The page has been translated by Gen AI.

Infrastructure Security

Infrastructure Security

Network Security

In cloud environments as well as existing IT environments, network security is considered a core element of overall security.

This is because the network controls access to all hosts, and it is the only technical means that allows access to systems and data for an unspecified number of people.

When configuring network control, a precise access policy must be established to block attackers and allow legitimate users to use it normally.

Moreover, since the cloud exists outside the user’s network, i.e., on the Internet, it must be built and operated on the premise of an Internet connection.

Also, since most modern applications are developed based on Internet connections, Internet connections cannot be excluded.

When configuring network architecture and establishing policies in the cloud, the network space and access rights where each component of the information system built by the user is located must be intentionally subdivided and boundaries set.

These subdivision strategies include network, user, and resource access.

Network Layering

Best Practice
Always isolate systems in a small scope to reduce the blast radius in case of a security incident, and only allow necessary access to important data.
Design Principle
  1. Group all servers by function and place them in separate subnets, and place them in private subnets except when necessary.
  2. Minimize access points from the Internet to VPC to strengthen security.
  3. Set up storage (where important data is stored) to only allow access to necessary targets.

Areas with high security requirements, such as personal information or confidential data, should be isolated from the outside and other components, and access should be restricted.

This allows the scope of the breach to be minimized as much as possible even if unauthorized access occurs in part of the information system.

Subdivided components are grouped according to the same security type and boundaries are set to restrict network access.

In general, they are grouped into a three-tier structure of web, application, and database, and the entry point that external networks access is configured as a separate boundary.

The following figure shows a three-tier web service architecture.

구성도
Figure. 3-tier web service architecture
  1. Placement and layering of workloads in private subnets
    In the figure, Web, App, and DB Subnet are placed.
    In this architecture, all servers for services are placed in private subnets, and each server is grouped into Web, App, and DB and placed in separate subnets.
    This allows direct access from the external Internet to internal resources to be blocked, and the service flow is layered to make it difficult to access important data. A Bastion Server is created for server management and placed in a separate private subnet, allowing administrators to connect to each server.
    Administrators connect to the Bastion Server through a VPN and then connect to the internal servers for management.

  2. Minimizing the external attack surface
    To minimize the services exposed to the Internet, only the Load Balancer is open to the external Internet in the architecture of the figure.

  3. Storage access control
    The database is configured to only allow access from applications that need access.
    If necessary, according to compliance requirements, the application may need to be configured to access the database through an access control server.
    For example, the ISMS regulation requires database access control management as a mandatory requirement.
    Storage manages accessible targets with a White List and configures an access control list (ACL).
    The storage that manages the access control list includes File Storage, Object Storage, and Container Registry. (Not storage, but Kubernetes Cluster also manages access control lists.)
    The targets of access control lists include public IP addresses, servers within projects, and VPC Endpoints.

Network Traffic Control

Best Practice
Apply security to all resources and layers.

Strict control rules are applied to traffic transmitted to and from Samsung Cloud Platform to block security intrusions. To do this, the network structure is designed by analyzing the connection requirements of each component of the service, and a traffic control policy is established accordingly.

Network communication control policies may vary depending on the characteristics of the service. Through service requirement analysis, network flows are identified, and the criteria for control policies are established.

Design Principle
  1. Establish network communication control policies for all resources within the VPC.
  2. Control send and receive traffic with finely configured communication control policies.
  3. Configure in-depth defense by limiting traffic to necessary ports between components, strengthening the security of the entire traffic flow.
Reference

[Network Flow Requirement Analysis]

When analyzing the connection requirements of the service, network flows can be identified according to the following classification.

  • External Internet Accessibility
    Public Subnet: A subnet where a Virtual Server with a connected Public IP is deployed. This is an arbitrary classification, and the Virtual Server in this subnet manages traffic with the internet.
    Private Subnet: A subnet where a Virtual Server without a connected Public IP is deployed. This is an arbitrary classification, and the Virtual Server in this subnet is isolated from the internet.

  • Traffic Direction
    Sender IP address, Receiver IP address, Port are used to construct information about traffic direction.
    Receiving (Inbound): Traffic coming into the component. The receiver IP address is the IP address (range) of the server (set) controlling the traffic.
    Sending (Outbound): Traffic going out from the component. The sender IP address is the IP address (range) of the server (set) to be controlled.

  • Impact Range
    North-South: Traffic flowing between the outside and inside of a VPC, mainly service traffic flowing between external service users and workloads.
    East-West: Traffic flowing between components within a VPC, such as traffic flowing between an application server and a database server in a 3-tier web service.

Samsung Cloud Platform provides services that can be used to control traffic within a VPC, namely Firewall and Security Group.

Firewall is used for traffic control at the network boundary, while Security Group is used for traffic control at the server level.

The figure below shows the implementation of Firewall and Security Group traffic control in a 3-tier web service architecture.

Configuration Diagram
Figure. Traffic Control Configuration of 3-Tier Web Service
  1. The first boundary for North-South traffic is the Internet Gateway, which is connected to a Firewall to control traffic.
    Internet users or administrators access the VPC through the Internet Gateway.
    At this time, an example of a configurable Firewall rule is as follows.
    Internet users access the Load Balancer via HTTPS (443), and the rule is specified as shown in 1-1.
    Administrators are allowed to access the Bastion Server through the Internet Gateway Firewall, as shown in rule 1-2.

  2. In the Bastion server, a Security Group rule (2-1) is added to allow inbound remote access only from the administrator’s terminal IP address, and an outbound rule (2-2) is added to target all Security Groups connected to servers within the VPC.
    The Web server Security Group (4-3) and App server Security Group (6-3) add the Bastion server’s Security Group as a target to allow server access for management.

  3. The Web Load Balancer receives user requests from the internet and distributes them to the Web servers.
    The Public NAT IP of the Load Balancer serves as a single exposed access point, preventing unnecessary internet exposure of the Web servers.
    Firewall rules can be configured for the Load Balancer to control transmitted traffic.
    Configuring different receive and transmit ports for the Load Balancer allows for a more robust policy.
    For example, receiving front-end traffic via HTTPS (443) and transmitting it to the App Server as HTTP (80) traffic allows for a change in the service flow port.
    This not only enhances security by specifying different receive and transmit ports but also reduces the SSL encryption and decryption processing load on the Web server.
    SSL certificates are managed separately through the Certificate Manager.

  4. The Web Security Group allows inbound HTTP (80) traffic from the front-end Load Balancer and outbound traffic to the App Load Balancer (4-1, 4-2).

  5. The App Load Balancer configures a Firewall rule (5-1) to allow inbound HTTP (80) traffic with the Web server address as the source IP and the Service IP as the destination IP.
    It also adds an outbound rule to change the transmit port to HTTP (8080) and allow it (5-2).

  6. The App server Security Group configures a rule (6-1) to allow inbound HTTP (8080) traffic from the App Load Balancer and a rule (6-2) to allow outbound traffic to the DB server on port 2866.
    At this point, the service flow port is changed again.

  7. The Database allows inbound and outbound traffic on port 2866, targeting the App server Security Group and DB Security Group (7-1, 7-2).

Deep defense is a concept where multiple layers of security controls are created to block attackers, even if one layer fails.

This effort to create layered defenses starts from acknowledging that attackers may exploit any weakness and that defense may fail.

Using Firewall and Security Group to change the send and receive ports at each layer, the ultimate goal of deep defense is to prevent intruders from reaching the database where critical information is stored.

Samsung Cloud Platform’s Security Group can include not only specific address ranges (CIDR, etc.) but also other Security Groups as allowed targets.

By specifying a Security Group as an allowed target, all Virtual Servers connected to that Security Group can be specified as communication allowed targets, which is useful when applying Auto-Scaling to layers.

The following table summarizes the rules described above.

NumberServiceDirectionSource IP/RemoteDestination IP/RemoteProtocol/PortAction
1-1Internet Gateway
Firewall
Inbound0.0.0.0/0
(Internet)
Web Load Balancer Service IPHTTPS(443)Allow
1-2Internet Gateway
Firewall
InboundAdministrator’s
Public IP
Bastion Server IPRDP/SSH(3389/22)Allow
2-1Bastion Server
Security Group
InboundAdministrator’s
Public IP
-RDP/SSH(3389/22)-
2-2Bastion Server
Security Group
Outbound-All Security GroupsRDP/SSH(3389/22)-
3-1Web
Load Balancer
Firewall
Inbound0.0.0.0/0
(Internet)
Web LB Service IPHTTPS(443)Allow
3-2Web
Load Balancer
Firewall
OutboundWeb LB Service IPWeb VM IP(band)HTTP(80)Allow
4-1Web Server
Security Group
InboundWeb LB
Source NAT IP
-HTTP(80)-
4-2Web Server
Security Group
Outbound-App LB Service IPHTTP(8080)-
4-3Web Server
Security Group
InboundBastion Server Security Group-RDP/SSH(3389/22)-
5-1App
Load Balancer
Firewall
InboundWeb VM IP(band)App LB Service IPHTTP(80)Allow
5-2App
Load Balancer
Firewall
OutboundApp LB Service IPApp VM IP(band)HTTP(8080)Allow
6-1App Server
Security Group
InboundApp LB
Source NAT IP
-HTTP(8080)-
6-2App Server
Security Group
Outbound-DB Security Group2866-
6-3App Server
Security Group
InboundBastion Server Security Group-RDP/SSH(3389/22)-
7-1DB Server
Security Group
InboundApp Security Group,
DB Security Group
-2866-
7-2DB Server
Security Group
Outbound-App Security Group,
DB Security Group
2866-

*This configuration does not include rule settings for health checks of Load Balancer server group members.

Table. Example of Firewall and Security Group Settings for Deep Defense in 3-Tier Web Service

Network Traffic Filtering

Best Practices
Use managed security services to enhance security.

Samsung Cloud Platform provides various managed security services.

Users can apply for services through SR.

Note: SR is assumed to be a service request or support request system, but its full meaning is not explicitly defined in the provided text. When using managed security services, you can delegate management tasks and inspections for equipment, allowing you to protect your workload safely and easily.

Design Principles
  1. Deploy and manage a Secure Internet Gateway and apply for managed security services.
  2. Use appropriate security services according to compliance requirements.

The following figure shows a 3-tier web service architecture with enhanced security by deploying managed security services.

Configuration
Figure. 3-tier web service managed security service

The following table describes the features and types of attacks that can be defended by the managed security services provided by Samsung Cloud Platform.

Security ServiceFeatureRelated Invasion Type
WAF
(Web Application Firewall)
Defense against HTTP, HTTPS-based security threats and automated bot attacks that target website vulnerabilitiesInjection, XSS (Cross-Site Scripting), Web Scan, etc.
DDoS
(Distributed Denial of Service) Protection
Detection and defense against DDoS attacks that cause service failures by generating massive trafficDDoS attacks
IPS
(Intrusion Prevention System)
Monitoring of maliciously suspected traffic and application manipulation patternsHacking attack detection
Secured Firewall4-layer traffic controlUnauthorized access, IP scanning, etc.
Table. Samsung Cloud Platform security services

Server Security

Vulnerability Inspection and Measures

Vulnerabilities refer to weaknesses in the system that attackers can exploit to lower the security level of the information system.

Attackers can attack vulnerabilities to gain system privileges or leak important information outside.

Server vulnerability inspection is the process of checking if the security settings of the virtual server operating system are properly applied.

Best Practices
Regularly inspect known operating system vulnerabilities and apply the latest patches.

Samsung Cloud Platform provides Linux 5 species and Windows Server operating systems.

Although application vulnerabilities cannot be completely eliminated, system attacks can be limited by strengthening the security of operating systems, file systems, and others.

Directory access reinforcement and process-level restrictions can prevent attacks, and file and folder permission settings, separate directory creation for necessary access, avoidance of common access, and application restart automation are required.

Design Principles
Regularly inspect security vulnerabilities in server operating systems and applications.

Applying the latest security patches is crucial, and following OWASP’s safe coding best practices is recommended.

If necessary, tools can be used to support security patch application and monitoring, and automation tools can be used.

The following are server security management items that should be inspected regularly.

Management ItemManagement Content
Operating System Name, VersionManagement of the technical support period (End Of Support) provided by the operating system vendor
Platform, Middleware SW Name, VersionWeb server, database server, queue, etc. SW for vulnerability management purposes
User Application CodeAll user-specified application codes operated by the organization
IP Address, Subnet, etc. Network InformationServer IP address, VPC, subnet, etc. network asset information
User, Authentication Key PairUsers allowed to access the operating system, key pairs, and users allowed to access platforms/middleware/applications
Table. Server security management items

In a container environment, the container registry provides a tool that can inspect vulnerabilities in stored container images.

The container registry provides a tool that can inspect vulnerabilities in stored container images.

Provisioning Management

When provisioning a virtual server or container, a secure image with improved security vulnerabilities should be used for deployment.

Virtual servers can be redeployed through images, so a separate management of server images with the latest updates is necessary.

Additionally, when using an image to operate a server, it should be automated to apply the latest patches.

Best Practices
Provision a reinforced server/container image with the latest security updates.

Using a reinforced standard image in a computing environment can provide a safer basic environment.

This allows operating resources without unnecessary software packages or potential vulnerabilities, minimizing the risk of unintended invasion from outside.

In particular, searching and verifying signatures for external dependencies such as container images and application libraries from trusted registries is crucial.

This signature verification process is an effective way to check if the software acquired from outside has been tampered with or contains malicious code.

Building and storing trusted images and libraries in a private registry is also an important security procedure.

The private registry provides an environment where safe images can be referenced in the build and deployment process, acting as a defense against unintended access from outside.

In the private registry, regular scanning and updates can respond to new vulnerabilities, maintaining a safe environment continuously.

Design Principles
  1. Manage the latest operating system images with security updates and automate the latest updates when provisioning and starting servers.
  2. Automate vulnerability inspection in the CI/CD pipeline when deploying containers.

However, even if you retrieve an image from a trusted registry, security risks still exist if you don’t verify the signature or perform a vulnerability scan before using it.

Additionally, even if you’ve hardened an image, its security can gradually weaken if you don’t regularly test for new vulnerabilities or update to the latest version.

Relying solely on patches to keep computing resources up-to-date can also be problematic.

Over time, relying only on patches can lead to a situation where the enhanced baseline is compromised, or malware installed by a threat actor during a security event is not removed.

Therefore, regular image hardening, signature validation, vulnerability scanning, and updates are essential.

Access Control

Best Practices
Manage direct access to servers through Key Pairs, minimizing administrators.

Samsung Cloud Platform’s Virtual Server accesses through Key Pairs.

Key Pairs can only be downloaded once at creation.