Network protection - Ransomware Risk Management on AWS Using the NIST Cyber Security Framework (CSF)

This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.

Network protection

The Network Protection component provides capability to defend the network against threats that require network movement.

Table 11 — Network protection capability and the associated AWS services

Capability and CSF mapping AWS service AWS service description Function AWS GovCloud (US) available?

Network Protection

ID.AM-1, PR.AC-1, PR.AC-3, PR.AC-5, PR.DS-2, PR.PT-4

Amazon CloudFront

Amazon CloudFront is a highly secure CDN that provides both network and application-level protection.

All your CloudFront distributions are defended by default against the most frequently occurring network and transport layer DDoS attacks that target your websites or applications with AWS Shield Standard.

To defend against more complex attacks, you can add a flexible, layered security perimeter by integrating CloudFront with AWS Shield Advanced and AWS WAF.

  N/A
Amazon EC2 Security Groups A security group is a virtual firewall that controls inbound and outbound traffic to your network resources and Amazon EC2 instance. Provides capability to limit communication to allowed IP addresses. Yes
Amazon GuardDuty Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in S3. This control detects reconnaissance activity, such as unusual API activity, intra-VPC port scanning, unusual patterns of failed login requests, or unblocked port probing from a known, bad IP address. Yes
Amazon Route 53 Resolver DNS Firewall Protect your recursive DNS queries within the Route 53 Resolver. Create domain lists and build firewall rules that filter outbound DNS traffic against these rules. Yes
AWS ALB Application Load Balancer operates at the request level (layer 7), routing traffic to targets (EC2 instances, containers, IP addresses, and Lambda functions) based on the content of the request.   Yes
AWS Firewall Manager

AWS Firewall Manager is a security management service which allows you to centrally configure and manage firewall rules across your accounts and applications in AWS Organizations.

As new applications are created, Firewall Manager makes it easy to bring new applications and resources into compliance by enforcing a common set of security rules.

Now you have a single service to build firewall rules, create security policies, and enforce them in a consistent, hierarchical manner across your entire infrastructure, from a central administrator account.

This control enables you to centrally configure and manage firewall rules across accounts and applications Yes
AWS Network Firewall

AWS Network Firewall is a high availability, managed network firewall service for your VPC. It enables you to easily deploy and manage stateful inspection, intrusion prevention and detection, and web filtering to help protect your virtual networks on AWS.

Network Firewall automatically scales with your traffic, ensuring high availability with no additional customer investment in security infrastructure.

This control detects reconnaissance activity using signature-based detection. Yes
AWS Shield AWS Shield is a managed DDoS protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic, inline mitigations that minimize application downtime and latency, so you don’t have to engage AWS Support to benefit from DDoS protection. Defends against most common, frequently occurring network and transport layer DDoS attacks that target your website or applications. No
AWS WAF

AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.

AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules.

You can use AWS WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application.

For more information, see AWS WAF Security Automations.

Malicious sources scan and probe internet-facing web applications for vulnerabilities.

They send a series of requests that generate HTTP 4xx error codes.

You can use this history to help identify and block malicious source IP addresses.

Yes
AWS WAF Automation

Configuring WAF rules can be challenging, especially for organizations that do not have dedicated security teams.

To simplify this process, AWS offers the AWS WAF Security Automations solution, which automatically deploys a single web access control list (web ACL) with a set of AWS WAF rules that filters web-based attacks.

During initial configuration of the AWS CloudFormation template, you can specify which protective features to include.

Once deployed, AWS WAF begins inspecting web requests to CloudFront distributions or Application Load Balancer, and blocks them if applicable.

This control is a solution that leverages automation to quickly and easily configure AWS WAF rules that help block scanners and probes, known attacker origins, and bots and scrapers solutions. Yes
AWS WAF-Managed Rules Managed rules for AWS WAF are a set of rules written, curated and managed by AWS Marketplace Sellers that can be easily deployed in front of your web applications running on Amazon CloudFront, AWS Application Load Balancers, or Amazon API Gateway. A managed service that provides protection against common application vulnerabilities or other unwanted traffic, without having to write your own rules. No
Network Access Control Lists Similar to a firewall, Network Access Control Lists (NACLs) control traffic in and out of one or more subnets. To add an additional layer of security to your Amazon VPC, you can set up NACLs with rules similar to your security groups. This control helps prevent attackers from scanning network resources during reconnaissance. Yes