Upgrade to Pro — share decks privately, control downloads, hide ads and more …

GCPUG.TW 201611 Meetup - Best Practices for DDo...

Simon Su
November 02, 2016

GCPUG.TW 201611 Meetup - Best Practices for DDoS Protection and Migration on GCP

This is speech by Louie CK at MiTAC. To introduce a simple way to block a list of ip address for some security issue.

Simon Su

November 02, 2016
Tweet

More Decks by Simon Su

Other Decks in Technology

Transcript

  1. Louie Chi Kit Best Practices for DDoS Protection and Mitigation

    on Google Cloud Platform How Google Cloud Platform is Different Google Team - we only sell Google Cloud!
  2. 500+ top security experts on staff First to start reward

    program for reporting vulnerabilities Remote locations with restricted access Guards, cameras, analytics to detect intruders “Mission: Impossible” tech: thermal imaging, laser detection, biometric scans Top 5 server manufacturer We build everything: hardware, custom software stack Full-stack ownership greatly reduces attack surface Live Migration keeps you running while we patch People Physical Full Stack Google-Grade Security
  3. Confidential & Proprietary Google Cloud Platform 4 DDoS Protection by

    enabling Proxy-based Load Balancing • When you enable HTTP(S) Load Balancing or SSL proxy Load Balancing, Google infrastructure mitigates and absorbs many Layer 4 and below attacks, such as SYN floods, IP fragment floods, port exhaustion, etc. • If you have HTTP(S) Load Balancing with instances in multiple regions, you are able to disperse your attack across instances around the globe.
  4. Confidential & Proprietary Google Cloud Platform 16 GCE安全性-防止駭客入侵 To secure

    your instances on Google Cloud Platform, follow these best practices: - Connect securely to your instance. - Ensure the project firewall is not open to everyone on the internet. Leaving all firewall rules open to 0.0.0/0 - Use a strong password. - Ensure that all software is up to date. Make sure that the software you have installed is up to date and that there are no known vulnerabilities that could compromise your instance. - Monitor project usage closely via the monitoring API to identify abnormal project usage. Investigate any suspicious usage to ensure that your instance is not being hijacked by malicious software.