Managing Edge Access Lists and Policies¶
This guide shows you how to create and manage Edge Access lists and policies through the Peakhour dashboard to implement comprehensive zero trust access control for your applications.
Before you begin: Understand Zero Trust Architecture and have admin access to your Peakhour dashboard.
Understanding Access Lists and Policies¶
Edge Access uses a combination of lists and policies to implement zero trust security:
- Access Lists: Define collections of IP addresses, strings, or other identifiers
- Policies: Define rules that determine access based on conditions and actions
- Rules: Wirefilter expressions that reference lists and trigger policy actions
Core Components¶
Access Lists:
- IP Lists: Collections of IP addresses and CIDR blocks
- String Lists: Collections of text values (domains, user agents, etc.)
- Integer Lists: Collections of numeric values (ports, user IDs, etc.)
Policy Actions:
- Allow: Grant access without additional verification
- Block: Deny access completely
- Bypass: Skip certain security checks
- Service Auth: Require service token authentication
- Login Gate: Require interactive user authentication
Create and Manage Access Lists¶
Navigate to Access Lists¶
- Log into Peakhour Dashboard
- Select Your Domain from the domain list
- Go to Security → Edge Access
- Click Access Lists Tab in the interface
Create IP Access Lists¶
Scenario: Create a trusted partner IP list
- Click "Create Access List"
-
Configure List Details:
-
Name:
Trusted Partners
-
Type:
IP Addresses
-
Description:
IP addresses of trusted business partners
-
Add IP Addresses:
-
Configure Options:
-
Enable List: ✓ Active immediately
- Auto-Update: Configure if using dynamic IP feeds
- Expiration: Set if list has time limits
Create String Access Lists¶
Scenario: Create a blocked user agent list
-
Create String List:
-
Name:
Blocked User Agents
- Type:
String Values
-
Description:
User agents to block or restrict
-
Add String Values:
-
Configure Matching:
-
Case Sensitive: Usually disabled for user agents
- Wildcard Support: Enable for pattern matching
- Regular Expression: Advanced pattern matching
Manage List Entries¶
Adding Bulk Entries:
- Click "Bulk Import" in the list interface
-
Choose Import Method:
-
File Upload: CSV or text file
- Copy/Paste: Direct text input
- API Import: Programmatic list updates
Entry Management:
- Add Individual Entries: Single IP or string addition
- Edit Entries: Modify existing values
- Disable Entries: Temporarily remove from matching
- Delete Entries: Permanently remove values
Create Edge Access Policies¶
Navigate to Policies¶
- Go to Security → Edge Access
- Click Policies Tab in the interface
- Review existing policies and their effectiveness
Create Basic Allow Policy¶
Scenario: Allow trusted partners unrestricted access
- Click "Create Policy"
-
Configure Policy Details:
-
Name:
Partner Access Allow
- Description:
Allow full access for trusted business partners
- Action:
Allow
-
Priority:
High
(evaluated first) -
Set Rule Conditions:
-
Configure Advanced Options:
-
Skip Additional Checks: Enable to bypass other security rules
- Logging Level:
INFO
to track partner access - Session Duration: Not applicable for allow actions
Create Service Authentication Policy¶
Scenario: Require service token for API access
-
Create Service Auth Policy:
-
Name:
API Service Authentication
- Description:
Require service tokens for API endpoints
- Action:
Service Auth
-
Priority:
Medium
-
Configure Conditions:
-
Service Token Settings:
-
Token Lifetime:
24 hours
(or as required) - Token Scope: Restrict to specific API endpoints
- Renewal Policy: Automatic or manual renewal
Create Login Gate Policy¶
Scenario: Require user authentication for admin areas
-
Configure Login Gate:
-
Name:
Admin Area Access
- Description:
Require user login for administrative functions
- Action:
Login Gate
-
Priority:
High
-
Set Access Conditions:
-
Authentication Settings:
-
Session Duration:
8 hours
for admin sessions - Two-Factor Required: Enable for enhanced security
- Allowed Email Domains: Restrict to company domains
- Password Policy: Configure complexity requirements
Conditional Access Policies¶
Location-Based Access¶
Scenario: Restrict access based on geographic location
-
Create Geo-Restriction Policy:
-
Name:
Geographic Access Control
- Description:
Block access from restricted countries
-
Action:
Block
-
Configure Geographic Conditions:
-
Set Exception Handling:
-
VPN Detection: Block known VPN exit points
- Proxy Detection: Handle proxy and tunnel traffic
- Business Exceptions: Allow for legitimate business needs
Time-Based Access¶
Scenario: Restrict access to business hours
-
Configure Time-Based Policy:
-
Name:
Business Hours Access
- Description:
Allow admin access only during business hours
-
Action:
Login Gate
(require authentication outside hours) -
Set Time Conditions:
-
Time Zone Configuration:
-
Primary Time Zone: Company headquarters timezone
- Multiple Zones: Support for global operations
- Holiday Calendar: Integration with business calendar
Device-Based Access¶
