Hacker News new | past | comments | ask | show | jobs | submit login

> "If you simply firewall the metadata end point (or other microservice your app needs) then none of your app code that needs it will work either."

Just use a local on-box proxy with a firewall (or a dedicated virtual NIC with a firewall, doesn't matter, it's practically the same thing). Have your specific part of the code issue calls that pass through that specific proxy (or the virtual NIC). Apply whatever firewall rules you need.

This solution involves literally zero lines of in-house code to keep and maintain. It builds on the same industry-standard tools we've developed for the last 40 years. Provides all the flexibility and visibility you'll ever need. It's modular, and can extend to accommodate new requirements as they come.

But I guess it just doesn't look as fancy on your CV though.




Network firewalls don't usually work well as a strong control in this scenario, because if the application is hosted in AWS (or GCP, Azure, etc.) then IP addresses of the systems the app is connecting to are constantly changing, can number in the hundreds or thousands, and can often be anywhere in the address space (whether that's private or the public blocks allocated to the provider), so you pretty much need an allow-all rule to all of the subnets that an attacker would care about anyway, because trying to maintain a list of specific IPs is impractical.

There are use cases for network firewalls in cloud environments,but this isn't one of them.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: