Introduction

This document describes the steps needed to deploy Traffic Mirroring solution with Blue Hexagon (BH) Amazon Machine Image (AMI) and to set up integrations with AWS Security Hub and AWS Lambda. The solution described in this document utilizes many in-built features of AWS to make the deployment easier for AWS customers. For example, in this solution AWS services such as Network Load Balancer( NLB), Auto-Scaling Group (ASG) and AWS Console are used. AWS Console, for instance, is used for setting up Traffic Mirror targets and for setting up Traffic Mirror Sessions in a given AWS account.

Customers can however chose to use other solutions available from various 3rd party providers. Please note: a Blue Hexagon representative can assist you to deploy the solution. 

Deployment Procedure

Here are the steps to deploy the Blue Hexagon with Amazon Traffic Mirroring. 

Step-1 Information Gathering

Provide the following information to your Blue Hexagon representative:

Step-2 Provisioning of Stack

A Blue Hexagon representative can assist you with the following steps.

  1. Blue Hexagon representative will provide the CloudFormation Template(CFT) (or an S3 link to the CFT) to deploy the BH Appliance Stack in the customer's account
  2. Before you proceed with deployment, you have to decide whether you want to provision an "SNS Topic" to be used by Blue Hexagon ASG, or the CFT will create one for you. It is preferred to create a new SNS Topic. 
  3. Log in to your AWS Console, and switch to the region where you want to deploy the stack. 
  4. In the AWS console, navigate to the CloudFormation page. You can search for services in the main page of the console, and click on it.
  5. In the CloudFormation page, click on "Create stack", and stack creation wizard enter the S3 URL you obtained in (1).



  6. In the Next page, a Form appears where we need to fill in the appropriate information, this includes:
    1. Stack Name: A valid name is required. It can include letters (A-Z and a-z), numbers (0-9), and dashes (-).
    2. VPC ID: Pick the appropriate VPC from the drop-down list. The Subnets chosen above, need to belong to this VPC.
    3. Subnet A: This is a drop-down list of subnets in their account. Choose one that belongs to the VPC
    4. Subnet B: This is a drop-down list of subnets in their account. Choose one that belongs to the VPC. Note that it needs to be in an AZ different from SubnetA
    5. Allow Network CIDR: Default is set to 0.0.0.0/0. Should be changed to VPC CIDR.
    6. BH Instance Type: Default is set to m5a.2xlarge. The other available option is m5.2xlarge.
    7. Min Auto Scale Count: Default is set to 1. Can be increased to 2.
    8. Max Auto Scale Count: Default is set to 6. This can be changed, and they should not go below 2.
    9. SNS Topic ARN: Default is actually some junk ARN. Input the ARN of the SNS Topic provisioned in (2)
    10. VXLAN Port: Leave the default, which is 4789



  7. You can skip the Next screen, unless you want to add additional Tags or make other adjustments.
  8. In the final screen, accept the acknowledgement box, and click on "Create Stack"


The deployment should be done in 15 minutes.

Step-3 Setting up Traffic Mirror Target


          Creating traffic mirror target


          

Reference Architecture

Traffic Mirroring in AWS is a virtual TAP that provides direct access to all the raw packets flowing in a VPC. This traffic will be forwarded to Blue Hexagon Virtual Appliance deployed in the customer VPC, to perform traffic analysis.  

This deployment architecture involves usage of AWS Native solutions:

A logical diagram of all the components involved in the architecture is presented blow


Here are the components of the architecture presented above:


Integrations (SecurityHub and Lambda)

Blue Hexagon can be configured to publish its findings to an AWS SNS topic in your account. A finding received on the topic triggers an AWS Lambda to either:

Your Blue Hexagon representative will provide the CloudFormation Template (CFT) to deploy the integrations. When deployed, the CFT creates the following resources:

To receive findings in Security Hub from Blue Hexagon, go to the Integrations page in Security Hub and click Accept Findings.

Once the integration is set up, Blue Hexagon will send findings such as the one below to Security Hub: