Getting Started with Deep Security for AWS Marketplace

This guide will show you how to get started protecting your Amazon EC2 cloud instances with Deep Security for AWS marketplace.

  1. Prepare a database.
  2. Launch a Deep Security for AWS Marketplace instance.
  3. Modify your AWS Security Group to open required ports on your instances.
  4. Create a dedicated AWS policy and user account for Deep Security to access your cloud account.
  5. Import your AWS instances to Deep Security.
  6. Configure Deep Security to use Agent-initiated communication.
  7. Deploy Deep Security Agents to your AWS instances.

You can find more detailed version of this information in the Deep Security 9.5 SP1 Install Guide for Cloud and AWS.

1. Prepare a database

You must prepare a databse before launching the AWS Marketplace version of Deep Security. You can use your own database or you can use the Amazon RDS Management Console to create a database instance. You can use a Microsoft SQL RDS or an Oracle RDS. Refer to the Amazon RDS Documentation at http://aws.amazon.com/documentation/rds/ for instructions.

If you choose to use your own database, Deep Security supports Microsoft SQL Server 2012 or 2008, or Oracle Database 11g or 10g.

Prepare the database before launching Deep Security

You must deploy the database software, create a database instance for Deep Security and create a user account for Deep Security before you install Deep Security Manager.

2. Launch a Deep Security for AWS Marketplace instance

Launch a Deep Security for AWS Marketplace instance

Select an AMI

On the AWS Marketplace, there are two separate Deep Security Manager AMIs, each providing a different licensing option:

Deploy your Deep Security Manager Instance

  1. Go to the Deep Security Manager pre-installer page (https://<IP>:8080), enter the instance ID, and click Sign In. The Deep Security AMI Configuration page appears, with a series of tabs.
  2. License Agreement: On the first tab, review the license agreement. if you agree to the terms, select I accept the agreement and click Next.
  3. Database: Select the type of database that you have configured for use with Deep Security and fill in the required configuration parameters. The installation process will check for database connectivity and display an error if there is a problem. If you selected Microsoft SQL Server, you can also edit the SQL Server Advanced Options. Click Next.
  4. Address and Ports: Enter the hostname, URL, or IP address of the machine where Deep Security Manager is being installed. The Manager Address must be either a resolvable hostname, a fully qualified domain name, or an IP address. If DNS is not available in your environment, or if some computers are unable to use DNS, a fixed IP address should be used instead of a hostname. Optionally, change the default communication ports: The "Manager Port" is the port on which the Manager's browser-based UI is accessible through HTTPS. The "Heartbeat Port" is the port on which the Manager listens for communication from the Agents. Click Next.
    If your instance has a public IP and DNS entry, it is recommended that you use the public DNS entry for the Manager Address (default). Using the IP address may result in loss of connectivity if the IP changes.
  5. Credentials: Enter a username and password that you will use to log in to the Deep Security Manager console. You should use a strong password that includes upper and lower-case letters, non-alphanumeric characters, and numbers. Click Next.
  6. Confirm Settings: Review the installation settings to ensure they are correct and then click Install.
  7. The Deep Security Status page will indicate that Deep Security Manager is being installed.
  8. When the installation is complete, the Deep Security Manager console will be displayed. You can log in with the username and password that you specified during the Deep Security Manager installation process. Note the URL used to access the Deep Security Manager console.

Select an AMI

On the AWS Marketplace, there are two separate Deep Security Manager AMIs, each providing a different licensing option:

Deploy your Deep Security Manager Instance

  1. Go to the Deep Security Manager pre-installer page (https://<IP>:8080), enter the instance ID, and click Sign In. The Deep Security AMI Configuration page appears, with a series of tabs.
  2. License Agreement: On the first tab, review the license agreement. if you agree to the terms, select I accept the agreement and click Next.
  3. Database: Select the type of database that you have configured for use with Deep Security and fill in the required configuration parameters. The installation process will check for database connectivity and display an error if there is a problem. If you selected Microsoft SQL Server, you can also edit the SQL Server Advanced Options. Click Next.
  4. Address and Ports: Enter the hostname, URL, or IP address of the machine where Deep Security Manager is being installed. The Manager Address must be either a resolvable hostname, a fully qualified domain name, or an IP address. If DNS is not available in your environment, or if some computers are unable to use DNS, a fixed IP address should be used instead of a hostname. Optionally, change the default communication ports: The "Manager Port" is the port on which the Manager's browser-based UI is accessible through HTTPS. The "Heartbeat Port" is the port on which the Manager listens for communication from the Agents. Click Next.
    If your instance has a public IP and DNS entry, use the public DNS entry for the Manager Address (default). Using the IP address may result in loss of connectivity if the IP changes.
  5. Credentials: Enter a username and password that you will use to log in to the Deep Security Manager console. You should use a strong password that includes upper and lower-case letters, non-alphanumeric characters, and numbers. Click Next.
  6. Confirm Settings: Review the installation settings to ensure they are correct and then click Install.
  7. The Deep Security Status page will indicate that Deep Security Manager is being installed.
  8. When the installation is complete, the Deep Security Manager console will be displayed. You can log in with the username and password that you specified during the Deep Security Manager installation process. Note the URL used to access the Deep Security Manager console.

