Architecting On AWS 5 - Lab
Architecting On AWS 5 - Lab
Strategies
Chris Johnson, Solutions Architect
October 31, 2016
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Session Overview
Separation
between
development, test
and production for
security,
governance or
regulatory reason,
e.g. PCI Workload
Segmentation Reasons
There are multiple reasons for segmenting by accounts or VPCs, these generally
include:
Environmental Financial
172.31.0.0/16
Recommended:
Recommended:
/16
RFC1918 range
(64K addresses)
Set up subnets
Choosing IP address ranges for your subnets
172.31.0.0/16
isolate concerns
route restrictively
Flows
Security groups in VPCs: Additional notes
Supportability • VPC specific configurations, rather than multiple configurations within a single VPC
• De-risk changes by minimizing the “blast-radius”, accelerate deployment of changes
Network • Provides granular network control and integration, only connect to relevant networks
• Leverage multiple VPC constructs effectively, route tables, subnets, NACLs, Peering,
DNS
When to adopt a multi-VPC strategy
When first deploying VPC it seems analogous to a traditional data center, however
there are good reasons to consider a multi-VPC strategy, for example
Supportability • VPC specific configurations, rather than multiple configurations within a single VPC
• De-risk changes by minimizing the “blast-radius”, accelerate deployment of changes
Network • Provides granular network control and integration, only connect to relevant networks
• Leverage multiple VPC constructs effectively, route tables, subnets, NACLs, Peering,
DNS
Automation • Supports automated deployment of resources into segregated VPCs
• VPC can become part of the automation fabric, removing data center mindset
When to adopt a multi-VPC strategy
When first deploying VPC it seems analogous to a traditional data center, however
there are good reasons to consider a multi-VPC strategy, for example
Supportability • VPC specific configurations, rather than multiple configurations within a single VPC
• De-risk changes by minimizing the “blast-radius”, accelerate deployment of changes
Network • Provides granular network control and integration, only connect to relevant networks
• Leverage multiple VPC constructs effectively, route tables, subnets, NACLs, Peering,
DNS
Automation • Supports automated deployment of resources into segregated VPCs
• VPC can become part of the automation fabric, removing data center mindset
Limits • Mitigates limits for very large VPCs, e.g. maximum practical security group and rule
limits
• Reduce risk of VPCs constraints, e.g. network, subnet size is fixed at creation time
So, what’s the right
strategy?
Sorry, there’s no one right answer
Sorry, there’s no one right answer
Non-Production
Account
AWS Account patterns
Account segmentation patterns
• Consolidated across the Enterprise
enterprise for billing purposes Account Master
security needs
AWS Account patterns
Account segmentation patterns
• Consolidated across the Enterprise
Security and Audit
enterprise for billing purposes Account Master
security needs
VPC Patterns
VPC Patterns - Single Large VPC
Analogous to a traditional data center
Pros
Aligned with existing data center concept, allows
Enterprises to easily accept virtual DC concept
Allows for Rapid Deployment requiring minimal
incremental Involvement from Network group
WEB UAT
Single Direct Connect integration point
Pros
Clear boundaries of security control are established based
on data classification
Security assessment policies can be adapted based on
classification
CONFIDENTIAL
Direct
Connect
Locations Cons
UNRESTRICTED
• Complex operational management where multiple
teams are delegated access to VPC
• Complex security management, IAM Policies are
common
• Large blast-radius for incremental changes
• No segregation between environments, development
INTERNAL
and production co-exist
VPC Patterns - Multiple VPCs by Workload
Segregated based on application or workload
Pros
Able to scale by adding VPCs for new workloads
Delegate VPC configuration to different LOB
Security policies can be adapted based on application
Easier separation of applications, thus highly limiting the
ECOMMERCE PAYMENT GW
blast radius of changes
Support for common core services across applications
Supports highly automated and streamlined process within
each LOB
Direct
Connect
Locations Cons
INTRANET
• Accountability and responsibility needs to be enforced
when setting up inter-VPC peering
• Increased network routing complexity across peered
VPCs
• Multiple Direct Connect virtual interfaces required to
corporate data centers
COMMON SERVICES
VPC Patterns - Multiple VPCs by Environment
Segregated based on environment type
Pros
Delegate access control and VPC configuration to different
teams based on environment
Easier separation of environments, thus limiting the blast
radius of changes
PRODUCTION
Separation of security controls across environments
Security assessment policies can be based on
environment
Supports strong segregation of duties by environment
Direct
Connect
Locations Cons
SIT UAT
• Complex operational management where multiple
teams are delegated access to VPC
• Complex security management, IAM policies are
common
• Complex tagging processes required for billing
• Limited expansion space, “get it right first time” or add
DEVELOPMENT
multiple environment VPCs
VPC Patterns - Multiple VPCs and Accounts
Segregated based on environment type, across multiple AWS accounts
Pros
Delegate access control and VPC configuration to different
teams based on environment
Easier separation of environments, thus limiting the blast
radius of changes
PRODUCTION
Separation of security controls across accounts and
environments
Security assessment policies can be based on
environment
Direct
Connect
Supports strong segregation of duties by environment
Locations
Cons
SIT UAT • Limited expansion space, “get it right first time” or add
multiple environment VPCs
DEVELOPMENT
Advanced Enterprise Pattern
Direct
Connect
Locations
encryption keys
4. Define sub account creation policy based on actual needs for
isolation or delegation as per governance and security Production