Skip to content

Instantly share code, notes, and snippets.

@okram999
Created November 6, 2018 21:32
Show Gist options
  • Save okram999/7f93d8a8c269fe8cf59f4c0b189e6e55 to your computer and use it in GitHub Desktop.
Save okram999/7f93d8a8c269fe8cf59f4c0b189e6e55 to your computer and use it in GitHub Desktop.
Security
1. Disable 80 listener on ALB Web Listeners (FE UI, BE API, Micro) or confirm they result in 443 redirections
> Done
2. Confirm Port 8080 on the ALB target groups are configured for SSL only
> Primitive approach. Refer this: https://aws.amazon.com/blogs/aws/elastic-load-balancer-support-for-ssl-termination/
3. Confirm that SSL is enabled for the PGSQL listeners on TCP 5432 for AVA Backend and AVA Central Station db’s
> Require changes in the app as well. https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_PostgreSQL.html#PostgreSQL.Concepts.General.SSL
4. Limit BackEnd service access to FrontEndWeb UI servers
5. Limit Microservices service access to BackEnd API servers
> The above 2 needs for vetting from the application, to confirm the right architecture
6. Disable Kafka TCP 9092 and enable SSL on Kafka TCP port 9093
7. Disable Zookeeper clientPort and enable Zookeeper secureClientPort
a. If Zookeeper listeners only respond to localhost calls, then you could alternatively configure drops for other sources
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment