The Cloud IPS architecture in AWS consists of:
- Your VPC containing an Internet Gateway (IGW).
- A Firewall Public Subnet with the AWS Network Firewall Endpoint, running TrendAI Vision One™ managed rule groups (Malware, Client CVE, Server CVE).
- An Application Subnet (Private) hosting your workloads (e.g., EC2, EKS, ECS, Lambda).
The following sections describes different example scenarios of Cloud IPS protecting
your environment using TrendAI Vision One™ managed rule groups.
NoteThese examples explain the concept of how Cloud IPS provides protection, but Cloud
IPS rule groups can cover a broad number of potential use cases in your environment.
|
Malware protection - Outbound C2 blocking
Scenario: EC2 instance infected with malware attempts to communicate with command-and-control
server.
Traffic Flow:
- Malware on EC2 instance (private subnet) attempts outbound connection.
- Traffic routes to AWS Network Firewall endpoint in firewall subnet.
- The
TrendAI-MalwareBlockStrictOrderrule group inspects traffic. - Malicious C2 traffic is blocked and logged.
- Legitimate traffic continues to NAT Gateway, then Internet Gateway.
Applies to: North-south and east-west traffic from EC2, ECS, EKS, Lambda, and other AWS services.
Server-side CVE protection - Inbound exploit blocking
Scenario: External attacker attempts to exploit server-side vulnerability in your application.
Traffic Flow:
- Bad actor sends exploit attempt from internet.
- Traffic enters through Internet Gateway.
- Routes to AWS Network Firewall endpoint.
- The
TrendAI-CVEServerBlockStrictOrderrule group inspects traffic. - Exploit attempt is blocked and logged.
- Legitimate traffic continues to Public ALB, then Application servers.
Applies to: North-south and east-west traffic to EC2, ECS, EKS, Lambda, and other application
servers.
Client-side CVE protection - Bidirectional exploit blocking
Scenario: Compromised workload attempts to exploit external server.
Traffic Flow:
- EC2 instance in a private subnet initiates a legitimate outbound API request to an external service.
- Traffic is routed to the AWS Network Firewall endpoint via the subnet route table.
- The
TrendAI-CVEClientBlockStrictOrderrule group inspects the bidirectional traffic, including server responses. - A malicious response containing a client-side CVE exploit payload is blocked and logged.
- Legitimate traffic continues through the NAT Gateway, Internet Gateway, then External service.
Applies to: North-south and east-west traffic from EC2, ECS, EKS, Lambda, and other workloads.
