and Tips • Associate AWS WAF rate limiting rules with CloudFront to mitigate HTTP request flood How-to: ConfigureAWSWAF rate-based rules - https://amzn.to/3hCmEvt
  • 19. True story#1(3/3) Recommendation and Tips • Associate AWS WAF rate limiting rules with CloudFront to mitigate HTTP request flood How-to: ConfigureAWSWAF rate-based rules - https://amzn.to/3hCmEvt
  • 20. True story#1(3/3) Recommendation and Tips • Subscribe to the Business Support plan to create a production system down support case (SLA < 1 hour)
  • 22. Latencybenefits withPoP launches Argentina 55% Latency reduction 79 ms  35 ms Chile 73% Latency reduction 104 ms  28 ms PoP launches ensure connectivity with majority views and redundant AWS backbone Bahrain: 40% Latency reduction 38 ms  27 ms
  • 23. Advanced securitycapabilities Advanced ciphers Certificate manager OCSP stapling Session tickets Perfect forward secrecy Protocol enforcement Half or full bridge connections TLSv1.0, 1.1, 1.2 Field-level encryption Encrypted connections Custom origin protection Header and ACL Content protection Signed URL / Cookies Content restriction geo blocking Amazon S3 origin access identity Access control • AWS Identity and Access Management (IAM)
  • 24. APIacceleration withCloudFront • TLS termination at edge • Network optimizations: persistent connections, connection pooling, keep-alive • AWS private backbone • Edge DDoS protection “The performance gains are amazing, positively impacting our app’s usage across the globe, especially in Regions further from US EAST 1.” Sample data from a customer test
  • 25. Dynamic content:WebSocket support “CloudFront WebSocket support means that we can simplify our infrastructure and further improve customer satisfaction. CloudFront edge locations will now contribute to better user performance inWebSocket apps” “CloudFront now supportingWebSockets enables us to consolidate both our dynamic and static content delivery under a single distribution, improving global reach, enhancing app security, and simplifying our delivery architecture all at the same time. ” • Use cases: Bi-directional and real-time communication between client and server • Commonly used for chat applications, online collaboration platforms, and financial trading platforms Evolution Gaming
  • 26. True story #2 (1/3) Situation • An Enterprise Support customer's Elastic Load Balancer was reported as the source of attacks (sending SYN-ACK to port 22) by a third-party security institute
  • 27. True story #2 (2/3) Action and Result • The monitoring tool and metrics show that the load balancer didn't initiate attack traffic; instead the load balancer was responding to valid traffic with spoofed source IP addresses • The investigation performed by the AWS Support and engineering team indicates that this was a reflection attack Source:Victim:22 Destination: ALB:80 Source: ALB:80 Destination:Victim:22
  • 28. True story #2 (3/3) Recommendation and Tips • Enable VPC flow logs with additional metadata to inspect your network traffic
  • 29. AmazonVPC traffic mirroring AmazonVPC traffic mirroring duplicates the traffic going into an EC2 instance and shares it with security and monitoring tools ⁄ Duplicate traffic to inspect for threats, network troubleshooting, and performance ⁄ Extract only the traffic of interest ⁄ Extend your capabilities with third-party solutions in the AWS Marketplace and partner solutions
