• Graphical visualization of the security posture using the traffic flow information from the workloads.
  • Generate recommendations for DFW rules, services and security groups to assist with microsegmentation planning for applications.
  • Suspicious traffic detection to / from the workloads.
  • The application to protect is the e-commerce website that is hosted on the prod environment. This e-commerce website is a platform for VxCorp’s customers to buy or sell goods online.
  • The e-commerce website has six application tiers, they are:
    • web-tier – front facing web component
    • db-tier – database component
    • search-tier – offers search functionality for the website
    • news-tier – displays current offers and promotions
    • idp-tier – allows two-factor authentication for customers
    • log-tier – allows logging of customer activities
  • Each application tier is composed of two virtual machines
  • All application tier VMs are currently hosted on a single network (same distributed port group in vCenter) and don’t have any traffic filtering enabled.
  • Customer doesn’t have information about the internal ports / services accessed between the application tiers.
  • The e-commerce website is accessible only over HTTPS
  • The application tier VMs are managed via HTTPS, SSH and RDP.
  • All the application tier VMs talk to same infrastructure services
  • Allow client traffic to the application only on port TCP 443.
  • Allow only specific ports / services between the application tiers (inter-tier)
  • Allow only specific ports / services within each application tier (intra-tier)
  • Allow management access to the application tiers from specific admin stations
  • Allow management access to the application tiers only on ports TCP 443, 22 and 3389
  • Allow access to infrastructure services from all application tiers.
  • Configure L4 firewall rules. L7 or context-aware rules will be a future scope.
  • Drop anything to / from the application that isn’t explicitly allowed.
  • Uncategorized Computes : This group has VMs that are not part of any security groups
  • Unknown : This group contains IP addresses that are included in the private IP ranges but a compute object is not found in NSX.
  • External : This group contains IP addresses that are not included in the private IP ranges.

Similar Posts