{"id":55036,"date":"2024-04-16T09:47:03","date_gmt":"2024-04-16T09:47:03","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=resources&#038;p=55036"},"modified":"2024-04-17T05:13:53","modified_gmt":"2024-04-17T05:13:53","slug":"a-psu-identifies-and-blocks-malicious-sources-for-enhanced-security-defenses-with-cloudthat-2","status":"publish","type":"resources","link":"https:\/\/www.cloudthat.com\/resources\/case-study\/efficient-landing-zone-automation-streamlines-setup-reducing-manual-work-by-80-for-a-psu","title":{"rendered":"Efficient Landing Zone Automation Streamlines Setup, Reducing Manual Work by 80% for a PSU"},"content":{"rendered":"<p><span class=\"EOP SCXW3500924 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\"><span class=\"TextRun SCXW38656847 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW38656847 BCX8\">IRCTC<\/span><span class=\"NormalTextRun SCXW38656847 BCX8\"> was<\/span> <span class=\"NormalTextRun SCXW38656847 BCX8\">established<\/span><span class=\"NormalTextRun SCXW38656847 BCX8\"> in 1999 as an extension of Indian Railways, enhances catering <\/span><span class=\"NormalTextRun SCXW38656847 BCX8\">and <\/span><span class=\"NormalTextRun SCXW38656847 BCX8\">hospitality services<\/span><span class=\"NormalTextRun SCXW38656847 BCX8\">,<\/span><span class=\"NormalTextRun SCXW38656847 BCX8\"> and promotes tourism through budget hotels, tour packages, and global reservation systems.<\/span><\/span>\u00a0<\/span><\/p>\n","protected":false},"author":1291,"featured_media":55041,"parent":0,"template":"","cat_resources":[6],"technology":[32],"published_by":"324","primary-authors":["430"],"secondary-authors":["325","624"],"acf":{"banner_image":55042,"resources_label":"","download_url":"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2024\/04\/IRCTC_CaseStudy-1.pdf","client_logo":55040,"highlights":{"first_part":{"icon":336,"title":"DDoS Prevention and System Stability","subtitle":"Blocking malicious IP addresses and limiting request rates"},"second_part":{"icon":335,"title":"Access Control and Authorization ","subtitle":"Restriction of access to sensitive resources"},"third_part":{"icon":334,"title":"Comprehensive Threat Protection","subtitle":"OWASP Top 10 list and Safeguards Against Common Threats"}},"the_challenge":"<span class=\"TextRun SCXW233771426 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW233771426 BCX8\">The client faced scalability and security challenges with their On-Premises Infrastructure, <\/span><span class=\"NormalTextRun SCXW233771426 BCX8\">necessitating<\/span><span class=\"NormalTextRun SCXW233771426 BCX8\"> a transition to AWS Cloud. This involved implementing an enhanced AWS WAF for improved application security and modernizing their infrastructure.<\/span><\/span><span class=\"EOP SCXW233771426 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span>","client_testimonial":{"image":"","description":"","author":""},"solutions":"<ul style=\"font-weight: 400;\">\r\n \t<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Implemented AWS WAF rules to block foreign IP addresses during specific time frames, reducing the impact of bot traffic and illegitimate requests during critical booking periods. Time frames are set from 07:40 hrs. to 08:10 hrs, 09:40 hrs to 10:10 hrs, and 10:40 hrs to 11:10 Hrs.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n \t<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Blocked anonymous proxy IP addresses for both their website and mobile application.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n \t<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Blocking is always enabled without whitelist configuration, enhancing security by preventing access from potentially malicious sources.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n \t<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Rate limiting has been set up for their mobile app, restricting it to 7 HTTP requests per second per source. A similar rule has also been enforced to cap requests at 2100 per 5 minutes, effectively managing traffic flow and promoting fair resource utilization.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n \t<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Implemented managed core rule sets for OWASP Top 10 attacks, including protection against illegal URLs, host names, evasion techniques, file types, and known bad inputs.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\r\n \t<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span class=\"TextRun SCXW109859727 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW109859727 BCX8\">Implemented DDoS protection measures, including rate-based blocking and AWS Managed Rulesets such as Amazon IP Reputation List, Anonymous IP List, and specific <\/span><span class=\"NormalTextRun SCXW109859727 BCX8\">Windows and Linux operating system rule set<\/span><span class=\"NormalTextRun SCXW109859727 BCX8\">s.<\/span><\/span><span class=\"EOP SCXW109859727 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<\/ul>","the_results":"<span class=\"TextRun SCXW228936888 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW228936888 BCX8\">Security measures have been implemented to prevent DDoS attacks, restrict unauthorized access, and <\/span><span class=\"NormalTextRun SCXW228936888 BCX8\">utilize<\/span><span class=\"NormalTextRun SCXW228936888 BCX8\"> IP intelligence for enhanced defense, strengthening overall security posture and ensuring system stability.<\/span><\/span><span class=\"EOP SCXW228936888 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span>","about_client_left_side":[{"field_63315a4dc06e1":"15085","field_63315a5bc06e2":"Industry\u00a0","field_63315a61c06e3":"Government and PSU "},{"field_63315a4dc06e1":"15083","field_63315a5bc06e2":"Expertise\u00a0","field_63315a61c06e3":"AWS IAM, Amazon S3, AWS WAF, AWS Sheild, AWS KMS, AWS GuardDuty, Amazon CloudWatch, AWS CloudTrail, Amazon EC2 "},{"field_63315a4dc06e1":"15084","field_63315a5bc06e2":"Offerings\/solutions\u00a0","field_63315a61c06e3":"Implemented security measures to ensure protection against DDoS attacks, restrict unauthorized access, and utilize IP intelligence for enhanced defense, strengthening overall security posture and system stability. "}]},"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/resources\/55036"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/1291"}],"version-history":[{"count":4,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/resources\/55036\/revisions"}],"predecessor-version":[{"id":55102,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/resources\/55036\/revisions\/55102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/55041"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=55036"}],"wp:term":[{"taxonomy":"cat_resources","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/cat_resources?post=55036"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/technology?post=55036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}