Skip to content

Latest commit

 

History

History
25 lines (16 loc) · 3.81 KB

50-going-further.md

File metadata and controls

25 lines (16 loc) · 3.81 KB

Going further.....

In the interest of simplicity, as a gentle introduction, this lab gives operator access through a VSI jumpbox in management and expose directly the application through public load-balancer attached to the worker VPC.

Whilst this approach provides a reasonable level of security and checks a number of compliance controls, and may be sufficient for a number of industries and enterprises, the sections below describe a number of aspects to consider to enhance secure and compliance posture, including links to relevant documentation and automation.

Operator access

There are a more secure options for providing network connectivity to the management VPCs:

From a compliance perspective, it is recommended to record all interactive operator actions. For doing so, a bastion solution is required. Operator connect through the bastion, which record all interactive session action for auditing purposes. The IBM cloud Framework for Financial Services has got more details, and well as a tutorial to set up a bastion solution leveraging the 3rd party solution Teleport here.

Exposing the web application to the internet

In the lab, the workload is exposed through a public VPC load balancer attached to the workload VPC. There are a few additions that can be made to make the solution more secure:

  1. Introduce a web application firewall in the flow. This can be done in two ways:
  • As-a-service - typically done through adding a global load balancer, such as IBM Cloud CIS or Akamai in front of the VPC load balancer, and adding a network ACL on the VPC load balancer to accept inbound traffic only from the global load balancer set of known IPs
  • Hosted – this can be achieved with 3rd party solution such as BigIP F5. This solution is deployed and hosted on machines that you run – for instance in VSIs in the landing-zone VPC topology. See here for a tutorial.
  1. Create the public VPC load balancer in a separate ‘edge’ VPC. Route the traffic from the ‘edge’ VPC to the application running on the ‘workload’ VPC through a private load balancer (routable only from within the VPC topology). This approach ensures that there are no direct public network flows to the workload VPC. See this page for more details.