TalksAWS re:Invent 2025 - Robust network security with perimeter protection and zero trust (NET326)

AWS re:Invent 2025 - Robust network security with perimeter protection and zero trust (NET326)

Robust Network Security with Perimeter Protection and Zero Trust

Securing Applications on AWS

  • Customers have two types of applications on AWS:
    • Public applications (e.g. retail website, API gateway) that need to be protected from internet threats
    • Private applications (e.g. HR system, financial dashboards) that need to be accessed securely by employees and contractors
  • Applications run on various AWS services like EC2, containers, RDS, etc. and need robust perimeter protection.

Perimeter Protection Needs

  • Protect internet ingress traffic from malicious actors, DDoS, etc.
  • Secure outbound traffic from applications to the internet (e.g. GitHub, code uploads)
  • Inspect east-west traffic between applications to prevent lateral movement
  • Control access for employees and contractors to applications and resources

CloudFront and Edge Security

  • CloudFront is AWS's content delivery network that provides scale and security at the edge.
  • CloudFront can:
    • Absorb and diffuse large-scale DDoS attacks using its global edge network
    • Terminate TLS connections and enforce advanced cipher suites, including post-quantum crypto
    • Implement mutual TLS with client applications for strong authentication
    • Integrate with AWS WAF to provide configurable rules for bot mitigation, DDoS protection, etc.
  • CloudFront offers managed rules for common security threats like OWASP Top 10, bots, DDoS, etc. to simplify configuration.
  • CloudFront can also restrict access to private origin servers in VPCs, removing internet exposure.

Network Firewall for Traffic Inspection

  • Network Firewall is a managed service that provides stateful inspection of network traffic.
  • It can be integrated with AWS gateways (IGW, TGW, VPN, DX) to inspect north-south and east-west traffic.
  • Network Firewall supports Suricata-based rules for deep packet inspection and protocol checking.
  • It provides detailed logging to S3, Kinesis, and CloudWatch for analysis and auditing.
  • Network Firewall also integrates with AWS Firewall Manager for centralized policy management across accounts.
  • Managed rules from AWS's global honeypot network (MADB) provide protection against emerging threats.

Zero Trust Access with AWS Verified Access

  • Employees and contractors need secure remote access to applications, with granular control.
  • AWS Verified Access (AVA) is a reverse proxy that provides zero trust access based on identity and device posture.
  • AVA integrates with identity providers (e.g. IAM Identity Center) and device trust providers for multi-factor authentication.
  • It provides a public internet endpoint for private applications, with WAF protection at the edge.
  • AVA logs detailed trust context information that can be used to fine-tune access policies.
  • The launch policy assistant in AVA allows testing and iterating on access policies before deployment.

Securing the Secure Shop Enterprise

  • Secure Shop deployed the following security measures:
    • CloudFront and AWS WAF for public-facing retail website protection
    • AWS Verified Access with identity and device trust for internal finance application access
    • Network Firewall to inspect north-south and east-west traffic, including managed threat rules
    • Route 53 DNS Firewall for additional egress traffic inspection and control

Key Takeaways

  • AWS provides a comprehensive set of managed security services (CloudFront, Network Firewall, Verified Access) to build robust perimeter protection.
  • These services offer scalability, advanced security features, and simplified management through managed rules and integrations.
  • Combining these services allows enterprises like Secure Shop to secure public-facing applications, internal resources, and employee access in a holistic manner.
  • The use of AI-powered tools like Kiro CLI can further streamline the deployment and configuration of these security measures.

Your Digital Journey deserves a great story.

Build one with us.

Cookies Icon

These cookies are used to collect information about how you interact with this website and allow us to remember you. We use this information to improve and customize your browsing experience, as well as for analytics.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference.