Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Blue Hexagon representative will provide a S3 URL for the CloudFormation Template(CFT) (or an S3 link to the CFT) to deploy the BH Appliance Stack in the customer's account
  2. Before you proceed with deployment, you have to decide whether you want to provision an "SNS Topic" to be used by Blue Hexagon ASG, or the CFT will create one for you. It is preferred to create a new SNS Topic. 
  3. Log in to your AWS Console, and switch to the region where you want to deploy the stack. 
  4. In the AWS console, navigate to the CloudFormation page. You can search for services in the main page of the console, and click on it.
  5. In the CloudFormation page, click on "Create stack", and stack creation wizard enter the S3 URL you obtained in (1).



  6. In the Next page, a Form appears where we need to fill in the appropriate information, this includes:
    1. Stack Name: A valid name is required. It can include letters (A-Z and a-z), numbers (0-9), and dashes (-).
    2. VPC ID: Pick the appropriate VPC from the drop-down list. The Subnets chosen above, need to belong to this VPC.
    3. Subnet A: This is a drop-down list of subnets in their account. Choose one that belongs to the VPC
    4. Subnet B: This is a drop-down list of subnets in their account. Choose one that belongs to the VPC. Note that it needs to be in an AZ different from SubnetA
    5. Allow Network CIDR: Default is set to 0.0.0.0/0. Should be changed to VPC CIDR.
    6. BH Instance Type: Default is set to m5a.2xlarge. The other available option is m5.2xlarge.
    7. Min Auto Scale Count: Default is set to 1. Can be increased to 2.
    8. Max Auto Scale Count: Default is set to 6. This can be changed, and they should not go below 2.
    9. SNS Topic ARN: Default is actually some junk ARN. Input the ARN of the SNS Topic provisioned in (2)
    10. VXLAN Port: Leave the default, which is 4789



  7. You can skip the Next screen, unless you want to add additional Tags or make other adjustments.
  8. In the final screen, accept the acknowledgement box, and click on "Create Stack"

...

  •  A Network Load Balancer (NLB) is deployed in a private subnet of a VPC. The NLB will not be internet-facing.
  • An Auto Scaling Group (ASG) is deployed, which is responsible for auto deployment, and scaling of the BH virtual appliance (AMI).
    • Minimum of 1 instance is deployed
    • Maximum is set at 6
    • Running Instances are increased by 1, when Average Network Bytes In exceeds 500 MB in a 10 minute window
    • Running Instances are decreased by 1, when Average Network Bytes In stays below 500 MB in a 10 minute window
    • Running Instance count can never be 0
  • Instances are associated with an Instance Profile, which have the following policies attached to them:
    • arn:aws:iam::aws:policy/SecurityAudit
    • arn:aws:iam::aws:policy/ViewOnlyAccess
  • The NLB FQDN will be registered as Traffic Mirror Target.


Integrations

Blue Hexagon can be configured to send its findings to an AWS SNS topic. A finding received on the topic triggers an AWS Lambda to either:

  • forward the finding to AWS Security Hub in the ASFF format and/or
  • remediates the threat by taking actions such as stopping or quarantining the infected EC2 instance.

Your Blue Hexagon representative will provide the CloudFormation Template (CFT) to deploy the integrations. The CFT creates the following resources:

  • AWS SNS notification topic: All Blue Hexagon findings are published to this topic
  • AWS Lambda: Adds additional context and metadata to the finding and publishes to Security Hub and/or remediates the threat

Image Added

To receive findings in Security Hub from Blue Hexagon, go to the Integrations page in Security Hub and click Accept Findings.

Image Added

Once the integration is set up, Blue Hexagon will send findings such as the one below to Security Hub:

Image Added