In a world of accelerating safety threats, IBM Cloud affords quite a lot of options to help you in safety and compliance. We have now integrated a number of IBM Cloud companies into our Citrix-DaaS answer, enabling you to simply get up a safe deployment out of the field. In managing your risk vectors, it’s a good suggestion to have a single level of entry into your VPC. Moreover, having zero publicity to the web and encryption helps forestall attackers from compromising your deployments. Centralized logging helps you monitor down points in your surroundings shortly and successfully.
If you happen to require stricter safety and compliance requirements inside your Citrix DaaS deployment on IBM Cloud, you need to use these IBM Cloud sources and options to customise your workload safety:
- Bastion host: Gives a safe method to entry distant cases inside a Digital Non-public Cloud (VPC).
- Shopper-to-site VPN: Gives client-to-site connectivity, which permits distant gadgets to securely hook up with the VPC community through the use of an OpenVPN software program shopper.
- Buyer-managed encryption: Protects knowledge whereas in transit from block storage to the host/hypervisor and whereas at relaxation in volumes.
- Entry management checklist (ACLs): Used with safety teams to limit entry to NIC port ranges.
- Log evaluation: Makes use of IBM Log Evaluation to supply logs multi functional place.
Provision a bastion host
A bastion host is an occasion that’s provisioned with a public IP tackle and could be accessed by way of SSH. After setup, the bastion host acts as a leap server, permitting safe connection to cases provisioned with no public IP tackle.
Earlier than you start, you could create or configure these sources in your IBM cloud account:
- IAM permissions
- VPC
- VPC Subnet
- SSH Key
To scale back the publicity of servers inside the VPC, create and use a bastion host. Administrative duties on the person servers are carried out through the use of SSH, proxied via the bastion. Entry to the servers and common web entry from the servers (e.g., software program set up) are allowed solely with a particular upkeep safety group that’s hooked up to these servers.
For extra data, see Securely access remote instances with a bastion host.
If you wish to arrange a bastion host that makes use of teleport, see Setting up a bastion host that uses teleport.
Create a client-to-site VPN for safety
The VPN server is deployed in a particular multi-zone area (MZR) and VPC. All digital server cases are accessible from the VPN shopper within the single VPC:
You’ll be able to create your VPN server in the identical area and VPC the place your DaaS deployment resides.
Relying on the shopper authentication you chose throughout VPN server provisioning, customers can hook up with the VPN server through the use of a shopper certificates, person ID with passcode or each.
Now you’ll be able to hook up with your DaaS VSIs out of your native machine(s) through the use of non-public IP solely.
Use customer-managed encryption to encrypt your knowledge end-to-end
By default, VPC volumes are encrypted at relaxation with IBM provider-managed encryption. There isn’t any extra price for this service. For end-to-end encryption in IBM Cloud, it’s also possible to use customer-managed encryption the place you’ll be able to handle your individual encryption. Your knowledge is protected whereas in transit from block storage to the host/hypervisor and whereas at relaxation in volumes.
Buyer-managed encryption is supplied in VPC through the use of IBM Key Protect for IBM Cloud or IBM Hyper Protect Crypto Services (HPCS). The Key Defend or HPCS occasion should be created and configured earlier than the order stream inside Citrix-DaaS. The Id quantity encryption choice on the Citrix-DaaS order UI is then used to encrypt every identification disk related along with your machine catalog inside Citrix Machine Creation Providers (MCS).
Use entry management lists to limit port ranges
By default, Citrix-DaaS deployments create a number of safety teams (SGs) designed to isolate entry between NICs. For extra data on SGs, see About security teams. There isn’t any inbound entry from the web by default until you select to assign floating IPs (FIP). We suggest establishing VPN as described on this article over utilizing FIPs. Safety teams include a limitation of 5 SGs per community interface card (NIC), which leaves some pointless port ranges open that may be additional restricted through the use of entry management lists (ACLs).
For extra details about utilizing ACLs, see About network ACLs. For details about Citrix-DaaS port ranges, see Technical Paper: Citrix Cloud Communication.
Use IBM Log Evaluation to observe logs for compliance and safety
For many Citrix-DaaS deployments, centralized logging is vital. With out centralized logging, you’re compelled to search out logs for every particular person part throughout a number of sources. For instance, some logs are on the Cloud Connector VSIs (Connector Logs and Plug-in) and Area Controller logs are on the Lively Listing Server. In case you are utilizing Quantity Employee, logs are cut up between IBM Cloud Capabilities and the employee VSIs that full the roles. A few of these logs are ephemeral and should not accessible if not being recorded by centralized logging.
Centralized logging is supplied through the use of an IBM Log Analysis occasion and may present logs multi functional place. IBM Log Evaluation can both be provisioned with the Citrix-DaaS deployment or an ingestion key for an current occasion supplied via a Terraform variable. As a result of centralized logging is extraordinarily vital for this product, it’s enabled by default; optionally (with a Terraform variable), it may be disabled.
Conclusion
A number of IBM Cloud companies are integrated into the Citrix DaaS answer, so you’ll be able to simply get up a safe deployment out of the field. You’ll be able to configure stricter safety inside your deployment on IBM Cloud. Primarily based on the enterprise wants, you’ll be able to customise the safety precautions that you simply require to combine along with your deployment.
Get started with Citrix DaaS on IBM Cloud
Tags