2. Modify your AWS Security Group to open required ports on your instances

  1. Log into your Amazon Web Services Console.
  2. Go to the Security Groups page on your EC2 Dashboard and either create a new Security Group to assign to the instances you want to protect with Deep Security or edit a Security Group that is already assigned to them to allow the following inbound traffic:

3. Create a dedicated AWS policy and user account for Deep Security to access your cloud account

  1. Log in to your Amazon Web Services Console and go to Identity and Access Management (IAM).
  2. In the left navigation pane, click Policies.
    If this is your first time on this page, you'll need to click Get Started.
  3. Select Create Policy.
  4. Select Create Your Own Policy.
  5. Give the policy a name and description, then copy the following JSON code into the Policy Document area:
    
    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "cloudconnector",
                "Effect": "Allow",
                "Action": [
                    "ec2:DescribeImages",
                    "ec2:DescribeInstances",
                    "ec2:DescribeTags"
                    ],
                "Resource": [
                    "*"
                    ]
                }
            ]
    }
    			
  6. Click Create Policy. Your policy is now ready to use.
  7. Back in the Identity and Access Management page's navigation pane, click on Users.
  8. Click Create New Users to display the Create User page.
  9. Enter a username and select the Generate an access key for each User option.
  10. Click Download Credentials to download the generated User Security credentials (Access Key and Secret Key) and then close the dialog window.
  11. Back on the Users page, click on the User to display the User properties, then scroll to the Permissions section of the page.
  12. In the expanded Permissions section, click on Attach Policy at the bottom of the window to display the Attach Policy page.
  13. Select the Policy you just created and click Attach Policy to apply the policy to the new user account.

The Amazon Web Services account is now ready for access by a Deep Security Manager.

4. Import your AWS instances to Deep Security

  1. Sign in to your Deep Security Manager web console.
  2. Close the Welcome screen and click on the Computers tab to display the Computers page.
  3. On the Computers page, click New > Add Cloud Account to display the Add Cloud Provider Wizard.
  4. In the wizard, enter the following information and then click Next:
  5. Deep Security Manager will verify the connection to the AWS cloud account and display a summary of the import action. Click Finish.
  6. When it's done importing your AWS instances the wizard will display the results of the action.
  7. Your AWS instances now appear in the Deep Security Manager under their own branch under Computers in the navigation panel.

5. Deploy Deep Security Agents to your AWS instances

  1. Back in the Deep Security Manager main console, open the Deployment Script generator by selecting Deployment Scripts from the Support menu (in the upper-right corner of the Deep Security Manager console).
  2. In the Deployment Scripts modal window,
    1. select the Platform to which you are deploying the software
    2. select the Activate Agent Automatically option
    3. select a Policy based on the operating system to which you will be deploying the Agent(s)

    Leave the other options at their default settings. As you make the selections, the Deployment Script Generator will generate a script (Powershell for Windows, bash for Linux), that you will run on your Deep Security instance.
  3. Copy the script to your clipboard.
  4. For Windows platforms,
    1. RDP into to your Windows instance.
    2. Start Powershell.
    3. Paste the script from your clipboard into Powershell and run it.

    For Linux platforms,
    1. SSH into your Linux instance.
    2. Run the copied bash script from a command line.

    The script will download, install, and activate a Deep Security Agent on your AWS instance, and then apply a Deep Security protection policy.
  5. Return to the Deep Security Manager console to verify that your AWS instance shows a Status of "Managed (online)" (or that some operation is underway) and a Policy is assigned.

You're done!

Your AWS instance is now protected by Trend Micro Deep Security.