Mark Gritter · @markgritter
202 followers · 312 posts · Server mathstodon.xyz

I'm perpetually confused by security groups, which act both as access control rules *and* an identifier for a source of traffic.

For example, you can attach multiple security group to a load balancer, and my understanding is that the result is the union of the permissions.

But when you want to permit traffic from that load balancer to your instance, the load balancer's is the "source" for a rule in the instance security group.

But if the load balancer has three groups A, B, and C, are any of them usable as the source? My reading of docs.aws.amazon.com/vpc/latest suggests "yes" -- any resource associated with the source security group can use that rule.

The pictures in the documentation look all nice and neat and hierarchal, when in real life it seems it is always a horrible mess, particularly when you let Kubernetes start creating things for you.

I think the thing that is more surprising to me is that the security group view does not give you any way of finding what is in it! You have to go to the "network interfaces" tab and filter by service group there, then look at the descriptions of each to see what it belongs to.

(So the real members of a security group are network interfaces? I'm pretty sure you can set up different ENIs attached to the same instance in different security groups, but that seems glossed over a lot in the UI.)

Frankly, I think this is an incredible muddle and I'm wondering if other cloud providers do better.

#securitygroup #aws

Last updated 1 year ago

Patrick Koch · @patkoch
16 followers · 10 posts · Server hostux.social

My next blog post explains Virtual using a configuration. It is intended for all who would like to establish their first private network in Azure.

🔗 patrickkoch.dev/posts/post_26/

#azure #network #terraform #azurecommunity #iac #Cloud #microsoft #hashicorp #virtualmachine #subnet #securitygroup

Last updated 2 years ago

Andy 'Bob' Brockhurst · @b3cft
62 followers · 90 posts · Server infosec.exchange

@dob That's a big scope.

Some things we do to make our lives easier and doesn't cost $$$.

Enable and pipe all the alerts into a slack channel (+email as well).

Enable log everything to an bucket in another account. alerts on auth failures (to slack + email (some go to pagerduty contact).
We also have some alerts on updates when a cidr is added to a .

Don't use or /#JumpHosts use to run automations on the hosts (package install, service restarts etc) also to get a shell on a box (if needed at all). (you can use with to give granular access).
Using for console access also logs the entire session (including someone doing sudo su - root etc!) into

Use within our . Instances behind an will only accept traffic from the etc.. , willl only accept traffic from instances in the appropriate . (Basically we don't use cidr ingress rules, we use security group ids) (this works across accounts in the same region with peering, but not across regions however).

#guardduty #cloudtrail #s3 #cloudwatch #infosec #securitygroup #ssh #bastion #ssm #transitivetags #roleassumption #microsegmentation #vpc #alb #rds #elasticache #aws

Last updated 2 years ago