top of page
Search

Oracle Cloud Infrastructure - WAF - A case study

  • subhash496
  • Jan 9, 2024
  • 1 min read
OCI-WAF-Log
OCI-WAF-Log

It was turning out to be a perfect slow day with an early windup for the weekend. Little did I know that the Teams ping in the background is going to shatter that slow-day illusion.... To cut a long story short, we discovered that the application was suffering from a DDoS attack (the normal expected traffic of 500 had increased to over 16,000 hits).


Architecture Context

A typical application with Web-Apps-Database 3-tier model deployed in Oracle Cloud Infrastructure (OCI) fronted by a an Public Load Balancer for external public users.


Findings

The WAF logs (see above screenshot) showed:

  • The traffic had increased from an expected traffic of about 500 hits to over 16,000

  • The originating traffic were not confined to the UK geographical area. Traffic originating from us, ru & de were detected.

  • Majority of the originating traffic were from "agents"


Mitigation

  • Add a WAF policy attached to a Public Load Balancer

  • Create WAF rules specific to counter the DDoS attack (scan for originating traffic, originating region) and block the unexpected traffic

  • Enable OCI Flow logs for WAF & Load Balancers


Important lessons learnt from the incident

  • Review the cloud architecture and measure it against CIS & Landing zone benchmarks

  • Always, Always, Always front a public facing entry-point with a WAF with relevant and tested WAF policies

Commentaires


© 2035 by Analytix. Powered and secured by Wix

bottom of page