A customer with multiple virtual private clouds (VPCs) in Amazon Web Services (AWS) protected by the cloud-native firewall experiences a cloud breach. As a result, malware spreads quickly across the VPCs, infecting several workloads.
Which minimum solution should be proposed to prevent similar incidents in the future?
Comprehensive and Detailed In-Depth Step-by-Step Explanation:
The customer's AWS environment, with multiple VPCs protected by a cloud-native firewall, experienced a breach due to malware spreading across VPCs, indicating inadequate segmentation and visibility. The Palo Alto Networks Systems Engineer Professional - Software Firewall documentation provides guidance on securing multi-VPC AWS environments with Cloud NGFW, focusing on preventing lateral movement and enhancing threat prevention.
Implement a Cloud NGFW for each VPC (Option D): Deploying a Cloud NGFW instance in each VPC ensures localized traffic inspection, segmentation, and control, preventing malware from spreading laterally across VPCs. Cloud NGFW for AWS supports a distributed deployment model, allowing each VPC to have its own firewall instance integrated with AWS services (e.g., VPC routing, Security Groups) to enforce policies, block threats, and maintain visibility. The documentation recommends this approach for multi-VPC environments to minimize risk exposure and ensure granular security, addressing the customer's breach scenario by isolating and securing each VPC independently.
Options A (Purchase a software credit pool for flexible Cloud NGFW deployment across the VPCs), B (Deploy a single Cloud NGFW), and C (Subscribe to Palo Alto Networks Advanced Threat Protection for the cloud-native firewall) are incorrect. A software credit pool (Option A) is a licensing mechanism, not a deployment solution, and does not address the need for multiple VPC protection. A single Cloud NGFW (Option B) cannot effectively secure multiple VPCs without introducing latency or complexity (e.g., centralized routing), failing to prevent lateral movement as seen in the breach. Advanced Threat Protection (Option C) enhances threat detection but does not resolve the segmentation issue; it requires a distributed deployment (like Option D) to prevent malware spread across VPCs.
Currently there are no comments in this discussion, be the first to comment!