  • 30. True story #2 (3/3) Recommendation and Tips • Configure security groups and network ACLs to allow access to service ports only (included in the Trusted Advisor best practice checks)
  • 32. Public subnet Public subnet Private subnet Private subnet VPC Availability Zone US-EAST-1A Availability Zone US-EAST-1B Subnets
  • 33. Public subnet Public subnet Private subnet Private subnet VPC Availability Zone US-EAST-1A Availability Zone US-EAST-1B EC2instances Instance Instance Instance Instance
  • 34. VPC Availability Zone US-EAST-1A Availability Zone US-EAST-1B Instance Instance Instance Instance Public subnet Public subnet Private subnet Private subnet Gateways,endpoints & peering
  • 35. Public subnet Public subnet Private subnet Private subnet VPC Availability Zone US-EAST-1A Availability Zone US-EAST-1B Web server Web server Application server Application server Example webapplication Web server security group Application server security group ELB
  • 36. True story #2 (3/3) Recommendation and Tips • Contact AWS immediately if you discover any vulnerabilities or have security concerns about AWS services Email: aws-security@amazon.com Web: https://go.aws/30RQC8I
  • 37. True story#3(1/4) Situation • A Basic Support customer's UDP-based game servers hosted on EC2 instances were under attack • Unsatisfied with Shield Advanced as users were impacted after the subscription of Shield Advanced • Attack volume wasn't massive but targeted the service ports
  • 38. True story#3(2/4) Action and Result • A CSE served as a bridge between the customer and DDoS Response Team (DRT) to facilitate communication • The attack was mitigated by whitelisting certain countries to access game servers (custom mitigation rules configured by the DRT)
  • 39. True story#3(3/4) Recommendation and Tips • Baseline your traffic and be familiar with your packet format • Drop/Shape network traffic using security groups, network ACLs, and iptables // The length module matches packet size $ iptables -m length --length 256:65535 // The u32 module matches arbitrary byte patterns $ iptables -m u32 --u32 "16=0xE0000001" How-to:Write iptables rules to drop packets that do not match your application format - http://bit.ly/2mG3XPn
  • 40. True story#3(3/4) Recommendation and Tips • Scale your servers by choosing the right instance type and size, enabling Enhanced Networking, and using AWS Auto Scaling with AWS Global Accelerator and AWS Elastic Load Balancing AWS Shield Advanced Network Load Balancer AWS Global Accelerator Whitepaper: AWS Best Practices for DDoS Resiliency - http://bit.ly/2ldui6W
  • 41. We use AWS Global Accelerator to ingest telemetry data onto AWS, taking advantage of the static IP addresses it provides, along with traffic-shifting capabilities and many points of presence around the globe. Ken Gavranovic SVP, Product Management New Relic AWSGlobalAccelerator Improve global application availability and performance using the AWS global network New in 2019: / Launched in 10 new Regions in 2019 / Client IP preservation for ALB and Amazon EC2 instances
  • 43. Let’ssayyouhaveaninternet-facingapplication… ⁄ ⁄ ⁄ ⁄ AWS Global Accelerator Direct to AWS Region via public internet Availability measured by clients on the internet using third-party measurement systems Starts in the USA… …expands to Europe… …and then adds Asia Consistent availability with AWS Global Accelerator Low availability due to public internet traffic Less responsive application due to public internet traffic Consistent latency due to AWS Global Accelerator High latency due to public internet traffic Consistent latency due to AWS Global Accelerator Availability First byte latency First byte latency
