Overview
Egress filtering controls outbound traffic from your cloud environments, providing security by restricting which external destinations your applications can access. This guide walks through implementing egress filtering policies using three different approaches.Prerequisites
Before configuring egress filtering, ensure you have:- Administrative access to CoPilot console or API credentials
- Understanding of your application’s external dependencies
- Network topology and traffic flow documentation
- Backup connectivity plan for critical services
Egress Filtering Configuration
- UI
- Terraform
- API
Step 1: Access Egress Filtering Configuration
- Navigate to Security > Egress in the CoPilot console
- Select the VPC or region where you want to configure filtering
- Click Create New Policy to begin configuration
Step 2: Define Traffic Categories
Configure different traffic categories based on requirements:Create Allow List Policy
- Policy Name:
production-allow-list - Policy Type: Allow List
- Scope: Select target VPCs or gateways
- Default Action: Deny All
Configure Allowed Destinations
-
Essential Services:
- DNS:
8.8.8.8,8.8.4.4 - NTP:
pool.ntp.org - Package Repositories:
*.ubuntu.com,*.centos.org
- DNS:
-
Business Applications:
- SaaS Platforms:
*.salesforce.com,*.office365.com - API Endpoints:
api.stripe.com,api.twilio.com - CDN Services:
*.cloudfront.net,*.fastly.com
- SaaS Platforms:
Step 3: Configure Deny List Policy
Create Deny List Rules
- Policy Name:
security-deny-list - Policy Type: Deny List
- Priority: High (applies before allow rules)
Add Blocked Destinations
-
Known Malicious Domains:
- Threat Intelligence Feeds
- Blacklisted IP ranges
- Suspicious TLDs (
.tk,.ml,.ga)
-
Compliance Restrictions:
- Restricted geographic regions
- Unauthorized cloud storage
- Social media platforms (if required)
Step 4: Application-Specific Policies
Web Application Policy
- Create Policy:
web-app-egress - Target: Web tier VPCs
- Allowed Destinations:
- HTTPS traffic: ports 443, 80
- API endpoints: specific domains only
- CDN services: for static content
Database Policy
- Create Policy:
database-egress - Target: Database tier VPCs
- Restrictions:
- Block all internet traffic
- Allow only internal network communication
- License server access if required
Step 5: Monitoring and Logging
Enable Traffic Logging
- Navigate to Security > Logging
- Enable egress traffic logging for all policies
- Configure log retention: 90 days
- Set up alerts for blocked traffic patterns
Create Monitoring Dashboard
- Blocked Traffic: Real-time view of denied connections
- Top Destinations: Most frequently accessed external services
- Policy Violations: Failed connection attempts
- Bandwidth Usage: Egress traffic volume by policy