Exciting news! Building on the momentum and success of our Security Fundamentals Dashboards (SFD), SFD is taking security to the next level. Thanks to the invaluable feedback from our customers, who have experienced the significant impact of SFD in strengthening their cloud environments, we are expanding our efforts to provide even more robust security solutions. Network Security Dashboard is designed to elevate network visibility, providing a comprehensive view of key security components, including Network Firewalls, Web Application Firewalls (WAF), Load Balancers, Virtual Cloud Networks (VCN). By integrating these elements into a single, user-friendly interface, the Network Security Dashboard enables organizations to streamline monitoring, detect vulnerabilities, and reinforce their network defenses from end to end.

This blog delves into how the Network Security Dashboard empowers teams to take a proactive approach to network threat management, fortify network resilience, and drive security excellence across their cloud environment.

New Network Security Dashboard Scopes

The Network Security Dashboard provides targeted visibility across critical areas of network infrastructure, offering a structured approach to monitor, assess, and secure the entire network environment. Network Security Dashboard allows security teams to focus on specific components within the Virtual Cloud Network (VCN), Load Balancers, Web Application Firewalls (WAF), and Network Firewalls, delivering insights tailored to each aspect’s unique security requirements. This structured approach ensures a comprehensive understanding of network security health, fostering an environment of continuous improvement and enhanced resilience.

Defined scopes in the Network Security Dashboard

  • VCN Network Flow Logs Analysis
  • Load Balancer Monitoring & Analysis
  • Web Application Firewall Monitoring
  • Network Firewall Monitoring
  • VCN Network Changes Monitoring

Log Sources used in Network Security Dashboard

  • OCI VCN Flow Unified Schema Logs
  • OCI Network Firewall Traffic Logs
  • OCI Network Firewall Threat Logs
  • OCI Load Balancer Access Logs
  • OCI Load Balancer Error Logs
  • OCI WAF Logs
  • OCI Audit Logs

Dashboards Screenshots

The Network Security Dashboard is split into four sections, each section covering a specific service and only the logs of that service.

The Virtual Cloud Network section

The Virtual Cloud Network section has two tabs:

  • tab 1 is based on the VCN Flow Logs and focuses on statistical data built around network flows.
  • tab 2 is based on the Tenancy’s Audit Log and will show network changes made to the environment.
Figure 1. Network Security Dashboard Virtual Cloud Network Scope
Figure 1. Network Security Dashboard Virtual Cloud Network View
Figure 2. Network Security Dashboard Virtual Cloud Network Changes Scope
Figure 2. Network Security Dashboard Virtual Cloud Network Changes View

The Load Balancer Section

The second section is built around the Load Balancer logs (access and error). While the section’s focus is around HTTP errors and HTTP error codes, there are two widgets showing interesting statistical data: the number of requests for each Load Balancer and the most requested Hostnames.

Figure 3. Network Security Dashboard Load Balancer Scope
Figure 3. Network Security Dashboard Load Balancer View

The Web Application Firewall section

The WAF section has a main widget, called WAF Statistics, which gives an overview of all flows passing through the WAF and shows WAF response codes, Public Source IPs, WAF action and many other interesting data. The other widgets show interesting statistical data like the most requested URL, top countries connecting to the WAF, WAF action.

 

Figure 4. Network Security Dashboard Web Application Firewall View
Figure 4. Network Security Dashboard Web Application Firewall View

The OCI Network Firewall Section

The Network Firewall section is based on the two firewall logs, traffic and threat. From the traffic log we can observe interesting data related to network flows and firewall policy usage while from the threat log we can observe detected attacks and the action taken by the firewall.

Figure 5. Network Security Dashboard OCI Network Firewall View
Figure 5. Network Security Dashboard OCI Network Firewall View

Network Security Dashboards Widgets

Section Widget Description
VCN Total Network Traffic The total network traffic of the environment, as observed by the VCN Flow Logs, in KiloBytes.
VCN Network Egress Traffic to Public The total volume of traffic egressing from the VCN towards the Internet, counted by observing the Public IPs in the VCN Flow Logs.
VCN Network Egress Traffic from Public The total volume of traffic ingressing from the Internet towards the VCN, counted by observing the Public IPs in the VCN Flow Logs.
VCN Threat IPs A count of the number of observed Public Threat IPs that are communicating with the environment. The Threat IPs are described in OCI’s Threat Intelligence service.
VCN Denied Connections by Source An overview of all Source IPs that are being denied to connect to the environment.
VCN Denied Connections by Destination Port An overview of the most denied destination ports.
VCN VCN Flows Analysis A statistical view of all the network flows in the environment, ordered by the number of sessions for each flow. The flow is defined as Source IP, Destination IP, Destination Port and Transport Protocol.
VCN Network Changes An overview of all user made changes in the environment, focused on the networking constructs – VCN, Subnets, VCN Route Tables, Security Lists, Network Security Groups, Gateways.
LB HTTP Response Code A statistical view of all HTTP Response codes observed in the environment, across all Load Balancers.
LB HTTP Response 4XX and 5XX A statistical view of all 4XX and 5XX HTTP Response codes observed in the environment, across all Load Balancers.
LB Total Requests by LB The number of requests reaching each Load Balancer.
LB Load Balancer Errors A list of all Load Balancer errors as reported by the Error Log.
LB DNS Host Access A list of all observed requested Hostnames, as seen in the HTTP Host Header.
WAF WAF Statistics A complex statistical analysis of the WAF traffic, ordered by the Top Talkers. The widget shows: source IP, requested HTTP Method, WAF Response Code, Backend Response Code, WAF Action.
WAF WAF Action Count A statistical view of allowed vs denied traffic.
WAF WAF Backend Response Code All observed WAF backend response codes.
WAF WAF Response Code All observed WAF response codes.
WAF WAF Top 10 Country Code Top 10 countries connecting to the WAF.
WAF WAF Top 10 URLs Top 10 requested URLs.
WAF WAF Top 10 Source IPs Top 10 source IPs connecting to the WAF.
NW FW Top 10 Denied Destination Ports A statistical view of the most denied ports, ordered by occurence and Source IP.
NW FW Top 10 Allowed Destination Ports A statistical view of the most allowed ports, ordered by occurence and Source IP.
NW FW Top 10 Denied Sources Top 10 Source IPs that were denied, observed across all network flows passing through the firewall.
NW FW Top 10 Source IPs Top 10 Source IPs observed across all network flows passing through the firewall.
NW FW Top 10 Destination IPs Top 10 Destination IPs observed across all network flows passing through the firewall, both denied and allowed.
NW FW Policy hit count by name The number of hits each Firewall Policy has. Policies with 0 hits will not appear.
NW FW Network Firewall Flow Analysis A statistical view of all the network flows in the environment, ordered by the number of sessions for each flow. The flow is defined as Source IP, Destination IP, Destination Port and Transport Protocol.
NW FW Threat Log by Severity Threat Subtype All the observed Threats by the firewall, ordered by Severity. The widgets also shows the Action taken by the Network Firewall: allow+alert or reject.

 

Network Security Dashboard Filters

The Dashboard can also be used as a troubleshooting tool. All the widgets in the Dashboard, across all sections, can be filtered to show data relevant to only a specific Source IP, Destination IP, Destination Port or any combination of the three. This can be achieved by enabling the Dashboard filter.

filter

 

Network Security Dashboard Onboarding

Enable logs for Network Security

Logging Analytics should be set up in your tenancy 

Configure Logging Analytics

Enable Threat Intelligence Enrichment for Network Security Dashboard Log Sources

Logging Analytics is integrated with Oracle Threat Intelligence to automatically receive the threat feed as the logs are ingested. The feature is available for all the log sources in the regions where both Logging Analytics and Oracle Threat Intelligence services are enabled. The Threat IPs widget makes use of this feature, which is not enabled by default. 
To enable:

  • In OCI console, Navigate to Observability and Management -> Logging Analytics -> Administration
  • Click on Sources. in search box in the top right, search for “vcn”. You should get 2 sources: OCI VCN Flow Logs and OCI VCN Flow Unified Schema Logs
  • Edit each source. On the Edit screen, click the Field Enrichment tab. Ensure the Enabled checkbox is checked for the Geo location function
  • Edit the Geo location function by clicking the three dots, and check Threat Intelligence Enrichment checkbox. 
  • If it is not, check the checkbox and click Save Changes
  • Repeat above 5 steps for OCI Network Firewall Traffic Logs, OCI Network Firewall Threat Logs, OCI Load Balancer Access Logs, OCI Load Balancer Error Logs, OCI WAF Logs, OCI Audit Logs Sources. 
     

Network Security Dashboard Deployment using SFD Marketplace App

Security Fundamentals Dashboards (SFD) OCI Marketplace App offers a seamless, one-click solution for customers to effortlessly deploy SFD dashboards and automate the collection of essential security-related logs in Logging Analytics. This streamlined approach simplifies the setup of comprehensive security monitoring across OCI environments, empowering customers to enhance their cloud security posture with minimal effort.

To launch the Marketplace app:

  • In OCI console, Navigate to Marketplace -> All Applications
  • Search “Security Fundamentals Dashboards
  • Check I have reviewed and accept the Oracle standard Terms and Restrictions.
  • Figure 6. Security Fundamentals Dashboard Marketplace App
    Figure 6. Security Fundamentals Dashboard Marketplace App

     

  • Click Launch Stack
  • Review the Stack Information and Click Next
  • Select the Dashboard Compartment from the dropdown to deploy the dashboards
  • Check Create Service Connector for IAM Identity Domain Audit?
  • Update the Logging Analytics Log Group Name if needed
  • Switch Service Connector Hub State from INACTIVE to ACTIVE
  • Check Include Network Related Logs? checkbox
  • Add the Logging service Network related logs Log Group OCIDs 
  • Click Next for the final Review, Click Create to run the stack 
  • Figure 7. Security Fundamentals Dashboard Terraform Stack
    Figure 7. Security Fundamentals Dashboard Stack Launch

     

Conclusion

Oracle Cloud Infrastructure (OCI) provides a scalable, resilient security framework that empowers businesses to confidently operate mission-critical applications and safeguard their data. Maintaining a robust cloud security posture is essential for operational excellence, requiring continuous monitoring and proactive enhancement. Our Security Fundamentals Dashboards(SFD), already delivering significant value to customers, reflect this commitment to a secure OCI environment. Feel free to try out the dashboards by lauching the Security Fundamentals Dashboards Marketplace app to get the security monitoring enabled for your environment. 

Sign up for an Oracle Cloud Infrastructure free trial account today to try out new Oracle Cloud Infrastructure features! 

Reference