It all started with this alert: “You have AWS EC2 instances with a public IP address that are behind a load balancer.”
Strange. You’d expect traffic to pass through the load balancer and for the load balancer to determine which EC2 instance to send it to. With a public IP, you can bypass the load balancer entirely.
From a security standpoint, this wasn’t good.
Threat actors can hit the EC2 instance directly, attacking every exposure on the server. However, with a load balancer, they can only attack the application, narrowing the surface quite a bit.
At Tamnoon, we have playbooks for our customers for this exact scenario: examining VPC Flow Logs to verify that removing the public IPs wouldn’t impact production.
The logs revealed something very weird: hundreds of IP addresses likely originating from a botnet barbarian battering at the digital doors of democracy. You catch my drift (and literary skills).
This discovery warranted an immediate change in priority.
1. We removed the public IPs so traffic could go through the load balancer.
2. We implemented a web application firewall in front of the customer’s firewall.
3. We configured WAF to block the malicious traffic.
Problem solved.
What can we learn from this?
-> Not everyone knows how to do this, but we do, and we’re here to help our customers with challenges like these.
-> Having detailed playbooks ready to go enables operational excellence for your remediation program.
-> Cloud security is hard — you want proven experts by your side to help you make sense of everything. That’s where Tamnoon comes in.
Trust the CloudPros to do it right.