Skip to content

Latest commit

 

History

History
247 lines (158 loc) · 13.9 KB

about.md

File metadata and controls

247 lines (158 loc) · 13.9 KB
copyright lastupdated keywords subcollection
years
2018, 2024
2024-10-09
cis

{{site.data.keyword.attribute-definition-list}}

About {{site.data.keyword.cis_full_notm}}

{: #about-ibm-cloud-internet-services-cis}

{{site.data.keyword.cis_full}}, powered by Cloudflare, provides a fast, highly performant, reliable, and secure internet service for customers running their business on {{site.data.keyword.cloud_notm}}. {: shortdesc}

IBM {{site.data.keyword.cis_short_notm}} gets you started quickly by establishing defaults for you, which you can change easily by using the UI or API.

Clock synchronization

{: #clock-sync}

ISO 27001 requires that clocks of all relevant information processing systems within an organization or security domain must be synchronized with a single reference time source. {{site.data.keyword.cis_short_notm}} synchronizes the systems with a Network Time Protocol (NTP) server to ensure that all time-based activities occur synchronously everywhere on the network.

IBM {{site.data.keyword.cis_short_notm}} uses the following internal NTP servers:

  • time.adn.networklayer.com/
  • time.service.networklayer.com

Security features

{: #cis-security-features}

Proxy your DNS records or a global load balancer to use the security features. The proxy allows traffic to flow through our servers and you can monitor the data.

security graphic{: caption="Security features" caption-side="bottom}

TLS

{: #tls-feature}

Protect your site and control your Transport Layer Security (TLS) settings. Manage the certificates used to secure traffic to your site.

Origin

{: #origin-feature}

Manage the TLS certificates that encrypt traffic between your origin server and your users.

Rate limiting

{: #rate-limiting-feature}

Use rate limiting rules to protect your site or API from malicious traffic by blocking client IP addresses that match a URL pattern or exceed a defined threshold.

Traffic scrubbing

{: #traffic-scrubbing}

{{site.data.keyword.cis_short_notm}} offers 248 Tbps of global network edge capacity and can mitigate DDoS attacks that have extremely high packet and HTTP request rates.

When a DDoS attack occurs, {{site.data.keyword.cis_short_notm}} doesn't use scrubbing centers; the activity is analyzed on the edge, which helps to mitigate DDoS attacks closest to the source.

Traffic that is identified as being "dirty" or part of an attack is not included in the billing. Customers are being billed for protected traffic, which consists of clean traffic that is forwarded to the origin and responses that are returned from the edge to the client.

Web Application Firewall (WAF)

{: #cis-web-application-firewall}

WAF is implemented through multiple rule sets: OWASP, {{site.data.keyword.cis_short_notm}}, and Exposed Credentials Check.

IP firewall

{: #cis-ip-firewall}

{{site.data.keyword.cis_full_notm}} offers several tools for controlling your traffic so that you protect your domains, URLs, and directories against volumes of traffic, certain groups of requesters, and particular requesting IPs.

IP rules

{: #cis-ip-rules}

With IP rules you can control access for specific IP addresses, IP ranges, specific countries, specific ASNs, and certain CIDR blocks. Available actions on incoming requests are:

  • Allowlist
  • Block
  • Challenge (Captcha)
  • JavaScript challenge (Defense mode)

For example, if you notice that a particular IP is causing malicious requests, you can block that user by IP address.

IP rules apply to TCP, HTTP, and HTTPS Range apps, because IP rules are applied to Open System Interconnection (OSI) Layer 3 and Layer 4. {: note}

User-agent blocking rules

{: #user-agent-blocking-rules}

With User-agent blocking rules, you can act on any user-agent string you select. This capability works like domain lockdown, except that the block examines the incoming user-agent string instead of the IP. You can choose how to handle a matching request with the same list of actions that you established in the IP rules (block, challenge, and JS challenge). User-agent blocking applies to your entire zone. You cannot specify subdomains in the same manner as you can with a domain lockdown.

This tool is useful for blocking any user-agent strings that you deem suspicious.

Domain lockdown

{: #cis-domain-lockdown}

By using Domain lockdown, you can allowlist specific IP addresses and IP ranges, such that all other IPs are blocklisted. Domain lockdown supports the following items.

  • Specific subdomains - For example, you can allow IP 1.2.3.4 access to the domain foo.example.com and allow IP 5.6.7.8 access to domain bar.example.com, without allowing the reverse.
  • Specific URLs - For example, you can allow IP 1.2.3.4 access to directory example.com/foo/* and allow IP 5.6.7.8 access to directory example.com/bar/*, but not allow the reverse.

This capability is useful when you need more granularity in your access rules because, with IP rules, you can either apply the block to all subdomains of the current domain, or all domains on your account. You cannot specify URIs.

Firewall rules

{: #firewall-rules-feature}

Create rules that examine incoming HTTP traffic against a set of filters to block, challenge, log, or allow matching requests.

In general, firewall rules are designed for properties that are exposed in OSI Layer-7 (HTTP), such as request headers and body content characteristics. Therefore, firewall rules apply to HTTP/HTTPS Range apps. {: note}

Events

{: #events-feature}

View events that are triggered by an active web application firewall rule. For each event, you can change the triggered action based on the requesting IP address, or the requesting region as a whole.

Range

{: #range-feature}

Extend the power of {{site.data.keyword.cis_short_notm}} DDoS, TLS, and IP firewall to your web servers and your TCP-based services by using Range applications, keeping them online and secure.

Advanced security

{: #advanced-security-feature}

Advanced security settings include the following features, which you can change, enable, or disable.

  • Browser integrity check - The browser integrity check looks for HTTP headers that are commonly abused by spammers. It denies traffic with those headers access to your page. It also blocks or challenges visitors that do not have a user agent, or who add a nonstandard user agent. This tactic is commonly used by abuse bots, crawlers, or APIs.
  • Challenge passage - Controls how long a visitor that passed a challenge (or JavaScript challenge) gains access to your site before they are challenged again. This challenge is based on the visitor's IP, and therefore does not apply to challenges presented by WAF rules because they are based on an action that the user performs on your site.
  • Security level - Sets the security level of your website to determine which visitors receive a challenge page.
  • Always use HTTPS - Redirects all visitors to the HTTPS version.
  • Email obfuscation - Prevents spam from harvesters and bots that try to access email addresses on your pages.
  • Automatic HTTPS rewrites - Helps fix mixed content by changing http to https for all resources (or links) on your website that can be served with HTTPS.
  • Opportunistic encryption - Allows browsers to benefit from the improved performance of HTTP/2 by informing them that your site is available over an encrypted connection.
  • Universal SSL - Activates universal SSL certificates from your zone to the edge.
  • True client IP header - Sends the user's IP address in the True-Client-IP header.

Security standards and platform

{: #security-standards-and-platform}

  • TLS (SHA2 and SHA1)
  • IPv4 and IPv6
  • HTTP/2

Network attacks and mitigation

{: #network-attacks-and-mitigation}

Generally, attacks fall into two categories:

Layer-3 or Layer-4 attacks Layer-7 attacks
These attacks consist of a flood of traffic at ISO Layer 3 (the network layer), such as ICMP floods, or at Layer 4 (the transport layer), such as TCP SYN floods or reflected UDP floods. These attacks send malicious ISO Layer-7 requests (the application layer), such as GET floods.
Automatically blocked at {{site.data.keyword.cis_short_notm}} edge {{site.data.keyword.cis_short_notm}} handles these attacks with Defense mode, WAF, and security-level settings.
{: caption="Types of network attacks" caption-side="bottom"}

On-demand anti-DDoS

{: #cis-on-demand-anti-ddos}

{{site.data.keyword.cis_full_notm}} ingests traffic by returning a {{site.data.keyword.cis_short_notm}} IP address on the DNS lookup for a domain, instead of the actual record for the origin server’s IP address. This allows {{site.data.keyword.cis_short_notm}} to ingest, single-pass inspect, and re-encrypt data before sending it to the origin server destination. {{site.data.keyword.cis_short_notm}} can also act in DNS-only mode, returning the actual DNS record without obfuscating the IP, which disables DDoS and the other functions of {{site.data.keyword.cis_short_notm}}. To enable {{site.data.keyword.cis_short_notm}} protections, switch the "proxy" slider next to each DNS record to on; to disable protections, switch to off.

Unlimited DDoS mitigation

{: #cis-unlimited-ddos-mitigation}

DDoS mitigation is typically an expensive service that can grow in cost when under attack. Unlimited DDoS mitigation is included with {{site.data.keyword.cis_short_notm}} at no additional cost.

Mitigate Layer 7 attacks (configuration)

{: #cis-mitigate-layer7-attacks}

Though DDoS is enabled by default in {{site.data.keyword.cis_short_notm}}, you can further configure Layer 7 security by:

  • Configuring WAF rule set sensitivity and response behavior
  • Adding rate limiting
  • Adding firewall rules

Use these features to customize Layer 7 mitigation of both volumetric and non-volumetric attacks.

Mitigate non volumetric attacks

{: #cis-mitigate-non-volumetric-attacks}

{{site.data.keyword.cis_short_notm}} WAF contains rule sets to mitigate non-volumetric attacks, including cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection. For additional information about WAF, see Web Application Firewall concepts.

Cost protection

{: #cis-cost-protection}

{{site.data.keyword.cis_short_notm}} does not meter or bill for traffic that is blocked as part of DDoS mitigation, firewall, or rate limiting. Only requests that are passed through the {{site.data.keyword.cis_short_notm}} network to the origin destination incur charges or usage.

{{site.data.keyword.cis_short_notm}} also helps keep egress bandwidth charges from your origin under control by only passing along good requests that the origin needs to respond to. All {{site.data.keyword.cis_short_notm}} plans offer unlimited and unmetered mitigation of DDoS attacks. You are never charged for attack traffic. There’s no penalty for spikes due to attack traffic, so there's no chargeback by the customer.

Reliability features

{: #cis-reliability-features}

reliability graphic{: caption="Reliability features" caption-side="bottom"}

Global load balancing features

{: #about-glb-features}

The global load balancing service distributes your traffic across multiple servers with a combination of origin pools, health checks, and a load balancer. Global load balancing has the following features:

  • Proxy and non-proxy options for load balancing
  • Origin pools and health checks

Global anycast network

{: #global-anycast-network}

The available health check regions are based on the Cloudflare Global Anycast Network{: external}.

DNS features

{: #about-dns-features}

DNS within {{site.data.keyword.cis_short_notm}} has the following features:

  • DNS management - Manage your DNS records, control proxying, and enable DNS security.
  • DNSSEC - DNS security cryptographically signs a zone to ensure that the DNS records provided to the user are the same as the DNS records published on the DNS server.

gRPC protocol support

{: #grpc}

The gRPC protocol builds efficient APIs with smaller payloads, which reduces bandwidth requirements, decreases latency, and increases the implementation time. {{site.data.keyword.cis_short_notm}} supports gRPC protocol for any proxied gRPC endpoints. To enable or disable gRPC support, navigate to the Reliability section, select the Advanced tab, and toggle the gRPC switch.

The following requirements must be met before you use gRPC:

  • The gRPC endpoint must listen on port 443
  • The gRPC endpoint must support TLS and HTTP/2
  • HTTP/2 must be advertised over Application-Layer Protocol Negotiation (ALPN)
  • The content-type header of gRPC requests must use application/grpc or application/grpc+<message type>

Performance features

{: #cis-performance-features}

performance graphic{: caption="Performance features" caption-side="bottom}

Caching

{: #caching-features}

Control how {{site.data.keyword.cis_short_notm}} manages your cached assets.

Page rules

{: #page-rule-features}

Fine-tune your cache behavior and create content optimization.

Routing

{: #routing-features}

Eliminate excess latency by analyzing and optimizing routing decisions across the global internet using real-time network connections.

Advanced performance

{: #advanced-performance}

Apply Brotli compression and restrict upload sizes in the advanced performance section.