Nothing Special   »   [go: up one dir, main page]

Skip to content

SSHcom/elastic-jump-host

Repository files navigation

Elastic Jump Host on AWS

When deploying EC2-based workloads, using an AWS VPC with private subnets is the standard way to achieve the needed security and isolation. Accessing the instances becomes a challenge as the means of entry need be enabled both on the network and credential level - not to forget that the configuration lifecycle needs to also be managed.

PrivX Extender along with PrivX SaaS implements a Zero Trust, passwordless and keyless access solution for EC2 instances.

Challenge

A classic multi-tier architecture is built upon public and private subnets. It is highly recommended to expose the internet-facing access point on the public subnet while keeping all other components in publicly inaccessible private subnet.

A common deployment model using Amazon Web Services is an Application Load Balancer running in a public subnet whereas instances running the actual application, the database servers and other backend components are placed in a private subnet. How to implement a control plane for this architecture? Even if using Infrastructure as a Code (highly recommended), the reality is that engineering teams still require access to instances to conduct experiments, probe configurations, consult system logs or debug application issues. This is usually done via Secure Shell (SSH) or Remote Desktop (RDP) protocols on Linux and Windows platforms.

Using one-off jump host instances with shared SSH keys, bastions, VPNs or other naïve access gateways increases the deployment complexity, the amount of manual work through having to keep software and credentials up to date so actually they become a security threat. For example, setting up a Linux bastion for SSH requires: provisioning a bastion EC2 instance on a public subnet, hardening the security groups, instance configuration and limiting IAM access; setting up auditing. This solution works for small teams but it comes with few disadvantages: SSH port 22 is publicly open; SSH keys are still managed manually and private keys are stored on engineering team's laptops. According to a Verizon report, 81% of all breaches are caused by stolen credentials. Teams are struggling to properly manage credentials and prevent credential-related attacks.

Think beyond VPNs, dumb one-off jump hosts or bastion hosts...

Inspiration

Throughout the years, having observed how permanent passwords and left-behind, forgotten credentials still grant access to critical environments years after they were created and needed, we started the PrivX SaaS projects. We wanted to rid the world of passwords and keys laying on disk, and of standing privileges in general.

PrivX SaaS provides a solution for granting just in time access only for the needed resources, often called Zero Trust access. The solution automates the process of granting and revoking access by integrating with an existing identity management system (it also comes with its own!) and ensures that the users have one click access to right infrastructure resources with correct privileges. It also provides full audit trail and monitoring which is vital if your users are handling sensitive data or if you need to provide access for 3rd parties to your environment. All access to enterprise resources is fully authenticated, fully authorized, and fully encrypted based upon device state and user credentials.

PrivX Extender enables PrivX to reach firewalled private networks or virtual private clouds. Once deployed to a private network, it establishes a number of secure websocket connections to PrivX SaaS for routing traffic from the end users accessing PrivX to the target network. This project will provide IaaC (Infrastructure as a Code) deployment of PrivX Extender to an AWS account.

PrivX Extender and Its Environment

In addition to deploying PrivX extender, this CDK project will also configure the environment for its use:

  • Automatically register the extender to your PrivX SaaS instance;
  • Creates a PrivX role to AWS which governs the control plane access to the VPC in question;
  • imports requires SSH keys to target AWS account so that target EC2 instances are accessible via PrivX;
  • It can also automatically enable access to target nodes via instance tags.

The project utilizes serverless to run the PrivX Extender on the AWS account - everything is managed for you!

Getting Started

The latest version of Infrastructure as a Code is available at the main branch of this repository. All development, including new features and bug fixes, take place on the master branch using forking and pull requests as described in contribution guidelines. If you find any issue with the project or missing a feature please open an issue to us.

  1. Sign Up for PrivX SaaS.

  2. Obtain access to target AWS Account. You shall have the ability to create/delete AWS resources. Ultimately, you are deploying this solution to your own AWS account.

  3. Clone extender-on-aws repository

git clone https://github.com/SSHcom/elastic-jump-host
cd extender-on-aws
  1. Configure access rights to your AWS account
export AWS_ACCESS_KEY_ID=Your-Access-Key
export AWS_SECRET_ACCESS_KEY=Your-Secret-Key
export CDK_DEFAULT_ACCOUNT=Your-Account-Id
export CDK_DEFAULT_REGION=eu-west-1
export AWS_DEFAULT_REGION=eu-west-1
  1. We are using AWS CDK, TypeScript and Docker to code this Infrastructure as a Code project. You have to configure your development environment with node and npm version 10.x or later and install required components.
## follow the link about official Docker installation and 
## post-installation instructions. Please ensure that you
## are able to run docker as non-privileged user, otherwise
## CDK deployment might fail
## https://docs.docker.com/get-docker/

## with brew on MacOS
brew install node

## then install CDK
npm install -g typescript ts-node aws-cdk
  1. Install dependencies
npm install
  1. Configure and bootstrap target AWS region with AWS CDK. You have to bootstrap a region only once during life time
cdk bootstrap aws://${CDK_DEFAULT_ACCOUNT}/${CDK_DEFAULT_REGION}
  1. Obtain access/secret keys from PrivX Instance so that the extender is able to configure an access to your private subnet.
  • Login as superuser
  • Go to: Settings > Roles
  • Add Role extender.registrar
  • Give the role permissions: api-clients-manage, roles-view, roles-manage
  • Go to: Settings > Deployment > Integrate with PrivX Using API clients
  • Add API Client extender.registrar
  • Grant the role to the client
  • Deployment process requires: OAuth Client Secret, API Client ID and API Client Secret values.
  1. Use AWS CDK command line tools to deploy PrivX extender to your AWS Account
cdk deploy extender-yourname \
  -c name=yourname \
  -c vpc=vpc-00000000000000000 \
  -c api=https://example.privx.io \
  -c client-id=your-api-client-id \
  -c client-secret=your-api-client-secret \
  -c oauth2-secret=your-oauth-secret

## Note the deployment requires:
##    name           Unique name of the extender. It MUST contain only latin letters 
##                   and digits. This name is used to create a role and name ssh key pair.
##
##    vpc            Unique identity of existing VPC, extender is deployed to this VPC.
##
##    api            HTTPS address to PrivX API (e.g. https://example.privx.io)
##
##    client-id      Your API-Client-ID, see previous stage
##
##    client-secret  Your API-Client-Secret, see previous stage
##
##    oauth2-secret  Your OAuth-Client-Secret, see previous stage
##
  1. In a few minutes, your own instance of PrivX Extender is available. Login to PrivX to observe its status.

Please note, the elastic jump host is deployed to the private subnet, your might encounter following issues if your VPC is not properly configured. VPC with public and private subnets is the recommended configuration for the elastic jump host. Either AWS CDK or Cloud Formation template are easiest way to manage and configure VPC.

Next Steps

The role yourname governs access to SSH target hosts. AWS EC2 instances have to use the ssh key defined by this role yourname and have to define instance tags

privx-ssh-principals=ec2-user=yourname
privx-extender=yourname

We made an IaC example for you. It automates delivery of EC2 instances with required configuration:

cdk example/ec2-ssh-targets
npm install

cdk deploy ec2-ssh-targets \
  -c name=yourname \
  -c vpc=vpc-00000000000000000

The AWS Host Directory is the solution to discover target hosts from your AWS account. Please note, the extender stack creates AWS User extender-yourname-hostscan with only ec2:Describe* permission. Use it for the directory definition. Do not forget to check in host update options from PrivX UI:

  • automatically update host service addresses
  • import host instance tags from the directory

Finally, you grant the role yourname to users in your PrivX workspace.

Afterwords

Access management with PrivX SaaS is different to compare with traditional bastion solution:

  • all target hosts are accessible via a central cloud service, either via browser or native SSH/RDP client;
  • instead of using a publicly visible bastion server, the PrivX extender is deployed on the private subnet. It forms an outbound connection to the central management instance, no inbound ports need to be opened;
  • PrivX SaaS acts as a central authority with no private keys or standing credentials on the laptops;
  • all access to targets hosts is governed by Single Sign On using O365 and GSuite, among others.

Bugs

If you experience any issues with the library, please let us know via GitHub issues. We appreciate detailed and accurate reports that help us to identify and replicate the issue.

  • Specify the configuration of your environment. Include which operating system you use and the versions of runtime environments.

  • Attach logs, screenshots and exceptions, if possible.

  • Reveal the steps you took to reproduce the problem, include code snippet or links to your project.

How To Contribute

The project is MIT licensed and accepts contributions via GitHub pull requests:

  1. Fork it
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Added some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create new Pull Request

The development requires TypeScript and AWS CDK

npm install -g typescript ts-node aws-cdk
git clone https://github.com/SSHcom/extender-on-aws
cd privx-on-aws

npm install
npm run build
npm run test
npm run lint

References

  1. Passwords Are Still a Problem According to the 2019 Verizon Data Breach Investigations Report

License

See LICENSE