In Lab 1, you will enable Valtix’s discovery features and be able to gather inventory and traffic information about your AWS account.
Fill out the information to onboard AWS account on Valtix Controller. Most information is filled in already, below are 2 parameter participant would need to fill in.
Parameter | Description |
---|---|
AWS Account Number | AWS Account Number. This can be found in CloudFormation stack output. |
Account Name | Provide account name. This is used only in Valtix Controller to reference this AWS account. |
Controller IAM Role | This information is given in the CloudFormation stack output. Look at the value for ValtixControllerRoleArn in the output tab. |
Inventory Monitor Role | This information is given in the CloudFormation stack output. Look at the value for ValtixInventoryRoleArn in the output tab. |
Click Save & Continue. You have successfully onboarded your account and Valtix Controller will discover your inventory.
Navigate to Easy Setup -> Traffic Visibility.
Fill out the information to enable Traffic Visibility.
Parameter | Description |
---|---|
CSP Account | Select the CSP account that you just onboarded |
Region | Select a region to enable Traffic Visibility |
VPCs | Select VPCs to enable Traffic Visibility. This will enable DNS query log and VPC flow logs |
S3 Bucket | Input the S3 bucket name that you used in step 7. |
Click Save & Continue
Now generate traffic to see DNS and VPC information:
Generate traffic to following website from the instance’s Session Manager(SSM) console:
curl http://www.google.com
curl http://www.facebook.com
sudo yum -y update &
Navigate to Discovery -> Traffic -> DNS. This provides a summary of the traffic that Valtix gathered from DNS query logs and correlates it with threat intelligence and your asset inventory.
Click on Logs. You should see the traffic that you generated to Google and Facebook.
Let’s generate some traffic to AWS Cloud Services using AWS CLI
Generate traffic with the following AWS cli command:
aws cli
aws s3 ls
aws cloudfront list-distributions
aws --region us-east-1 lambda list-functions
aws --region us-east-1 rds describe-account-attributes
aws --region us-east-1 redshift describe-account-attributes
aws --region us-east-1 kafka list-clusters
Navigate to Discovery -> Traffic -> DNS.
Scroll down to the bottom of the page. Find “Top CSP Services” treemap. Valtix shows you information on what CSP Services your environment is using so you can build policies based on Cloud Services.
Let’s generate some traffic to malicious sites.
Generate traffic by executing below cli command:
wget --no-proxy --no-check-certificate --post-data 'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*' -O /tmp/av.log https://www.example.com
wget -O /dev/null -o /dev/null http://mspy.com
wget -O /dev/null -o /dev/null http://17ebook.com
wget -O /dev/null -o /dev/null http://purplehoodie.com
Click on Malicious Categories. If Valtix detects traffic that could potentially be malicious, Valtix highlights those sessions for users. Navigate back to Summary. This provides a better view to see malicious activities.
The traffic generated to purplehoodie is a potential malicious site categorized by brightcloud. If you lookup purlehoodie.com in brightcloud url-lookup, you’ll realize that it’s high risk.
Navigate to Discovery -> Traffic -> VPC. Valtix provides a summary based on VPC flow log and correlates it with threat intelligence and your asset inventory.
Find VPC Traffic and Instance Traffic graphs. These graphs provides you with which VPC and Instance traffic distribution. You could potentially identify if any of your instances are being used as bots.