  • 44. Networking innovation,enabled byAWSNitro System Nitro Card Networking, monitoring, and security EC2 - c5.18xlarge EC2 - c5n.18xlarge Throughput (Gbps) 91 23 Latency (Microseconds) 68 51 Packets per second (Millions) 1.93 6.52
  • 45. True story#3(4/4) Recommendation and Tips • Be prepared – work with the DRT to build your custom mitigation rules, authorize the DRT to access your logs, review operational practices periodically
  • 46. True story#3(4/4) Recommendation and Tips • Automate the process – deploy the AWS Shield Engagement Lambda function to shorten the time to engage AWS Support and the DRT, monitor AWS Shield Advanced metrics to be informed of DDoS attacks via Slack or PagerDuty How-to: Set up AWS Shield Engagement Lambda - http://bit.ly/2ldui6W
  • 47. Whichonedoyouneed–AWSSupportandAWSShield Advanced AWS Support • Provides people, technology, and programs to assist you with DDoS attacks • For instance, SMEs to help you build a DDoS- resilient architecture;Trusted Advisor to make sure your environment is secure and well utilized and performed • Recommended for customers running production workloads on AWS AWS ShieldAdvanced • Provides access to the DRT, additional cost/resource protection, and metrics to help you deal with more complex and sophisticated DDoS attacks • For instance, DRT to build mitigation rules tailored for your application; using AWSWAF with no additional cost; credits for charges incurred due to attacks • Recommended for customers running business critical workloads on AWS
  • 48. © 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 49. Frequently askedquestion#1 Q: How quickly will attacks be mitigated? 99% of infrastructure layer attacks detected by AWS Shield are mitigated in less than • 1 second for attacks on CloudFront/Route 53 • 5 minutes for attacks on ELB 1% of infrastructure layer attacks are typically mitigated in under 20 minutes Application layer attacks are mitigated by writing rules on AWSWAF, which are inspected and mitigated inline with incoming traffic
  • 50. Frequently askedquestion#2 Q: AWS Shield Advanced didn't mitigate the attack against my application Building the mitigation rules tailored for your application takes time and effort. We recommend you reach out to us as early as possible to get prepared for DDoS attacks. Baseline and be familiar with your network traffic Submit a support case to build custom mitigation Arrange a test with the DRT
  • 51. Frequently askedquestion#3 Q: How much traffic did AWS Shield drop? Availability and performance are the key factors to the health of your application.We recommend you use the above factors to measure the effectiveness. If you would like to gauge the size of attacks, check the CloudWatch metrics: • DDoSAttackBitsPerSecond • DDoSAttackPacketsPerSecond • DDoSAttackRequestsPerSecond
  • 52. LearnnetworkingwithAWSTrainingandCertification Free digital courses cover topics related to networking and content delivery, including Introduction to Amazon CloudFront and AWSTransit Gateway Networking and Scaling Resources created by the experts at AWS to help you build and validate cloud networking skills Validate expertise with the AWS Certified Advanced Networking – Specialty exam Visit the advanced networking learning path at aws.amazon.com/training/path-advanced-networking

Notes de l'éditeur