Scenario: Control access based on device characteristics
-
Create Device Policy:
-
Name:
Mobile Device Restrictions
- Description:
Enhanced verification for mobile devices
-
Action:
Service Auth
orLogin Gate
-
Configure Device Detection:
-
Device Management:
-
Device Fingerprinting: Track device characteristics
- Certificate Requirements: Require device certificates
- Mobile Device Management: Integration with MDM systems
Policy Testing and Validation¶
Test Mode Configuration¶
Before deploying policies:
-
Enable Test Mode:
-
Select "Test Mode" when creating policies
- Monitor behavior for 24-48 hours
-
Review access logs for policy effectiveness
-
Test Scenarios:
-
Valid Access: Confirm legitimate users can access
- Blocked Access: Verify threats are properly blocked
- Edge Cases: Test boundary conditions and exceptions
Access Validation¶
Validate policy effectiveness:
-
Access Pattern Analysis:
-
Successful Authentications: Track login success rates
- Failed Access Attempts: Monitor blocked requests
-
False Positives: Identify legitimate users blocked
-
Performance Impact:
-
Authentication Latency: Time added by access checks
- Cache Hit Rates: Efficiency of policy caching
- Resource Usage: System resources consumed
User Experience Testing¶
Ensure smooth user experience:
-
Authentication Flow:
-
Login Process: Test email OTP delivery and verification
- Session Management: Verify session persistence and renewal
-
Error Handling: Ensure clear error messages
-
Mobile Experience:
-
Mobile Authentication: Test OTP on mobile devices
- Responsive Design: Verify login pages work on mobile
- App Integration: Test with mobile applications
Advanced Policy Configuration¶
Multi-Factor Authentication¶
Scenario: Require additional verification for sensitive areas 1. Configure Enhanced Authentication:
- Primary Factor: Email OTP (standard)
- Secondary Factor: SMS or authenticator app
-
Fallback Method: Security questions or admin override
-
Risk-Based Authentication:
Dynamic Policy Updates¶
Scenario: Automatically update policies based on threat intelligence
-
Threat Feed Integration:
-
IP Reputation Lists: Automatically block known bad IPs
- Malware Signatures: Block requests with malware indicators
-
Bot Detection: Dynamically identify and block automated traffic
-
Automated List Updates:
Integration Policies¶
Scenario: Integrate with existing identity systems
-
LDAP/Active Directory Integration:
-
User Verification: Check against corporate directory
- Group Membership: Apply policies based on AD groups
-
Attribute Mapping: Use AD attributes in policy decisions
-
Single Sign-On (SSO) Integration:
-
SAML Integration: Accept SAML assertions for authentication
- OAuth2 Support: Integrate with OAuth2 providers
- JWT Token Validation: Verify and trust JWT tokens
Monitoring and Management¶
Access Analytics¶
Monitor access patterns through the dashboard:
Usage Metrics:
- Authentication Success Rate: Percentage of successful logins
- Policy Effectiveness: Which policies are most triggered
- Geographic Access Patterns: Where users are accessing from
- Time-Based Patterns: When access attempts occur
Security Metrics:
- Blocked Attempts: Number of access denials
- Suspicious Patterns: Unusual access attempts
- Threat Detection: Malicious activity identified
- False Positive Rate: Legitimate users incorrectly blocked
Alert Configuration¶
Set up proactive monitoring:
-
Security Alerts:
-
Multiple Failed Logins: Potential brute force attacks
- Geographic Anomalies: Unusual location-based access
-
High-Volume Requests: Potential DDoS or automated attacks
-
Operational Alerts:
-
Policy Failures: When policies can't be enforced
- Authentication Service Issues: OTP delivery problems
- Performance Degradation: Slow authentication responses
Compliance Reporting¶
Generate compliance reports:
Access Reports:
- User Access Logs: Who accessed what and when
- Geographic Access Patterns: Compliance with data residency
- Authentication Audit Trail: Complete login/logout history
Policy Reports:
- Policy Effectiveness: Success/failure rates by policy
- Coverage Analysis: Which resources are protected
- Exception Tracking: When and why policies were bypassed
Best Practices¶
List Management¶
- Regular Updates: Keep IP and string lists current
- Automation: Use APIs for dynamic list updates
- Documentation: Clearly document list purposes and sources
- Version Control: Track changes to critical lists
Policy Design¶
- Principle of Least Privilege: Grant minimal necessary access
- Defense in Depth: Layer multiple policies for comprehensive protection
- User Experience: Balance security with usability
- Testing: Thoroughly test policies before production deployment
Performance Optimization¶
- Policy Ordering: Place most frequently matched policies first
- Caching: Enable caching for frequently accessed resources
- List Size: Keep lists reasonably sized for performance
- Regular Cleanup: Remove unused policies and list entries
This comprehensive approach to Edge Access lists and policies provides robust zero trust security while maintaining flexibility and user experience for your applications.