Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Deep Securityのホットデータを活用する ~AWS WAFの場合~
Search
fnifni
March 17, 2016
Technology
0
910
Deep Securityのホットデータを活用する ~AWS WAFの場合~
Deep Security User Night #2 の登壇資料です。
fnifni
March 17, 2016
Tweet
Share
More Decks by fnifni
See All by fnifni
Azure Sentinel ~ 導入から2ヶ月間の運用の肌感 ~
fnifni21
2
870
踏み台環境におけるAmazon Maice活用の提案 #secjaws #secjaws08
fnifni21
0
2.5k
Deep Securityの運用TIPS
fnifni21
1
550
Other Decks in Technology
See All in Technology
神回のメカニズムと再現方法/Mechanisms and Playbook for Kamikai scrumat2025
moriyuya
4
680
Goに育てられ開発者向けセキュリティ事業を立ち上げた僕が今向き合う、AI × セキュリティの最前線 / Go Conference 2025
flatt_security
0
360
Azure Well-Architected Framework入門
tomokusaba
1
350
PLaMoの事後学習を支える技術 / PFN LLMセミナー
pfn
PRO
9
4k
動画データのポテンシャルを引き出す! Databricks と AI活用への奮闘記(現在進行形)
databricksjapan
0
160
やる気のない自分との向き合い方/How to Deal with Your Unmotivated Self
sanogemaru
0
430
[Keynote] What do you need to know about DevEx in 2025
salaboy
0
110
AI時代だからこそ考える、僕らが本当につくりたいスクラムチーム / A Scrum Team we really want to create in this AI era
takaking22
7
3.9k
【Kaigi on Rails 事後勉強会LT】MeはどうしてGirlsに? 私とRubyを繋いだRail(s)
joyfrommasara
0
170
Exadata Database Service on Dedicated Infrastructure(ExaDB-D) UI スクリーン・キャプチャ集
oracle4engineer
PRO
3
5.5k
AWS 잘하는 개발자 되기 - AWS 시작하기: 클라우드 개념부터 IAM까지
kimjaewook
0
120
Shirankedo NOCで見えてきたeduroam/OpenRoaming運用ノウハウと課題 - BAKUCHIKU BANBAN #2
marokiki
0
170
Featured
See All Featured
Music & Morning Musume
bryan
46
6.8k
Navigating Team Friction
lara
189
15k
Being A Developer After 40
akosma
91
590k
Producing Creativity
orderedlist
PRO
347
40k
Let's Do A Bunch of Simple Stuff to Make Websites Faster
chriscoyier
507
140k
Context Engineering - Making Every Token Count
addyosmani
5
210
How to Think Like a Performance Engineer
csswizardry
27
2k
Side Projects
sachag
455
43k
Save Time (by Creating Custom Rails Generators)
garrettdimon
PRO
32
1.6k
I Don’t Have Time: Getting Over the Fear to Launch Your Podcast
jcasabona
33
2.5k
[Rails World 2023 - Day 1 Closing Keynote] - The Magic of Rails