  1. 大家好 歡迎大家參加2020 AWS 雲端高峰會 這是資訊安全主題的第三場議程 迎戰DDoS攻擊的資安最佳實踐 我是Retro 我在AWS擔任雲端支援工程師大約4年半左右的時間 主要負責的領域為網路、內容傳遞及安全,以服務來說的話大致上是VPC、ELB、CloudFront及Shield等服務 在今天的這場議程中 我將為大家介紹如何使用AWS的服務,例如:CloudFront、AWS Support、Shield、VPC、Global Accelerator建立足以抵禦DDoS的架構 分享過去實戰經驗中的心得及技巧 及最後解答大家對DDoS常見的迷思
  2. 這是今天的議程 首相我會先簡單介紹DDoS 讓我們對攻擊方式有簡單的了解 接著我會很快地介紹AWS Support及Shield 原因是接下來的真實案例中有許多的內容是與這兩個服務相關 在真實案例及重點心得分享時 我還會介紹在2019年AWS釋出的新服務及功能 讓大家對相關服務有更多的了解 最後我會講解三個常見的DDoS防禦迷思
  3. 好 讓我們馬上開始介紹DDoS
  4. 在說明DDoS之前 我想先介紹DoS 因為DDoS為DoS的進化 DoS中文意思為阻斷式攻擊 意思是指透過單一個來源產生大量的流量以讓網路壅塞或是造成系統資源緊繃 目標主機的服務會因此癱瘓 所以稱為阻斷式攻擊
  5. DDoS 是將DoS攻擊進階為分散式阻斷攻擊 顧名思義 分散式代表來源從原本的一個變成多個 讓防禦變得更為棘手 在DoS的情況下 因為來源單一 只要將該來源加入防火牆黑名單 很容易就可以抵禦 在DDoS的情況下 因為來源可能成千上萬 很難單靠把來源加入防火牆的方式抵禦 此外 這些來源大多數為受感染或被入侵的主機 因此實際攻擊的發起者也並非這些來源主機 在抵禦DDoS上 會需要更多的知識、技術、經驗才能有效地抵禦攻擊
  6. 以OSI 7層來看 我們大致可以將攻擊分成4個類型 由下往上 第一個類型為實體及資料層 這部分是由AWS所營運及保護 所有的AWS客戶預設不需要擔心來自這兩層的威脅 第二個類型為網路層的攻擊 像是ICMP洪水攻擊 第三個類型為傳輸層的攻擊 像是TCP、UDP洪水攻擊以及近年來最常見的反射式攻擊 最上層則是會話、表達及應用層 可以分為洪水攻擊像是HTTP洪水攻擊或是針對應用程式的攻擊像是SQL注入、爬蟲、SSL濫用等 接著我們看另外一種分類方式
  7. 假設以攻擊形式來分類 我們可以大致分為三類 DDoS 應用程式攻擊以及惡意機器人 這場議程主要是針對DDoS類型的攻擊來看 以應用層來說的話有HTTP洪水及Slowloris -> 緩慢消耗系統資源的攻擊 網路及傳輸層的話有TCP、UDP洪水、反射攻擊、SSL濫用等
  8. 接著我們看到DDoS近幾年成長的趨勢 從2016的Mirai來看 隨著IoT裝置及小型路由器的盛行 惡意軟體透過這類裝置所產生的攻擊總流量可以達到800 Gbps 到了2018年 攻擊者利用放置於Internet的Memcached服務 加上兩個該服務的特點 第一:UDP協定可以輕易假造來源IP地址 第二:反射攻擊的槓桿很大 對Github產生了1.6 Tbps等級的DDoS攻擊 從這樣的趨勢來看 想要完全依靠本地資料中心去抵擋DDoS攻擊變得不切實際
  9. 主要分成三個部分 人 工具及計畫 人的話主要有CSE、TAM協助技術問題及架構建議 工具的話有Trusted Advisor對你的AWS帳戶進行最佳實踐檢查、Personal Health Dashboard提醒你即將發生或已經發生的服務事件 計畫的話則有基礎設施事件管理幫助你成功地在AWS上執行企業關鍵活動 像是售票、產品發佈、搶購等活動
  10. AWS Support的支援計畫則分為4種 基本支援計劃在你啟用AWS帳戶時就預設提供 讓你可以詢問帳戶相關的問題或提升限制的需求 開發者支援計畫則可以開啟技術支援案例 但僅止使用電子郵件且響應時間最低為12小時 商業支援計畫則可以使用對談、電話及螢幕分享等方式與AWS Support聯繫 且響應時間最低為1小時 企業支援計劃則可以開啟響應時間為15分鐘以下的案例 且有無限次數的基礎設施事件管理及專屬的技術客戶經理
  11. 接著很快地介紹Shield Standard及Shield Advanced 我們分為四個面向 第一為設定組態 第二為保護方式 第三為視覺化 第四為成本 以Standard來看 AWS所有服務預設就包含Shield Standard 不需要額外設定 但Advanced提供更進階的保護 像是針對執行個體類型的防禦規則 24x7為你服務的DDoS反應小組 對DDoS有更高可視度的CW指標 全球DDoS威脅的儀表板 攻擊分析等 以及最重要的成本 訂閱Shield Advanced且將資源加入保護清的情況下 不避額外支付AWS WAF及Firewall Manager的費用 因為攻擊所產生的費用也可獲得減免 例如流量費用或升級或擴展執行個體大小所產生的費用
  12. 企業支援計劃的客戶在本地資料中心的網站遭到DDoS攻擊 客戶沒有訂閱Shield Advanced
  13. 雲端支援工程師立刻加入客戶的電話會議並且解決方案及指導客戶的工程團隊設定AWS資源 最終攻擊在使用CloudFront服務後成功地減緩
  14. 從這次的案例我們可以看到第一個重點心得為 避免將原始伺服器的IP地址及網域名稱暴露出來
  15. 第二重點為CloudFront有發布IP地址範圍 因此在原始伺服器上(不論在本地資料中心或雲端)都可以透過IP地址白名單的方式限制訪問
  16. 第三個重點為使用AWS WAF服務並設定依速率為基礎的規則 來限制單一個來源IP地址每5分鐘可以訪問的次數 <講解依速率為基礎的運作方式> <介紹AWS WAF:視覺化編輯器>
  17. <介紹AWS WAF:JSON編輯器>
  18. 因為DDoS攻擊發生時通常需要緊急的協助 在訂閱商業支援計劃的情況下 你可以開啟響應時間為1小時的案例
  19. 因為這個案例是透過CloudFront減緩攻擊的 所以我們看一下CloudFront在2019年的一些新功能 在2017年11月 CloudFront成長到了100個邊緣節點 從2009年CloudFront服務啟用到這個階段一共花了9年的時間 但在過去的兩年中 CloudFront從100個邊緣節點成長到了210的邊緣節點 (截至今天為止為216個) 1/ CloudFront is our content delivery network, and is a great example of the scale we can deliver. 2/CloudFront reached its first 100 POPs in November 2017, 9 years after the service launched, it took us only 2 years to launch the next 110 POPs – bringing us to the 210 we have today. ==== 10/24/19 CloudFront announced it’s 200th Edge location by launching over 100 new Edge locations over the past 2 years. Included in this launch were three new countries in South America and a 56% pricing reduction for SA delivery. Another interesting side note for reference, CloudFront reached its first 100 POPs in November 2017, 9 years after the service launched, it took us only 2 years to launch the next 100 POPs bringing us to the 200 today. The launch of 10 additional PoPs at reinvent 2019 brought the total to 210.
