简体   繁体   English

AWS 禁用租户之间的网络访问

[英]AWS disable network access between tenants

I am fairly new to AWS and I'm trying to build an application that allows customers to spawn up machines for setting up database clusters我是 AWS 的新手,我正在尝试构建一个应用程序,允许客户生成用于设置数据库集群的机器

Users are free to SSH into their machines, however there should be no connectivity between m1 & m2 where m1 is the cluster of machines tenant t1 owns while m2 is the cluster of machines tenant t2 owns用户可以自由 SSH 进入他们的机器,但是 m1 和 m2 之间应该没有连接,其中 m1 是租户 t1 拥有的机器集群,而 m2 是租户 t2 拥有的机器集群

I did figure out that security groups is the answer to this, however their quota is limited which made me think is my approach even right?我确实发现安全组是解决这个问题的方法,但是他们的配额有限,这让我觉得我的方法是否正确? Is there an alternative?有其他选择吗?

Depending on what you're trying to do, you probably want to separate your clients by giving each one its own AWS account (using organizations) or at the very least by creating a separate VPC for each client.根据您尝试执行的操作,您可能希望通过为每个客户提供自己的 AWS 帐户(使用组织)或至少为每个客户创建一个单独的 VPC 来分离您的客户。

If the Database clusters you intend to build are supported by RDS , this might be a better approach at managing DB instances at scale.如果您打算构建的数据库集群受RDS支持,这可能是大规模管理数据库实例的更好方法。 You can then create IAM roles specific to customers and their clusters and they can remotely change configurations of their instances without the need to SSH.然后,您可以创建特定于客户及其集群的 IAM 角色,他们可以远程更改其实例的配置,而无需拨打 SSH。

Another better approach would be to have a VPC for each client and either create a VPN tunnel back to their on-prem (where they'll SSH from) or setup a public jump box and whitelist source IPs.另一种更好的方法是为每个客户端创建一个 VPC,然后创建一个返回其内部部署的 VPN 隧道(他们将从 SSH 开始)或设置一个公共跳转框和白名单源 IP。 This creates a more secure boundary for SSH, arguably other areas as well.这为 SSH 创建了一个更安全的边界,可以说其他区域也是如此。 You'll likely need to request an increase above the default 5 VPCs per region limit.您可能需要请求增加超过每个区域默认 5 个 VPC 的限制。

I'd also strongly advise engaging with a Cloud Network/Security specialist, before implementing any option, there's bound to be nuances here and there.我还强烈建议与云网络/安全专家合作,在实施任何选项之前,这里和那里肯定会有细微差别。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM