当前位置:网站首页>Evolution of cloud firewall products
Evolution of cloud firewall products
2022-06-23 03:06:00 【Tec cloud firewall】
Cloud firewall products have evolved for more than two years , Our products have gradually formed a set of product evolution ideas from the beginning of crossing the river by feeling the stones . This article will help users build a firewall “ The walls ” Defense system to expand the evolution direction of our products .
One 、 If you imagine the user's business as a city
If we are carrying out a task of protecting the city , In order to prevent foreign invasion, how should we build a solid defense system ? We can list the following points :
1、 First of all, we must build a city wall ;
2、 How many gates have been opened on the wall ? What is the purpose of each gate ? Whether the city gate is damaged ?
3、 Some gates are aimed at passers-by , For passers-by entering the city, it is necessary to check whether they are carrying prohibited items ( The knife 、 gun 、 Flammable and explosive, etc );
4、 Some gates are aimed at staff , For staff entering the city , Its identity token needs to be checked , Only qualified identity tokens can be admitted ;
5、 The range of activities of passers-by needs to be limited , No access to staff 、 Military and other important places ;
6、 Set traps in various areas , When a malicious element carries out a spot reconnaissance, it will trigger a trap and cause an alarm ;
7、 Check the destination and carry on of personnel leaving the city , Prevent collusion with the enemy and disclosure of private information ;
8、 Everyone's entry and exit will be recorded .
Two 、 Carry out product evolution for the above urban defense system
In fact, the idea of firewall products is also an evolution of the above-mentioned way of building urban defense system :
1、 First of all, there must be a firewall ;
2、 The cloud firewall's missing scanning ability and traffic analysis ability help users sort out what assets are in the cloud , Which assets are exposed to the public network , What components are used , Is there a loophole ;
3、 For those applications that need to be exposed on the public network to provide services to end users , The function of firewall is to detect whether the incoming traffic has some characteristics of malicious behavior , And intercept it , That is to say IPS function ;
4、 For O & M or internal website , The firewall provides a scheme to check their identity information ( For example, wechat 、 Enterprise WeChat ), You can only access after you pass the identity authentication ;
5、 Cloud firewall VPC The firewall between is DMZ The corresponding passing area and DB Provide isolation mechanism between regions where key servers are located ;
6、 The network honeypot of cloud firewall can set traps in various networks of users , When a potential attacker detects in the network, he may step on the trap by mistake and be found ;
7、 Cloud firewall NAT The boundary firewall checks the access purpose and content of outgoing traffic initiated in the user network , And use this to determine whether there is a host failure ;
8、 All access logs will be recorded , So as to trace the source and obtain evidence later .
3、 ... and 、“ Jugate ”&“ Know 1 pet. ”
The above is the evolution of firewall products , For firewalls, security capability is undoubtedly the most important point , On security capacity building , We Ability is divided into self-knowledge and self-knowledge The two parts evolve separately :
Jugate :
- Help users sort out business assets and collect information , Which assets are exposed to the public network , Whether there are loopholes in the assets ;
- Flow visualization of assets , An alarm will be generated for abnormal traffic ;
- Identify which services are provided to the public , What services are provided to internal personnel ;
- Active defense : Introduce deception techniques , Users can choose to place traps in their own network areas , Even if a malicious attacker bypasses numerous detection mechanisms and enters the intranet , You will also be found by stepping on the trap by mistake .
Know 1 pet. :
“ Know 1 pet. ” The simple understanding is that the firewall needs to know the attackers and their attack methods and intercept them . The core here is access control , There are generally two ways of access control , The default release blacklist mechanism , The default blocking whitelist mechanism .
If you press both detection and attack known and unknow Two dimensions , It can be divided into four categories :
- known known: I can detect known attacks , Provide detection rules for known attacks ;
- unknown known: I can't detect known attacks , Insufficient rule ability ;
- unknown unknown: I can't detect unknown attacks , Beyond cognition ;
- known unknown: Although I don't know the specific attack behavior , But I can detect and protect .
The first two categories ( Detected as known) yes Rule based detection , In fact, it can also be considered as a blacklist mechanism , Most security products will focus on this , Find the attack and block it .
Detection of unknown attacks ( namely unknown), At present, there are many schemes on the market , Include UEBA、 Zero trust and so on , These schemes are essentially white list mechanisms , Turn from how to find abnormal access to how to define normal access . The detection set of blacklist mechanism is infinite , The detection set of white list mechanism is limited , The advantages here are self-evident .
Through the above four scenarios, we have also made it clear that The direction of the product :
- in the light of known known This kind of : It can automatically identify and intercept Internet attacks and exploits , Such as intrusion prevention ;
- in the light of unknown known This kind of : Support adding Internet boundary rules manually 、NAT Boundary rules 、 White list rules 、VPC Inter rule, etc , Realize functions such as flow visualization ;
- in the light of unknown unknown This kind of : By exposing the probe to the user's network , To record 、 Trace attacker information and attack tactics , Such as network honeypot ;
- in the light of known unknown This kind of : To malicious sources IP、 Accurately identify the access traffic of dangerous domain names 、 Second level automatic update , Such as threat intelligence .
边栏推荐
- A bit about the state machine (FSM SMR DFSM)
- Extract NTDs with volume shadow copy service dit
- Some people are crazy, others are running away, and open source software is both hot and cold
- The priority supplier field in the purchase information record of SAP mm primary level
- 5 trends brought to us by customers
- Troubleshooting and solution of error 400 in easygbs video platform
- Storage resources revitalize the system and redefine "hyper fusion"
- January 31, 2022: Maze III. There is a ball in the maze of open spaces and walls. ball
- RI Geng series: potential memory leak caused by abuse of mutable in Google Pb structure
- Goframe framework (RK boot): fast implementation of server-side JWT verification
猜你喜欢

Soft exam information system project manager_ Information system comprehensive testing and management - Senior Information System Project Manager of soft test 027

Soft exam information system project manager_ Contract Law_ Copyright_ Implementation Regulations - Senior Information System Project Manager of soft exam 030

8. greed

C language series - Section 4 - arrays

6. template for integer and real number dichotomy

Vulnhub DC-5

How to store, manage and view family photos in an orderly manner?

5. concept of ruler method
随机推荐
January 29, 2022: connectives. Give you an array of strings without repeated words
Network security memorabilia - Summary of vulnerability exploitation events in 2021
2022-01-27: heater. Winter has come. Your task is to design a
Learning records - things inherited by subclass parent of C #
Line to line interviewer | one side of ByteDance
How to set jewelry label paper
How to make special labels for books
Wwdc21 - App store server API practice summary
How does native JS get the child elements of the parent element that the current element belongs to
Account MFA usage scheme
SQLSERVER database restore stored procedure script
How to generate DataMatrix code in batch through TXT file
Learning record -- memo on constructors and attributes in C
JS event bubble and event capture
Micro build low code to realize user login and registration
2022 opening H5 mobile page special effects
Ping your domain name to 127.0.0.1. The solution to DNS hijacking
QUIC or TCP
[SaaS examination certification] apaas_ Tencent Qianfan magic pen
Supervisor multi process management exception automatic restart visual management