eileencodes
37
2.6k
YesSQL, Process and Tooling at Scale
rocio
173
14k
Transcript
The Three Points Protect your Web from cyber attack in
Paris of terrorist attacks
Deep Securityͷϗοτσʔλ Λ׆༻͢Δ AWS WAFͷ߹
Who ami I ? • ٢ాͻΖ͔ͣ ( hirokazu yoshida )
Security Engineer at cloudpack http://qiita.com/fnifni
and more ? • ࠷ۙɺ͝ԑ͕͋ͬͯɺ ӡ༻ͰഓͬͨϊϋʢͭΒΈʣΛجʹ ηΩϡϦςΟͷϕʔεϥΠϯ্ͷීٴ׆ಈ R&DΒͬͯ·͢ɻ
and more ? • ͋Μͳ͜ͱ
and more ? • ͦΜͳ͜ͱɻ
Attention ! • ຊ͓͢Δ༰ɺॾൠͷࣄʹΑΓ 2016/3/12(ۚ)·ͰSNSެ։ɺͭͿ͖Λ ͝ԕྀ͍ͩ͘͞ɻ • ຊ͓͢Δ༰PoC (֓೦࣮ূ) ͷ݁ՌΛ
ؚΈ·͢ɻαʔϏεϨϕϧͰ࣮͢Δʹɺ τϨϯυϚΠΫϩ༷ʹΑΔػೳվमΛཁ͠·͢ɻ
Points • Dynamically • Linkage • Operation (Tuning)
Points • Dynamically • Linkage • Operation (Tuning)
2015.11.13
https://ja.wikipedia.org/wiki/%E3%83%91%E3%83%AA%E5%90%8C%E6%99%82%E5%A4%9A %E7%99%BA%E3%83%86%E3%83%AD%E4%BA%8B%E4%BB%B6
ຊͱύϦͷ࣌ࠩ JST -8
CASE #1
2015/11/12 23:26:29(JST)
None
͜ͷ࣌ “ύϦ͔Βͷ߈ܸͳΜͩ” ”͍͠ͳ” ͘Β͍ʹࢥ͍ͬͯ·ͨ͠
55,247
Painful • ະͷ߈ܸͷΛؚΉՄೳੑΛߟྀͯ͠ɺ ਵ࣌NACLʹొʢӡ༻ෛՙߴ͍ʣ • IPίϩίϩସΘͬͯΠλνͬ͜͝ʢ40ۙ͘ʣ • ”195.154.0.0/16”ͱొ͔͕ͨͬͨ͠ɺ ͕ඍົͩͬͨʢ࠷ऴతʹొͨ͠ʣ
reActive͡ΌπϥΠ
Points • Dynamically • Linkage • Operation (Tuning)
CASE #2
ผͷڥʹͯ NACLͰͷःஅޙݕܧଓ
None
None
Painful • લͷૹ৴ݩIPΞυϨε͕CloudFrontͳͷͰɺ x-fowerded-forʹه͞ΕͨIPΛNACLʹొ͠ ͯःஅ͕Ͱ͖ͳ͍ɻ • ࣌AWS WAF͕ग़͔ͨΓͰɺ ςετແ͠Ͱͷຊ൪ೖϋʔυϧ͕ߴ͔ͬͨɻ
IP੍ޚΛ͔ʹ CloudFront·Ͱ͍࣋ͬͯ͘ ඞཁ͕͋ͬͨ
ͦΜͳ͜ͱ͋ͬͨޙͷ 2015.11.27
https://github.com/deep-security/aws-waf
੩తใ (IP List)Λ AWS WAFొ͢Δͷ ͚ͩͲɺ͑ΔΜ͡ΌͶʁ
ΑΖ͍͠ ͳΒ࣮ͩ
PoC (֓೦࣮ূ)
None
How to 1 (SIEM) IUUQpMFTUSFOENJDSPDPNKQVDNPEVMFUNET TQ%FFQ@4FDVSJUZ@@41@"ENJO@(VJEF@+1QEG
How to 2 ( totalization )
How to 3 ( push to DSM )
How to 4 ( DSM to AWS WAF ) http://qiita.com/fnifni/items/8ae2b49d5fe6af3d08fe
DEMO
Future Request • Deep Security • Output XFF in SIEM
(syslog) • ip_list_to_set.py • Comment character (#) ← 3.4 fixed !! • Line of only a line feed code ← 3.10 fixed !!
Points • Dynamically • Linkage • Operation (Tuning)
νϡʔχϯάͷϙΠϯτ • ਪઃఆͷݕࡧ • ରԠࡁΈͷ੬ऑੑͷϧʔϧ֎͢ʢݕϕʔεʣ • ݕΛΔʢͲΜͳ௨৴Λݕ͢Δ͔ʣ • αʔϏεͰ༻͍ͯ͠Δ௨৴͔൱͔ •
URI, POST, XML, SQL, CSS, HTML, SSL…
γεςϜੜ͖ ߈ܸੜ͖ νϡʔχϯάӡ༻ͷҰ෦
ηΩϡϦςΟ ӡ༻໋͕ʂ
Thank you !