-
Notifications
You must be signed in to change notification settings - Fork 58
Description
In package 7-Fortigate
The PBR rules implemented steer through the Firewall only the following traffic (prod, nonprod, dev)
- Pub => App
- App => Data
However, all the communication flows except the 2 above seem to be allowed in terms of intra-vnet routing and should not be e.g. App => Pub, Pub => Data, etc
Missing PBR for 0.0.0.0/0 => all traffic to Internet will go via NAT gateway and not inspected by the Firewall
In package (in 3-networks-hub-and-spoke
Because in 3-networks-hub-and-spoke/modules/base_shared_vpc/firewall.tf all intra-VPC traffic allowed, in fact should have allowed only egress via Firewall
This also blocks all inbound traffic from Internet, via Firewall (only intra-VPC traffic can pass) and also blocks any traffic SNAT-ed in the Fortigate rules
Missing PBR for Management and Identity spokes
Hierarchical firewall (in 3-networks-hub-and-spoke / shared) not associated w/ Management and Identity spokes
In 6 - Org Policies
The list-type constraints/compute.restrictVpcPeering does not provide any list nor wildcard and that probably means users in business-units project can freely peer their VPCs allowing traffic to bypass the firewall