Single EC2

The single instance deployment is only recommended for small or test environments that do not need high availability. This deployment consist of a AWS EC2 instance using the MetaDefender Core AMI published in the marketplace that includes a Standalone MetaDefender Core where the PostgreSQL database is deployed in the same instance than MetaDefender Core.

Diagram

MetaDefender ICAP Server can seamlessly integrate with any ICAP-enabled network appliances, including reverse proxies, web application firewalls, load balancers, forward proxies, web gateways, SSL inspectors, etc.

Orange flows

  • File get MetaDefender ICAP Server that is integrated with any ICAP-enabled network appliances and routed to be scanned and processed before entering your network and reaching end users.

Blue flows

  • MetaDefender Core and ICAP Server get activated and updates the modules installed on it after activation

This diagram show the standalone database option where the analysis results are stored.

Resources Inventory

Access Management

Service TypeResource NameDescription
IAM RoleLambdaAccessRoleRole for Lambdas
IAM RoleLambdaExecutionRoleRole with Policy for logging
IAM Instance ProfileLambdaInstanceProfileIAM InstanceProfile that is attached to the EC2 instance
IAM PolicylambdaaccessPolicy attached to LambdaAccessRole for allowing all lambda and and events actions.
AWS Lambda PermissionsPermissionForEventsToInvokeLambdaLambda Permission needed to invoke the DeactivateLambda function

Networking

Service TypeResource NameDescription
VPC<VPC Name> (parameter)Desired Virtual Private Cloud
Subnetterraform-${var.ENV_NAME}/SubnetPublicXDesired Public Subnet
Subnetterraform-${var.ENV_NAME}/SubnetPrivateXDesired PrivateSubnet
Internet Gatewayterraform-${var.ENV_NAME}/InternetGatewayInternet Gateway for VPC
Elastic IPterraform-${var.ENV_NAME}/NATIPPublic IP for NAT Gateway
NAT Gatewayterraform-${var.ENV_NAME}/NATGatewayNAT Gateway to give access to internet from private subnet
Route Tableterraform-${var.ENV_NAME}/PublicRouteTableRoute Table for Public Subnet
Route Tableterraform-${var.ENV_NAME}/PrivateRouteTableRoute Table for Private Subnet

Security

Service TypeResource NameDescription
Security GroupMetaDefenderSecurityGroupGenerated security group to allow traffic to MetaDefender REST API.

Compute

Service TypeResource NameDescription
EC2 Instance${var.ENV__NAME}-${var.APP_ _NAME}-instanceInstance to run MetaDefender Core AMI
Launch Template${var.APP_NAME}-templateLaunch Template for MetaDefender Instance
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard