Private Link Security

0

I'm in the process of enabling third-party access to certain services through PrivateLink. Regarding security considerations:

  1. What measures can I implement to safeguard my EC2 instances against incoming traffic from third parties?
  2. Is there a way to enforce an Endpoint Policy on the third-party accounts to restrict the traffic to specific source addresses, for instance, to impose limitations based on the source address of incoming requests?“
Sandeep
已提问 4 个月前248 查看次数
2 回答
1
已接受的回答

Hello,

your question is not clear related by the Type of Service, if this endpoint will be publishing AWS Services or for your Own Service.

In general, Since you will allow the third parties to create an Interface Endpoint in their account for your services, it will not be applicable to force them with a Security group on the Implemented interface in their accounts. Although you can still Enforce inbound rules for PrivateLink traffic in NLB settings but consider that there can be CIDR overlap which can make security groups more complex in operation,

Also you can check the below options also available for the provider.

1- You can control who can request your Endpoint Service, So you have to give them approval before they can start. https://docs.aws.amazon.com/vpc/latest/privatelink/configure-endpoint-service.html#accept-reject-connection-requests

2- if This Service is using AWS Services, so you can use Service Policy.

3- You can also enable proxy protocol on the load balancer, you can obtain the addresses of the service consumers and the IDs of the interface endpoints from the proxy protocol header, that will gives your application more visibility. your applications here need to have extra configurations to process the data provided by the proxy header to allow or deny the respond.

https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-target-groups.html#proxy-protocol

3- you can Still inspect the Traffic by Intra-VPC Inspection with AWS Network Firewall, that can provide you inspection layer between the NLB and EC2 Instances. (Source IP will always be the Internal IP of the NLB but you can still inspect the Packet Content.) https://d1.awsstatic.com/architecture-diagrams/ArchitectureDiagrams/inspection-deployment-models-with-AWS-network-firewall-ra.pdf

AWS
Shmosa
已回答 4 个月前
profile picture
专家
已审核 4 个月前
1

Hello.

I'm in the process of enabling third-party access to certain services through PrivateLink. Regarding security considerations:

When you say a specific service, do you mean an AWS service (such as S3)?
Or do you mean an application you created hosted on AWS?

What measures can I implement to safeguard my EC2 instances against incoming traffic from third parties?

I think it can basically be controlled with security groups.

If you publish a custom application with PrivateLink, you can enable Enforce inbound rules for PrivateLink traffic in NLB settings to control IP addresses in third-party VPCs using NLB security group inbound rules.
https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-security-groups.html#update-security-settings

Is there a way to enforce an Endpoint Policy on the third-party accounts to restrict the traffic to specific source addresses, for instance, to impose limitations based on the source address of incoming requests?“

You cannot set VPC endpoint policies when using PrivateLink to publish custom applications using NLB.
VPC endpoint policies can only be used when using VPC endpoints to access AWS services such as S3 and Systems Manager.
Therefore, I think it is a good idea to restrict IP addresses using security groups.

profile picture
专家
已回答 4 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则