modernisation-platform
modernisation-platform copied to clipboard
Implement AWS Managed Rulesets for Network Firewall
User Story
As a Modernisation Platform Engineer I want to integrate AWS Managed Rulesets into our Network Firewall policy So that we can provide rich protection for our customers against things like botnets and malware domains
User Type(s)
Modernisation Platform Customer Modernisation Platform Engineer
Value
This story will cover the adjustment of our firewall-policy
module to allow us to use multiple stateful_rule_group_reference
blocks, and suppling our firewall-policy module with multiple AWS Network Firewall managed rule groups.
Questions / Assumptions / Hypothesis
- We will want to include at least the following managed rule groups to begin with:
ThreatSignaturesExploits
ThreatSignaturesMalware
ThreatSignaturesMalwareWeb
- We may want to supply further rule groups in future, so should consider this in our implementation
- We will need to reorder the priority of our rule groups, moving our self-managed rules below the managed groups. This will ensure that traffic is properly passed through the rules before being matched, otherwise we could find our own rules being matched, and traffic being passed before being evaluated by a managed rule.
- Alternatively we could consider the implications of moving away from a
STRICT
implementation of firewall rules.
Definition of done
- [ ] AWS Managed Rules in place
Reference
How to write good user stories Spike: Investigate use of AWS Managed Rulesets for Network Firewall
This issue is stale because it has been open 90 days with no activity.
We can now supply managed rulesets to our firewall policies. I think we still need to consider how traffic is matched against the rulesets in our policies, as since this was originally raised we've switched to using the default matching method rather than the strict method that was previously in use. If we choose to make use of managed rule sets, then we'll need to revisit how we match traffic in our policies.
https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html