Infrastructure Setup

On-premises

As shown in the architecture diagram below, the first template will create an NFS server, an Application server, and a DataSync agent, and a File Gateway appliance will be deployed in an AWS region simulating the on-premises environment.

TrendMicro


1. Launch the CloudFormation template provided below to create our Mock On-Premises infrastructure in a new browser tab.

Launch Stack

  • This will automatically redirect to the AWS CloudFormation create stack page.
  • Click Next on the Create Stack page.

TrendMicro


2. Specify stack details.

  • Accept the default parameter values.
  • Click Next.

TrendMicro


3. Configure stack options.

  • Optional - Configure tags.
  • Click Next.

4. Review stack details.

  • On the Review page, scroll to the bottom and check the box to acknowledge that CloudFormation will create IAM resources.
  • Click Create stack.

TrendMicro

Note: Instances that are launched as part of this CloudFormation template may be in the initializing state for few minutes.

While the CloudFormation deployment progresses in the on-premises region, you can proceed to deploy resources for the in-cloud region.


Cloud Infrastructure

This template will create an S3 bucket to simulate the AWS cloud region to which the NFS server’s data will be migrated.

TrendMicro


1. Coming from the Conformity Immersion day? Use this Step, otherwise please use step 1*.

The below template creates an UNENCRYPTED bucket. This is intentional. This template is to be scanned and remediated with the Conformity IaC Template Scanner VS code extension for misconfigurations. Any S3 bucket created should be encrypted at a minimum. Some exceptions include static S3 websites. If you DO NOT have access to Conformity please skip this step and use the IaC under step 1.*

-> CLICK HERE to see how to scan the Cloudformation template for misconfigurations

1.1 Download IaC template


1.2 Open IaC template in VS Code IDE.

  • With the CloudFormation template above open in the VSCode IDE, open the Command Pallet with:
- MAC OS: ⇧ + ⌘ + P
- Windows/Linux: Ctrl+Shift+P

  • Search for Cloud One Conformity: Scan the Current Open Template and hit enter to start automatically scanning your CloudFormation template: TrendMicro

The result will appear in a second tab called Scan Result like the image below.

You can also check out the Conformity Knowledge Base, which can help you better understand more about any best practice check violations and how to remediate and fix them in your CloudFormation template or in production environments:

TrendMicro


1.3 Encrypt the S3 bucket to reduce misconfigurations introduced inside AWS.

  • Search for(Line 26): AWS::S3::Bucket

TrendMicro

  • Insert the following snippet to add S3 SSE encryption(On line 41).
      BucketEncryption:
        ServerSideEncryptionConfiguration:
        - ServerSideEncryptionByDefault:
            SSEAlgorithm: AES256

TrendMicro

  • Save the template changes.

1.4 Scan the updated template to validate. Then launch this stack in AWS.

TrendMicro



1.* Launch the CloudFormation template provided below to create our Cloud Infrastructure

The below template creates an ENCRYPTED bucket using SSE-S3. This template is for thse who do not have a Conformity account or IDE to edit code.

Launch Stack

  • Click Next on the Create Stack page.

TrendMicro


2. Specify stack details.

  • Click Next (there are no stack parameters).

TrendMicro


3. Configure stack options.

  • Optional - Configure tags.
  • Click Next.

4. Review.

  • On the Review page, scroll to the bottom and check the box to acknowledge that CloudFormation will create IAM resources.
  • Click Create stack.

TrendMicro


Wait for the CloudFormation stacks in each region to reach the CREATE_COMPLETE state before proceeding to the next steps.

It should take about 10 minutes for both CloudFormation stacks to complete.

TrendMicro