- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Cloud Network Security
- :
- Discussion
- :
- CloudGuard Controller - Support New Object Types
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
CloudGuard Controller - Support New Object Types
In Amazon Web Services (AWS):
- Added Load Balancers tags. The tags can now be viewed in SmartConsole and used in the Security policy.
In Azure:
- Added Application Security Groups
- Added Private Endpoints
The above objects can now be viewed in SmartConsole and used in the Security policy.
The new objects would be supported starting from R80.40 and above on the next jumbo release.
For R80.40 - Above Jumbo HF Take_126 (The new objects are not included in Take_126 )
For R81 - Above Jumbo HF Take_44 (The new objects are not included in Take_44)
For R81.10 - Above Jumbo HF Take_9 (The new objects are not included in Take_9)
The new object would be supported on the upcoming GA release - R81.20.
In order to prevent misconfiguration (For example: preventing enforcement in the case of tags that have been already attached to the load balancer and already used in the security policy)
For R80.40/R80/R81.10 you will need to enable the support of the new objects as explained bellow:
For the upcoming release of R81.20, no additional configuration would be required.
For AWS:
To enable this feature:
- Edit $MDSDIR/conf/vsec.conf on the Management Server and add this line: aws.enableLoadBalancersTags=true
- From SSH run: vsec stop ; vsec start
- Note: This feature requires adding elasticloadbalancing:DescribeTags and elasticloadbalancing:DescribeLoadBalancers permissions to the AWS Data Centers accounts.
- The complete minimal required policy is
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"ec2:DescribeInstances",
"ec2:DescribeNetworkInterfaces",
"elasticloadbalancing:DescribeTags",
"ec2:DescribeVpcs",
"ec2:DescribeSubnets",
"elasticloadbalancing:DescribeLoadBalancers",
"ec2:DescribeSecurityGroups"
],
"Resource": "*"
}
]
}
For Azure:
To enable this feature:
- Edit $MDSDIR/conf/vsec.conf on the Management Server and add this line: azure.enableAsgAndPep=true
- From SSH run: vsec stop ; vsec start
- Note: This feature might require added permissions to list Application Security Groups and Private Endpoints