Default Action Rule Behavior
Starting with Controller version 8.1, the Default Action Rule is automatically created when DCF is enabled. Legacy rules such as Greenfield and DefaultDenyAll are no longer generated; the Default Action Rule replaces their function.
SmartGroups and Policy Enforcement
SmartGroups enable dynamic, tag-based policy enforcement. These groups are defined using cloud-native metadata such as instance tags or labels. Rules can refer to these dynamic cloud-based SmartGroups instead of groups of static IP addresses, allowing for scalable and context-aware access control. For example, a rule might permit HTTP and HTTPS traffic from a SmartGroup representing frontend web servers to another SmartGroup representing backend APIs. This approach supports micro-segmentation and limits lateral movement within the network—key objectives of a zero trust architecture.Additional Distributed Cloud Firewall Features Supporting Zero Trust
Distributed Cloud Firewall includes several features that enhance zero trust enforcement:- Geolocation Filtering: Administrators can restrict traffic based on country or region, reducing exposure to high-risk geographies.
- Threat Intelligence Feeds: Integration with threat feeds allows for automatic blocking of known malicious IP addresses and domains.
- SaaS services can be protected by defining policies that restrict access to specific applications or services, ensuring that only authorized users and devices can interact with certain resources.
- TLS Decryption and URL Filtering: These capabilities provide visibility into encrypted traffic and enable fine-grained control over web access.
- Logging and Monitoring: Selective logging of Permit and Deny actions supports auditing and incident response without overwhelming storage resources.
Operational Considerations
The Default Action Rule cannot be deleted and serves as a persistent enforcement mechanism. It is important to regularly audit policy rules and SmartGroup definitions to ensure they reflect current organizational requirements and security posture. By combining the Default Action Rule with SmartGroups and other DCF capabilities, Aviatrix enables organizations to implement a zero trust model that is both comprehensive and adaptable to evolving cloud environments.Implementation Methodology
A structured approach to zero trust implementation with Aviatrix includes:- Traffic Analysis: Use CoPilot’s monitoring capabilities to document legitimate traffic patterns between application components.
- Policy Development: Create SmartGroups to accurately represent application components, then establish explicit DCF Permit rules for required communications.
- Validation Testing: Create and validate your policy with the Default Action set to Permit before changing the Default Action to Deny. This ensures that all necessary traffic is allowed before enforcing the deny-by-default posture.
- Production Deployment: Transition production environments to the deny-by-default configuration while monitoring for any unexpected issues.
- Continuous Refinement: Review and optimize policies regularly.