Implementing Best Practices

Basic Hygiene

Visibility
  1. Log events related to all applications, the load balancing software, and the host operating system.

  2. Alert on:

    1. Administrative access from public sources.

    2. Administrative logins from new sources.

    3. Security policy violations related to administrative and application access.

    4. Connections from and to new geographies.

    5. Unscheduled changes to configurations and network policies.

Default Deny
  1. Block administrative access from public networks.

  2. Block unsolicited connections to public systems unless required for an application to operate.

Least Privilege
  1. Limit administrative access to authorized, trained personnel.

Segmentation
  1. Deploy load balancers in segments dedicated to application hosting.

Configuration
  1. Disable unused load balancing features.

  2. Disable unused software related to the host operating system. Conduct load balancing from a dedicated system that does not perform other functions.

Advanced Hygiene

Visibility
  1. Log network traffic using either flows or packet captures. 1.Alert on:

    1. Long-lived network sessions.

    2. Sessions that move substantial amounts of data.

    3. Network sessions that are absent from other system activity logs.

    4. Software crashing, stopping, or restarting.

Default Deny
  1. Block administrative access from internal networks other than segments used for administrative work or bastion hosts.

  2. Block unsolicited connections to internal systems unless required for an application to operate.

  3. Deploy a database firewall or similar application layer policy enforcement. Restrict application calls to the minimum set necessary for operation.

Least Privilege
  1. Restrict admin users to specifically authorized objects related to their role via role-based access control features.

  2. Restrict any superuser accounts to "break-glass" usage.

    1. Configure complex, random passwords for superuser accounts.

    2. Provision unique privileged accounts for each authorized administrator.

Segmentation
  1. Deploy load balancers in dedicated network segments.

  2. Deploy application servers in dedicated segments.

Configuration
  1. Uninstall unused software features if supported.

Resilient Operations

Visibility
  1. Implement behavior analysis.

    1. For internal applications (public applications may make these analytics difficult):

      1. Alert based on "superman" user access rules, e.g., from impossible geographic sources based on time and distance.

      2. Track geography, source IP, destination IP, session duration, and transfer sizes per device and user with anomaly alerting.

      3. Alert for new or rarely used user agents per user.

  2. Track administrator access patterns and actions taken, with alerts for abnormal behavior.

Default Deny
  1. Redirect unencrypted sessions to use encrypted application access or block unencrypted connections.

Least Privilege
  1. Disable default system accounts, and utilize unique credentials for each load balancer within a cluster.

Segmentation
  1. Deploy a secure administrative zone and lock administrative access down to this zone.

  2. Segment load balancing operations across zones dedicated to specific applications.

  3. Use separate, dedicated application firewalls instead of all-in-one solutions deployed within a load balancing system.

  4. Use multiple different load balancing solutions for the greatest security.

Configuration
  1. Harden configurations using guidance from a government, third-party, or vendor source as much as possible.

Load Balancer Resources