  20. 隨著邊緣節點的增加 延遲有明顯的改進 以上是四個國家觀察到的指標:以色列 智利 巴林 阿根廷
  21. 除了效能之外 安全也是CloudFront主要改進的項目 例如多樣的存取控制功能:簽章URL、cookie、地理位置阻擋、針對原始伺服器的保護 加密的連線:可隨需求調整的SSL協定、Perfect Forward Secrecy(解釋)、及與Certificate Manager服務的整合(舉例) 除了Certificate Manager外 還包含AWS WAF、Shield、IAM等服務整合
  22. 安全及效能整合在一起的結果就是 我們可以看到右邊這張圖顯示效能上的改進 在使用SSL協定的情況下 多數的區域可以減少大約80%的延遲
  23. 除此之外 CloudFront也支援了WebSocket協定 提供雙向且即時的通訊 常被用於聊天、線上協同合作及金融交易平台
  24. 既然講到VPC Flow Log 就要提到現在VPC也支援Traffic Mirroring 你可以複製EC2上ENI的流量到另一台EC2或NLB上 常見的使用場景為網路故障排除、流量監控等 還可以整合第三方的服務來滿足你的各種需求 1/ Traffic Mirroring is another Amazon VPC feature that you can use to copy network traffic from an elastic network interface of Amazon EC2 instances. You can then send the traffic to out-of-band security and monitoring appliances to inspect their content, monitor for threats, or troubleshoot problems. 2/ Security and monitoring appliances can be deployed as individual instances, or as a fleet of instances behind a Network Load Balancer with a UDP listener. 3/ Traffic Mirroring also supports filters and packet truncation, so that you only extract the traffic of interest to monitor by using monitoring tools of your choice 4/ Here as well there are a large numbers of partners to work with.
  25. 那接著我們看一下如何在VPC網路建立符合最佳實踐網路架構 首先在一個AWS區域你會建立一個VPC 在這個VPC內有多個可用區域可以使用 The VPC resembles a traditional network that you’d operate in your own data center, with the benefit of using the scalable infrastructure of AWS. The VPC cross-cuts all of the AZs within a region. It contains the resources you launch into the virtual network that you define. It is where you define the super-net for your virtual network. We’ll talk more about IP addressing later.
  26. 在每個可用區域中 你會建立公有及私有子網路 以滿足安全的需求
  27. 接著你會在不同的子網路中啟用EC2等資源
  28. VPC提供了多種連接的選擇 讓你可以從子網路透過VPN、Direct Connect等服務連接到你的本地資料中心 你也可以利用不同的端點、閘道連接到不同VPC、AWS服務或網際網路
  29. 為了滿足安全的需求 你會建立不同的安全群組 以控制誰可以訪問網頁伺服器及應用程式伺服器 舉例來說 網頁伺服器可能開放80及443連接埠給Internet 而應用程式伺服器只開放給VPC或本地資料中心存取 藉由這樣的架構 你可以建立一個安全的VPC網路 區隔公開及私有的流量
  30. 說到Global Accelerator 在2019年GA在額外10個區域啟用 此外 很多客戶希望GA可以保留客戶端原始IP地址 現在ALB及EC2已經支援了
  31. 針對Internet weather這樣的狀況我們來看一下GA可以有什麼幫助
  32. 我們來看看GA的效果 假設你有一個應用程式運行在美國且使用者也在美國 在使用GA的情況下 當本地ISP發生故障 透過GA訪問的使用者沒有因此受到影響 接著你擴展到歐洲 因為全球節點的關係 延遲變得相對穩定 到了亞洲 你發覺GA對整體的效能很有幫助 從線上我們可以看到在使用GA的情況延遲低於直接存取在美國的應用程式許多
  33. If you’re ready to continue learning, we offer free, digital courses on Networking and Content Delivery, including 2 hour deep dive into AWS Transit Gateway Check your knowledge and skills with the one day class on exam readiness for the AWS Certified Advanced Networking – Specialty, available online or in-person. Then, validate your experience with an industry-recognized certification AWS Certified Advanced Networking – Specialty.